Job Description At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us. The Boeing Company is seeking a Software Technical Analyst to join our team of engineers in working closely with our partners to support DoD product software development across the F/A-18 & EA-18G Mission Systems Environment located in Hazelwood, MO. We seek candidates who have skills to scrum master teams across the Build and Infrastructure space. This position will place you in a role where you have the opportunity to coordinate, document, and enhance the F/A-18 & EA-18G Mission Systems products and implementations. You will oversee and ensure timely software releases for our DoD customer. Position Responsibilities Interface with development groups across the F/A-18 & EA-18G program Assist team in progress on adopting agile mindset and grow as an agile team Present progress information at release and readiness reviews Ensure processes across the teams are being followed to provide consistent value to the customer Facilitate the Agile ceremonies for the teams that they are involved with Basic Qualifications (Required Skills/ Experience): Ability to obtain a U.S. Secret Security Clearance for which the U.S. Government requires U.S. Citizenship. Ability to obtain Secret U.S. Security clearance (Post-Start) Experience with Agile/Scrum as a Product Owner or Scrum Master Experience with DevSecOps Experience with government contracts Preferred Qualifications (Desired Skills/Experience): Experience with software tools such as Git Project Management Tool Experience (e.g. JIRA) Continuous Integration Tool Experience (e.g. Jenkins) SW Metrics & data analysis Experience Conflict of Interest: Successful candidates for this job must satisfy the Company's Conflict of Interest (COI) assessment process. Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies. Total Rewards & Pay Transparency: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $42,500 - $57,500 Potential signing bonus for eligible/qualified external candidates. Applications for this position will be accepted until May. 22, 2026 Export Control Requirements: This position must meet U.S. export control compliance requirements. To meet U.S. export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. 120.62 is required. "U.S. Person" includes U.S. Citizen, U.S. National, lawful permanent resident, refugee, or asylee. Export Control Details: US based job, US Person required Relocation This position offers relocation based on candidate eligibility. Security Clearance This position requires the ability to obtain a U.S. Security Clearance for which the U.S. Government requires U.S. Citizenship. An interim and/or final U.S. Secret Clearance Post-Start is required. Visa Sponsorship Employer will not sponsor applicants for employment visa status. Shift This position is for 1st shift Equal Opportunity Employer: Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
05/19/2026
Full time
Job Description At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us. The Boeing Company is seeking a Software Technical Analyst to join our team of engineers in working closely with our partners to support DoD product software development across the F/A-18 & EA-18G Mission Systems Environment located in Hazelwood, MO. We seek candidates who have skills to scrum master teams across the Build and Infrastructure space. This position will place you in a role where you have the opportunity to coordinate, document, and enhance the F/A-18 & EA-18G Mission Systems products and implementations. You will oversee and ensure timely software releases for our DoD customer. Position Responsibilities Interface with development groups across the F/A-18 & EA-18G program Assist team in progress on adopting agile mindset and grow as an agile team Present progress information at release and readiness reviews Ensure processes across the teams are being followed to provide consistent value to the customer Facilitate the Agile ceremonies for the teams that they are involved with Basic Qualifications (Required Skills/ Experience): Ability to obtain a U.S. Secret Security Clearance for which the U.S. Government requires U.S. Citizenship. Ability to obtain Secret U.S. Security clearance (Post-Start) Experience with Agile/Scrum as a Product Owner or Scrum Master Experience with DevSecOps Experience with government contracts Preferred Qualifications (Desired Skills/Experience): Experience with software tools such as Git Project Management Tool Experience (e.g. JIRA) Continuous Integration Tool Experience (e.g. Jenkins) SW Metrics & data analysis Experience Conflict of Interest: Successful candidates for this job must satisfy the Company's Conflict of Interest (COI) assessment process. Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies. Total Rewards & Pay Transparency: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $42,500 - $57,500 Potential signing bonus for eligible/qualified external candidates. Applications for this position will be accepted until May. 22, 2026 Export Control Requirements: This position must meet U.S. export control compliance requirements. To meet U.S. export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. 120.62 is required. "U.S. Person" includes U.S. Citizen, U.S. National, lawful permanent resident, refugee, or asylee. Export Control Details: US based job, US Person required Relocation This position offers relocation based on candidate eligibility. Security Clearance This position requires the ability to obtain a U.S. Security Clearance for which the U.S. Government requires U.S. Citizenship. An interim and/or final U.S. Secret Clearance Post-Start is required. Visa Sponsorship Employer will not sponsor applicants for employment visa status. Shift This position is for 1st shift Equal Opportunity Employer: Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
City/State Richmond, VA Work Shift Multiple shifts available Overview: Sentara is hiring a Senior Benefit Configuration Analyst! No Degree required! This position is fully remote! Candidates must have a current residence in one of the following states or be willing to relocate: Alabama, Delaware, Florida, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Maryland, Minnesota, Nebraska, Nevada, New Hampshire, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, Utah, Virginia, Washington State, West Virginia, Wisconsin, Wyoming Overview The Senior Benefit Configuration Analyst is responsible for the analysis, design, build, and validation of complex benefit configurations within the QNXT platform to support accurate claims adjudication and compliance. This role works closely with Product, Compliance, IT, Network and Claim's teams to ensure benefit plans are implemented accurately, timely, and in accordance with regulatory and contractual requirements. The senior analyst serves as a business and technical expert in QNXT benefit build and plays a key role in supporting new plan implementations, annual updates, and ongoing configuration maintenance. Key Responsibilities: • Analyze benefit plan documentation (e.g., EOCs, SOBs, ) and translate into QNXT configuration requirements. • Build and configure new and updated benefits in QNXT, including Product, Plan, Service Codes, Copay/Coinsurance, Accumulators, Limits, and Authorization rules. • Use QNXT Configuration Management Tool (CMT) and QNXT Configuration Console Suite (QCS) to manage configuration packages and perform impact analysis. • Execute back-end data validations using SQL to ensure configuration accuracy and resolve complex issues. • Participate in end-to-end testing (UAT) of benefit builds and coordinate defect resolution with QA and claims teams. • Support annual benefit configuration activities such as Medicare, Medicaid contract updates, or Exchange plan changes. • Serve as a subject matter expert (SME) for benefit build logic, configuration architecture, and claims-related business rules. • Document configuration logic and maintain version-controlled artifacts for audit and compliance purposes. • Provide mentorship and support to junior configuration analysts and assist in training initiatives. • Collaborate with cross-functional teams during product launches, regulatory changes, or system upgrades. Education Minimum 6 years of experience, which includes 2 years of directly related experience in lieu of a bachelor's degree required. Or Bachelor's degree in healthcare administration, Information Systems, or related field with 4 years of progressive, relevant professional experience required Certification/Licensure No specific certification or licensure requirements Experience Required to have hands-on benefit configuration experience, preferably in a managed care or health plan environment. Required to have a strong working knowledge of QNXT system architecture, including configuration tables, benefit logic, and claims integration. Required to have strong understanding of regulatory requirements across Medicare, Medicaid, ACA, and Commercial plans. Required to have excellent analytical, organizational, and problem-solving skills, strong written and verbal communication including technical documentation. Excellent interpersonal skills and team oriented. Preferred Qualifications Proficiency in Microsoft SQL Server (T-SQL) for data validation and troubleshooting. Experience with CMT and QCS tools for version management, configuration migrations, and build monitoring. Familiarity with implementation methodologies for new products or market launches. Knowledge of healthcare claims lifecycle, pricing, and accumulators. Lean Six Sigma or process improvement background is a plus. We provide market-competitive compensation packages, inclusive of base pay, incentives, and benefits. The base pay rate for Full Time employment is: $ 69,867.20 - $ 116,438.40. Additional compensation may be available for this role such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Benefits: Caring For Your Family and Your Career • Medical, Dental, Vision plans • Adoption, Fertility and Surrogacy Reimbursement up to $10,000 • Paid Time Off and Sick Leave • Paid Parental & Family Caregiver Leave • Emergency Backup Care • Long-Term, Short-Term Disability, and Critical Illness plans • Life Insurance • 401k/403B with Employer Match • Tuition Assistance - $5,250/year and discounted educational opportunities through Guild Education • Student Debt Pay Down - $10,000 • Reimbursement for certifications and free access to complete CEUs and professional development •Pet Insurance •Legal Resources Plan •Colleagues have the opportunity to earn an annual discretionary bonus ifestablished system and employee eligibility criteria is met. Sentara Health is an equal opportunity employer and prides itself on the diversity and inclusiveness of its close to an almost 30,000-member workforce. Diversity, inclusion, and belonging is a guiding principle of the organization to ensure its workforce reflects the communities it serves. In support of our mission "to improve health every day," this is a tobacco-free environment. For positions that are available as remote work, Sentara Health employs associates in the following states: Alabama, Delaware, Florida, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Maryland, Minnesota, Nebraska, Nevada, New Hampshire, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, Utah, Virginia, Washington, West Virginia, Wisconsin, and Wyoming.
05/19/2026
Full time
City/State Richmond, VA Work Shift Multiple shifts available Overview: Sentara is hiring a Senior Benefit Configuration Analyst! No Degree required! This position is fully remote! Candidates must have a current residence in one of the following states or be willing to relocate: Alabama, Delaware, Florida, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Maryland, Minnesota, Nebraska, Nevada, New Hampshire, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, Utah, Virginia, Washington State, West Virginia, Wisconsin, Wyoming Overview The Senior Benefit Configuration Analyst is responsible for the analysis, design, build, and validation of complex benefit configurations within the QNXT platform to support accurate claims adjudication and compliance. This role works closely with Product, Compliance, IT, Network and Claim's teams to ensure benefit plans are implemented accurately, timely, and in accordance with regulatory and contractual requirements. The senior analyst serves as a business and technical expert in QNXT benefit build and plays a key role in supporting new plan implementations, annual updates, and ongoing configuration maintenance. Key Responsibilities: • Analyze benefit plan documentation (e.g., EOCs, SOBs, ) and translate into QNXT configuration requirements. • Build and configure new and updated benefits in QNXT, including Product, Plan, Service Codes, Copay/Coinsurance, Accumulators, Limits, and Authorization rules. • Use QNXT Configuration Management Tool (CMT) and QNXT Configuration Console Suite (QCS) to manage configuration packages and perform impact analysis. • Execute back-end data validations using SQL to ensure configuration accuracy and resolve complex issues. • Participate in end-to-end testing (UAT) of benefit builds and coordinate defect resolution with QA and claims teams. • Support annual benefit configuration activities such as Medicare, Medicaid contract updates, or Exchange plan changes. • Serve as a subject matter expert (SME) for benefit build logic, configuration architecture, and claims-related business rules. • Document configuration logic and maintain version-controlled artifacts for audit and compliance purposes. • Provide mentorship and support to junior configuration analysts and assist in training initiatives. • Collaborate with cross-functional teams during product launches, regulatory changes, or system upgrades. Education Minimum 6 years of experience, which includes 2 years of directly related experience in lieu of a bachelor's degree required. Or Bachelor's degree in healthcare administration, Information Systems, or related field with 4 years of progressive, relevant professional experience required Certification/Licensure No specific certification or licensure requirements Experience Required to have hands-on benefit configuration experience, preferably in a managed care or health plan environment. Required to have a strong working knowledge of QNXT system architecture, including configuration tables, benefit logic, and claims integration. Required to have strong understanding of regulatory requirements across Medicare, Medicaid, ACA, and Commercial plans. Required to have excellent analytical, organizational, and problem-solving skills, strong written and verbal communication including technical documentation. Excellent interpersonal skills and team oriented. Preferred Qualifications Proficiency in Microsoft SQL Server (T-SQL) for data validation and troubleshooting. Experience with CMT and QCS tools for version management, configuration migrations, and build monitoring. Familiarity with implementation methodologies for new products or market launches. Knowledge of healthcare claims lifecycle, pricing, and accumulators. Lean Six Sigma or process improvement background is a plus. We provide market-competitive compensation packages, inclusive of base pay, incentives, and benefits. The base pay rate for Full Time employment is: $ 69,867.20 - $ 116,438.40. Additional compensation may be available for this role such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Benefits: Caring For Your Family and Your Career • Medical, Dental, Vision plans • Adoption, Fertility and Surrogacy Reimbursement up to $10,000 • Paid Time Off and Sick Leave • Paid Parental & Family Caregiver Leave • Emergency Backup Care • Long-Term, Short-Term Disability, and Critical Illness plans • Life Insurance • 401k/403B with Employer Match • Tuition Assistance - $5,250/year and discounted educational opportunities through Guild Education • Student Debt Pay Down - $10,000 • Reimbursement for certifications and free access to complete CEUs and professional development •Pet Insurance •Legal Resources Plan •Colleagues have the opportunity to earn an annual discretionary bonus ifestablished system and employee eligibility criteria is met. Sentara Health is an equal opportunity employer and prides itself on the diversity and inclusiveness of its close to an almost 30,000-member workforce. Diversity, inclusion, and belonging is a guiding principle of the organization to ensure its workforce reflects the communities it serves. In support of our mission "to improve health every day," this is a tobacco-free environment. For positions that are available as remote work, Sentara Health employs associates in the following states: Alabama, Delaware, Florida, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Maryland, Minnesota, Nebraska, Nevada, New Hampshire, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, Utah, Virginia, Washington, West Virginia, Wisconsin, and Wyoming.
Title: Cupid and Radiant Certified Analyst Location: Remote Position: Contract Notes: The Certified Epic Cupid and Radiant Analyst - contributes to the design, implementation, and support of clinical and enterprise applications that improve patient care, research, and operational performance. This mid-level role manages technical solutions for moderately complex projects, collaborates with clinical and operational teams, and shares technical knowledge with junior analysts. Project Details / Open Reason: New Epic Implementation Required Certifications and Experience: Current, active Epic Certifications in Cupid and Radiant required Data Courier Badge is required 5 years of Epic Radiant and Cupid build experience, including successful full life cycle implementations; high level complexity Strong understanding of Cupid and general cardiac workflows, regulatory requirements, and medical record standards. Strong understanding of Radiant and general radiology workflows, regulatory requirements, and medical record standards. Preferred Lumens certification strongly desired Experience with healthcare information systems including application and data layer management preferred. Experience with systems provisioning/security and Active Directory structures preferred. Experience with integration platforms including middleware and application interfaces preferred. Experience working with project life cycle and project management methodologies preferred. Proficiency in Microsoft Visio preferred. Professional level certification from an accredited organization in relevant informatics, health information technology, clinical or business specialties preferred. Day to Day Responsibilities: Design, configure, build, test, implement and maintain clinical and enterprise applications, including moderately complex system components within an Epic environment. Troubleshoot multifaceted issues spanning software, hardware, interfaces, and databases. Monitor system performance. Perform quality assurance and integrated testing to ensure application reliability and alignment with organizational standards. Support and develop application-specific enhancements and reports to support clinical and operational priorities. Develop and maintains system documentation for build specifications. Provide operational support for assigned applications
05/19/2026
Full time
Title: Cupid and Radiant Certified Analyst Location: Remote Position: Contract Notes: The Certified Epic Cupid and Radiant Analyst - contributes to the design, implementation, and support of clinical and enterprise applications that improve patient care, research, and operational performance. This mid-level role manages technical solutions for moderately complex projects, collaborates with clinical and operational teams, and shares technical knowledge with junior analysts. Project Details / Open Reason: New Epic Implementation Required Certifications and Experience: Current, active Epic Certifications in Cupid and Radiant required Data Courier Badge is required 5 years of Epic Radiant and Cupid build experience, including successful full life cycle implementations; high level complexity Strong understanding of Cupid and general cardiac workflows, regulatory requirements, and medical record standards. Strong understanding of Radiant and general radiology workflows, regulatory requirements, and medical record standards. Preferred Lumens certification strongly desired Experience with healthcare information systems including application and data layer management preferred. Experience with systems provisioning/security and Active Directory structures preferred. Experience with integration platforms including middleware and application interfaces preferred. Experience working with project life cycle and project management methodologies preferred. Proficiency in Microsoft Visio preferred. Professional level certification from an accredited organization in relevant informatics, health information technology, clinical or business specialties preferred. Day to Day Responsibilities: Design, configure, build, test, implement and maintain clinical and enterprise applications, including moderately complex system components within an Epic environment. Troubleshoot multifaceted issues spanning software, hardware, interfaces, and databases. Monitor system performance. Perform quality assurance and integrated testing to ensure application reliability and alignment with organizational standards. Support and develop application-specific enhancements and reports to support clinical and operational priorities. Develop and maintains system documentation for build specifications. Provide operational support for assigned applications
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE REQUIRED FOR START: Yes CLEARANCE TYPE: Top Secret TRAVEL: Yes, 10% of the Time Description At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and secure technological solutions to enable strategic objectives. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we will support yours by expanding your personal network and developing skills, whether you are new to the field or an industry thought leader. At Northrop Grumman, you will have the resources, support, and team to do some of the best work of your career. Northrop Grumman's Corporate Sector's Chief Information & Digital Office (CIDO) is seeking a Staff Computer Systems Analyst to support its IT Infrastructure & Operations organization's Classified Solutions team. The selected candidate will support information system lifecycle activities; this position will be located in Linthicum, MD. Please note that the selected candidate will be required to work on-site, full-time at our Linthicum, MD campus - this is NOT a remote work opportunity. Key Responsibilities: Perform as a Staff Computer Systems Analyst in support of classified government contracts. Communicate effectively across all organizational levels, including executive leadership, internal and external customers, in both written and oral formats. Lead and maintain operations of multi-user computer systems, coordinating with network, software, and system engineers, technicians, project managers, end users, and IT management. Direct and support multiple networks, ensuring task completion and providing guidance to team members as needed. Architect and evaluate solutions for enterprise system enhancements, including hardware, software, and system components. Engage with vendors to discuss, troubleshoot, and evaluate products and services, making recommendations for optimal solutions. Analyze customer requirements, determine equipment and software needs, and recommend and implement system enhancements, including automation for improved performance. Oversee compliant and reliable backup and recovery services, manage file systems and disk space, and ensure security audit and logging for classified systems. Lead testing of new product releases to ensure compatibility, minimize user impact, and document technical processes and procedures. Adhere to strict information systems security guidelines and report project status for all efforts, recurring and non-recurring. Provide strategic mentorship and technical leadership to junior, mid-level, and senior team members, cultivating a high-performance culture and advancing organizational expertise across the enterprise. Lift equipment weighing up to 50 pounds. Work after hours, and weekends, as needed. Basic Qualifications: PhD with 8 years of relevant experience, or a Master's Degree with 10 years of relevant experience, or a Bachelor's Degree with 12 years of relevant experience, or an Associate's Degree with 14 years of relevant experience; a High School Diploma/GED with 16 years of relevant experience may be considered in lieu of a completed degree. Candidates must have a current U.S. Government Top Secret level security clearance (at a minimum), to include a closed investigation date completed within the last 6 years OR must be enrolled in the U.S. Government Continuous Evaluation (CE) Program, in order to be considered. Candidates must have the ability to obtain, and maintain, access to Special Programs (PAR) as a condition of continued employment. Must have extensive experience designing and managing Windows domain architectures in classified environments, including Active Directory, GPOs, policies, permissions, and Windows server management. Proficiency in Windows AD, LDAP, VMware, and SAN storage systems. Must have a DoD 8140 IAT Level II , or higher, certification (example: Security+ CE); maintaining the required certification will be a condition of continued employment Preferred Qualifications: 12 years of Windows Server Administration to include VMWare, Active Directory, and Group Policy in classified environments. Demonstrated experience managing and operating systems in compliance with NISPOM Chapter 8, DCID 6/3-ICD 503, RMF, STIG, JAFAN, or JSIG frameworks. Advanced networking expertise, including subnets, routing, VLANs, VTCs, and Cisco technologies (certification preferred). Skilled in enterprise system imaging, deployment, and maintenance. Proficient in installing, configuring, and maintaining computer hardware in networked environments. Extensive virtualization experience with SAN storage systems. Advanced scripting and automation capabilities. Cross-platform operating system proficiency (Windows, Linux, Solaris, OSX, UNIX, etc.). Experienced with Assessment & Authorization processes. Experience with cloud environments and hybrid identity/resource management. Proficient in containerization technologies for application deployment and management. We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly team environment. Our diverse portfolio of programs means there are endless paths to cultivate your career. We also offer exceptional benefits/healthcare, a 9/80 work schedule, and a great 401k matching program. Come join us! Primary Level Salary Range: $153,600.00 - $230,400.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
05/19/2026
Full time
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE REQUIRED FOR START: Yes CLEARANCE TYPE: Top Secret TRAVEL: Yes, 10% of the Time Description At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and secure technological solutions to enable strategic objectives. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we will support yours by expanding your personal network and developing skills, whether you are new to the field or an industry thought leader. At Northrop Grumman, you will have the resources, support, and team to do some of the best work of your career. Northrop Grumman's Corporate Sector's Chief Information & Digital Office (CIDO) is seeking a Staff Computer Systems Analyst to support its IT Infrastructure & Operations organization's Classified Solutions team. The selected candidate will support information system lifecycle activities; this position will be located in Linthicum, MD. Please note that the selected candidate will be required to work on-site, full-time at our Linthicum, MD campus - this is NOT a remote work opportunity. Key Responsibilities: Perform as a Staff Computer Systems Analyst in support of classified government contracts. Communicate effectively across all organizational levels, including executive leadership, internal and external customers, in both written and oral formats. Lead and maintain operations of multi-user computer systems, coordinating with network, software, and system engineers, technicians, project managers, end users, and IT management. Direct and support multiple networks, ensuring task completion and providing guidance to team members as needed. Architect and evaluate solutions for enterprise system enhancements, including hardware, software, and system components. Engage with vendors to discuss, troubleshoot, and evaluate products and services, making recommendations for optimal solutions. Analyze customer requirements, determine equipment and software needs, and recommend and implement system enhancements, including automation for improved performance. Oversee compliant and reliable backup and recovery services, manage file systems and disk space, and ensure security audit and logging for classified systems. Lead testing of new product releases to ensure compatibility, minimize user impact, and document technical processes and procedures. Adhere to strict information systems security guidelines and report project status for all efforts, recurring and non-recurring. Provide strategic mentorship and technical leadership to junior, mid-level, and senior team members, cultivating a high-performance culture and advancing organizational expertise across the enterprise. Lift equipment weighing up to 50 pounds. Work after hours, and weekends, as needed. Basic Qualifications: PhD with 8 years of relevant experience, or a Master's Degree with 10 years of relevant experience, or a Bachelor's Degree with 12 years of relevant experience, or an Associate's Degree with 14 years of relevant experience; a High School Diploma/GED with 16 years of relevant experience may be considered in lieu of a completed degree. Candidates must have a current U.S. Government Top Secret level security clearance (at a minimum), to include a closed investigation date completed within the last 6 years OR must be enrolled in the U.S. Government Continuous Evaluation (CE) Program, in order to be considered. Candidates must have the ability to obtain, and maintain, access to Special Programs (PAR) as a condition of continued employment. Must have extensive experience designing and managing Windows domain architectures in classified environments, including Active Directory, GPOs, policies, permissions, and Windows server management. Proficiency in Windows AD, LDAP, VMware, and SAN storage systems. Must have a DoD 8140 IAT Level II , or higher, certification (example: Security+ CE); maintaining the required certification will be a condition of continued employment Preferred Qualifications: 12 years of Windows Server Administration to include VMWare, Active Directory, and Group Policy in classified environments. Demonstrated experience managing and operating systems in compliance with NISPOM Chapter 8, DCID 6/3-ICD 503, RMF, STIG, JAFAN, or JSIG frameworks. Advanced networking expertise, including subnets, routing, VLANs, VTCs, and Cisco technologies (certification preferred). Skilled in enterprise system imaging, deployment, and maintenance. Proficient in installing, configuring, and maintaining computer hardware in networked environments. Extensive virtualization experience with SAN storage systems. Advanced scripting and automation capabilities. Cross-platform operating system proficiency (Windows, Linux, Solaris, OSX, UNIX, etc.). Experienced with Assessment & Authorization processes. Experience with cloud environments and hybrid identity/resource management. Proficient in containerization technologies for application deployment and management. We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly team environment. Our diverse portfolio of programs means there are endless paths to cultivate your career. We also offer exceptional benefits/healthcare, a 9/80 work schedule, and a great 401k matching program. Come join us! Primary Level Salary Range: $153,600.00 - $230,400.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Looking for IT Services Lead for Plymouth, MN Office Messerli Kramer's Consumer Collections and Creditors' Remedies group in our Plymouth office provides comprehensive, debt collection services to our clients, including some of the nation's largest banks and financial services companies. Our thorough understanding of the law, business and regulatory landscape related to the collections process makes us more than litigators. We are negotiators, investigators, collectors-and above all-partners with our clients. We are licensed as attorneys in Minnesota, Wisconsin, Nebraska, Iowa, North Dakota, South Dakota, Montana, Colorado, and Ohio. We collaborate with our clients and develop a collection strategy tailored to each client's unique recovery objectives. Our attorneys manage a range of tools for a client's claim, from clients' claims from demand letter, telephone calls, credit bureau review, litigation, garnishment, skip tracing and asset searches, to post-judgment remedies and collateral recovery. Position Summary The IT Services Lead is responsible for on-site IT operations, serving as the senior technical presence within the office to ensure stable, high-performing technology services. This role provides advanced technical support, leads issue triage and resolution, and coordinates closely with vendor partners and internal engineering teams. This role plays a key part in supporting enterprise applications and ensuring IT systems are effectively configured to enable business workflows, working closely with Systems Analysts, DevOps, and vendor partners. The IT Services Lead also contributes to security, compliance, and incident response efforts in coordination with internal teams and external partners. The IT Services Lead is not responsible for deep infrastructure engineering but plays a critical role in diagnosing issues, performing hands-on support, and driving resolution across teams. This individual acts as the bridge between end users, help desk, managed service providers, and enterprise IT. Key Responsibilities Site Operations & Project Management Communicate project/incident status, impact, and resolution progress to stakeholders Escalate issues appropriately and ensure accountability Lead on-site execution of IT projects and rollouts Coordinate with enterprise IT and Managed Service Provider (MSP) Maintain system and process documentation Identify recurring issues and improvement opportunities Service Delivery & Technical Support Oversee ticketing system operations, ensuring tickets are properly triaged, prioritized, resolved, and closed in alignment with service level expectations (SLAs Assist with day-to-day support requests and act as backup support for T1 Help Desk Troubleshoot across applications, endpoints, and network to determine root cause Provide hands-on support for high-impact or complex issues Own issues end-to-end and coordinate resolution across teams Support and guide help desk staff Act as primary on-site escalation point for application-related issues Bridge communication between end users and enterprise IT teams Application Administration & Integration Support administration and operation of key desktop and enterprise applications (e.g., RingCentral, Accuroute, DMS) Ensure applications function effectively within desktop and VDI environments Troubleshoot application issues and determine root cause Work closely with Systems Analyst and DevOps to support business workflows Assist in testing and rollout of application updates and integrations Serve as on-site resource for application-related issues System Administration & Maintenance Provide on-site support for network and data center equipment. Act as remote hands for MSP and engineering teams Manage printers, scanners, cameras, and on-site technology Coordinate device deployments and lifecycle management Support endpoint and VDI configuration for application performance Security, Compliance & Audit Support Assist with internal audits and compliance activities Assist with security incident response in coordination with SOC and MSP Act as on-site point of contact for security-related actions Help enforce endpoint security practices and policies Identify and escalate potential risks or control gaps Qualifications Required: 5-8+ years of IT experience Strong troubleshooting across endpoints, applications, and networking fundamentals Strong coordination and communication skills Strong understanding of endpoint environments, including Windows OS, device configuration, and performance troubleshooting Experience supporting virtual desktop environments (VDI) Experience troubleshooting application performance issues across desktop, VDI, and network layers Preferred: Experience working with MSPs Familiarity with enterprise collaboration and communication platforms (e.g., RingCentral, Microsoft Teams) Experience supporting document management systems such as NetDocuments or similar platforms Solid understanding of networking fundamentals (DNS, DHCP, VPN, latency, bandwidth constraints) and ability to isolate network-related issues Key Characteristics for Success - Owns issues end-to-end - Strong diagnostic thinker - Hands-on but able to coordinate others - Communicates clearly and proactively - Drives resolution and accountability COMPENSATION & BENEFITS Salary: $65,000 - $90,000 (depending on experience) + annual discretionary bonus Medical, Dental, and Vision insurance Health Savings Account (with employer contribution, if eligible) Flexible Spending Accounts (healthcare, dependent care, limited purpose) Employer-paid Life and LTD insurance + voluntary options Paid parental leave 401(k) with 4% Safe Harbor contribution (after one year of service) PIa73465e5-
05/19/2026
Full time
Looking for IT Services Lead for Plymouth, MN Office Messerli Kramer's Consumer Collections and Creditors' Remedies group in our Plymouth office provides comprehensive, debt collection services to our clients, including some of the nation's largest banks and financial services companies. Our thorough understanding of the law, business and regulatory landscape related to the collections process makes us more than litigators. We are negotiators, investigators, collectors-and above all-partners with our clients. We are licensed as attorneys in Minnesota, Wisconsin, Nebraska, Iowa, North Dakota, South Dakota, Montana, Colorado, and Ohio. We collaborate with our clients and develop a collection strategy tailored to each client's unique recovery objectives. Our attorneys manage a range of tools for a client's claim, from clients' claims from demand letter, telephone calls, credit bureau review, litigation, garnishment, skip tracing and asset searches, to post-judgment remedies and collateral recovery. Position Summary The IT Services Lead is responsible for on-site IT operations, serving as the senior technical presence within the office to ensure stable, high-performing technology services. This role provides advanced technical support, leads issue triage and resolution, and coordinates closely with vendor partners and internal engineering teams. This role plays a key part in supporting enterprise applications and ensuring IT systems are effectively configured to enable business workflows, working closely with Systems Analysts, DevOps, and vendor partners. The IT Services Lead also contributes to security, compliance, and incident response efforts in coordination with internal teams and external partners. The IT Services Lead is not responsible for deep infrastructure engineering but plays a critical role in diagnosing issues, performing hands-on support, and driving resolution across teams. This individual acts as the bridge between end users, help desk, managed service providers, and enterprise IT. Key Responsibilities Site Operations & Project Management Communicate project/incident status, impact, and resolution progress to stakeholders Escalate issues appropriately and ensure accountability Lead on-site execution of IT projects and rollouts Coordinate with enterprise IT and Managed Service Provider (MSP) Maintain system and process documentation Identify recurring issues and improvement opportunities Service Delivery & Technical Support Oversee ticketing system operations, ensuring tickets are properly triaged, prioritized, resolved, and closed in alignment with service level expectations (SLAs Assist with day-to-day support requests and act as backup support for T1 Help Desk Troubleshoot across applications, endpoints, and network to determine root cause Provide hands-on support for high-impact or complex issues Own issues end-to-end and coordinate resolution across teams Support and guide help desk staff Act as primary on-site escalation point for application-related issues Bridge communication between end users and enterprise IT teams Application Administration & Integration Support administration and operation of key desktop and enterprise applications (e.g., RingCentral, Accuroute, DMS) Ensure applications function effectively within desktop and VDI environments Troubleshoot application issues and determine root cause Work closely with Systems Analyst and DevOps to support business workflows Assist in testing and rollout of application updates and integrations Serve as on-site resource for application-related issues System Administration & Maintenance Provide on-site support for network and data center equipment. Act as remote hands for MSP and engineering teams Manage printers, scanners, cameras, and on-site technology Coordinate device deployments and lifecycle management Support endpoint and VDI configuration for application performance Security, Compliance & Audit Support Assist with internal audits and compliance activities Assist with security incident response in coordination with SOC and MSP Act as on-site point of contact for security-related actions Help enforce endpoint security practices and policies Identify and escalate potential risks or control gaps Qualifications Required: 5-8+ years of IT experience Strong troubleshooting across endpoints, applications, and networking fundamentals Strong coordination and communication skills Strong understanding of endpoint environments, including Windows OS, device configuration, and performance troubleshooting Experience supporting virtual desktop environments (VDI) Experience troubleshooting application performance issues across desktop, VDI, and network layers Preferred: Experience working with MSPs Familiarity with enterprise collaboration and communication platforms (e.g., RingCentral, Microsoft Teams) Experience supporting document management systems such as NetDocuments or similar platforms Solid understanding of networking fundamentals (DNS, DHCP, VPN, latency, bandwidth constraints) and ability to isolate network-related issues Key Characteristics for Success - Owns issues end-to-end - Strong diagnostic thinker - Hands-on but able to coordinate others - Communicates clearly and proactively - Drives resolution and accountability COMPENSATION & BENEFITS Salary: $65,000 - $90,000 (depending on experience) + annual discretionary bonus Medical, Dental, and Vision insurance Health Savings Account (with employer contribution, if eligible) Flexible Spending Accounts (healthcare, dependent care, limited purpose) Employer-paid Life and LTD insurance + voluntary options Paid parental leave 401(k) with 4% Safe Harbor contribution (after one year of service) PIa73465e5-
Our direct client is looking for a Senior IT Business Analyst for a hybrid long term contract position in Washington, DC. NOTE: Hybrid position, 3 Days onsite (Monday, Tuesday, Wednesday) JOB DESCRIPTION: - Formulates and defines systems scope and objectives based on both user needs and a thorough understanding of business systems and industry requirements. - The business system analyst is responsible for solving business problems, defining business architecture, process optimization, business rules, business cases, business requirements, organizational change (communications), and UAT. - The role of Business System Analysis is to understand and document current business procedures and identify areas for improvement. This person will provide hands on business process requirements analysis for areas within the OCFO supported by the Office of the Chief Information Officer. In collaboration with internal departments and external resources, plans, designs and implements systems solutions. A thorough understanding of the business, systems and application current state is necessary prior to recommending changes for new or enhanced technology solution. - Under general supervision, formulate and define system scope and objectives through research. - The Business Systems analyst is responsible for the knowledge transfer of business requirements to the technical specialists/application/database developers and project managers. - The Business Analyst shall be able to make cogent arguments recommending one course of action over another. - The Business Analyst may need to review and understand documentation and information from the business area to provide detailed understanding of current state. - New business patterns commonly develop, and the Business analyst shall be able to identify and address the change in business process - Business analyst shall understand the variety of standard ideas and methods for requirements gathering and elicitation/translate what business needs into IT requirements, process detail and design specifications - Business analyst shall be able to create trust between stakeholders and technical teams - Business analyst shall assist in identifying, documenting and implementing various software solutions - Business analyst shall provide application support for business users - Business analyst shall have ability to write functional design specifications - Business analyst shall have experience supporting data cleanup, data conversion and reconciliation activities - Business analyst shall be able to review design specifications developed by other analysts and provide feedback on design - Business analyst shall be able to write white papers and solution recommendations as needed - Business analyst shall be able to support development of testing and training activities Responsibilities: - Formulates and defines systems scope and objectives based on user needs and a thorough understanding of business systems and industry requirements. - Provides consultation on complex projects and is the top-level contributor/specialist of most phases of systems analysis, while considering the business implications of the application of technology to the current and future business environment. Qualifications - A current Project Management Professional (PMP) certification and 10+ years experience SKILL MATRIX: - Business Analyst experience - Required - Software Development Lifecycle (SDLC) experience, including Waterfall, Hybrid and Agile methods - Required - Hands-on experience in developing and documenting operational processes, functions and procedures - Required - Experience leading end-to-end implementation of new requirements, process changes and improvements requested by Stakeholders/business - Required - Exp providing go-live, continuous improvement, business support and proactive engagement with planning functions to facilitate business requirements - Required - Experience in application configuration, governance and strategy as well as the implementation of business change requests - Required - Experience in call/contact center business solution development - Required - Experience with Atlassian Jira/Confluence toolset - Required - Bachelor's Degree in Finance/Engineering/IT or equivalent experience (15+ years) OR current PMP certification and 10 years experience - Required Question 1: The selected resource will work in a hybrid capacity, 3 Days onsite (Monday, Tuesday, Wednesday). Does your candidate agree to this? Question 2: In-person interviews will most likely be required for this role. Is your candidate aware/agreeing to this requirement? Location: Hybrid at 1101 4th St. SW, Suite 350, Washington DC 20024 Type: Long term contract Please send resume to "jobs at etechnovision dot com" with B3975B in Subject for immediate consideration.
05/19/2026
Full time
Our direct client is looking for a Senior IT Business Analyst for a hybrid long term contract position in Washington, DC. NOTE: Hybrid position, 3 Days onsite (Monday, Tuesday, Wednesday) JOB DESCRIPTION: - Formulates and defines systems scope and objectives based on both user needs and a thorough understanding of business systems and industry requirements. - The business system analyst is responsible for solving business problems, defining business architecture, process optimization, business rules, business cases, business requirements, organizational change (communications), and UAT. - The role of Business System Analysis is to understand and document current business procedures and identify areas for improvement. This person will provide hands on business process requirements analysis for areas within the OCFO supported by the Office of the Chief Information Officer. In collaboration with internal departments and external resources, plans, designs and implements systems solutions. A thorough understanding of the business, systems and application current state is necessary prior to recommending changes for new or enhanced technology solution. - Under general supervision, formulate and define system scope and objectives through research. - The Business Systems analyst is responsible for the knowledge transfer of business requirements to the technical specialists/application/database developers and project managers. - The Business Analyst shall be able to make cogent arguments recommending one course of action over another. - The Business Analyst may need to review and understand documentation and information from the business area to provide detailed understanding of current state. - New business patterns commonly develop, and the Business analyst shall be able to identify and address the change in business process - Business analyst shall understand the variety of standard ideas and methods for requirements gathering and elicitation/translate what business needs into IT requirements, process detail and design specifications - Business analyst shall be able to create trust between stakeholders and technical teams - Business analyst shall assist in identifying, documenting and implementing various software solutions - Business analyst shall provide application support for business users - Business analyst shall have ability to write functional design specifications - Business analyst shall have experience supporting data cleanup, data conversion and reconciliation activities - Business analyst shall be able to review design specifications developed by other analysts and provide feedback on design - Business analyst shall be able to write white papers and solution recommendations as needed - Business analyst shall be able to support development of testing and training activities Responsibilities: - Formulates and defines systems scope and objectives based on user needs and a thorough understanding of business systems and industry requirements. - Provides consultation on complex projects and is the top-level contributor/specialist of most phases of systems analysis, while considering the business implications of the application of technology to the current and future business environment. Qualifications - A current Project Management Professional (PMP) certification and 10+ years experience SKILL MATRIX: - Business Analyst experience - Required - Software Development Lifecycle (SDLC) experience, including Waterfall, Hybrid and Agile methods - Required - Hands-on experience in developing and documenting operational processes, functions and procedures - Required - Experience leading end-to-end implementation of new requirements, process changes and improvements requested by Stakeholders/business - Required - Exp providing go-live, continuous improvement, business support and proactive engagement with planning functions to facilitate business requirements - Required - Experience in application configuration, governance and strategy as well as the implementation of business change requests - Required - Experience in call/contact center business solution development - Required - Experience with Atlassian Jira/Confluence toolset - Required - Bachelor's Degree in Finance/Engineering/IT or equivalent experience (15+ years) OR current PMP certification and 10 years experience - Required Question 1: The selected resource will work in a hybrid capacity, 3 Days onsite (Monday, Tuesday, Wednesday). Does your candidate agree to this? Question 2: In-person interviews will most likely be required for this role. Is your candidate aware/agreeing to this requirement? Location: Hybrid at 1101 4th St. SW, Suite 350, Washington DC 20024 Type: Long term contract Please send resume to "jobs at etechnovision dot com" with B3975B in Subject for immediate consideration.
Careers Integrated Resources Inc
Richmond, Virginia
Job Title: Senior System Analyst Job Location: Richmond, VA/ Cayce, SC (Hybrid - 1 week Remote/1 week Onsite) Job Duration: 12+ Months (Possibility of extension) Job Description: High Level Project Overview: Working fairly independently, formulates and defines systems Product and objectives. Devises or modifies procedures to solve complex projects, and often multiple phases of a project. Works with business customers to understand and prepare requirements, diagrams and other documentation from which applications will be developed and maintained. Works with user experience specialists, developers, architects and others during all phases of the application development lifecycle. Works company wide, in multi-platform environments, on multiple project assignments. Monitored on projects' progress and results. Roles & Responsibilities: Experience in evaluating and adapting rapidly changing technology to business needs. Demonstrated experience leading application development and automation projects Relational database design experience knowledge of a variety of data sources including Dataverse, SQL, Oracle and SharePoint Experience guiding the development of applications that work across multiple devices such as laptop, tablet, phone Demonstrated competency in verbal communications, written communications, and interpersonal understanding. Demonstrated ability to seek out and understand customers' issues and business needs. Demonstrated ability to handle deadlines and pressure. Conceptual thinking and reasoning abilities. Demonstrated competency in logical and analytical thinking. Demonstrated decision making ability. Demonstrated competency in identifying and solving problems. Demonstrated ability in utilizing multiple tools to solve problems. Ability to work independently, Achievement orientation, Self-starter, Self-control, Concern for quality, Flexibility. Top 3 Required Skills: Working with business customers to understand and prepare requirements, diagrams and other documentation from which applications and automations will be developed and maintained. Project management skills working with user experience specialists, developers, architects and others during all phases of the application development lifecycle. Systems analysis and design What soft skill requirements do you have (team fit and personality requirements)? Strong communication skills both verbal and written Ability to lead, collaborate, or work effectively in a variety of teams, including multi-disciplinary teams Ability to work independently, Achievement orientation, Self-starter, Self-control, Concern for quality, Flexibility. Nice to Have Skills: Experience in evaluating and adapting rapidly changing technology to business needs. Relational database design experience knowledge of a variety of data sources including Dataverse, SQL, Oracle and SharePoint Preferred Years of Experience: 7+ years directly related experience in systems analysis / project management. Education: Bachelor: Preferred Discipline(s): Business, Project Management, Computer Engineering, Computer Science, Information Systems, Are there any specific companies/industries you'd like to see in the candidate's experience? No Preferred Interview Process Overview (High level): 1 hour interview over Teams with hiring manager and 2 others on the panel. If selected to proceed, additional 30-minute interview with Director.
05/19/2026
Full time
Job Title: Senior System Analyst Job Location: Richmond, VA/ Cayce, SC (Hybrid - 1 week Remote/1 week Onsite) Job Duration: 12+ Months (Possibility of extension) Job Description: High Level Project Overview: Working fairly independently, formulates and defines systems Product and objectives. Devises or modifies procedures to solve complex projects, and often multiple phases of a project. Works with business customers to understand and prepare requirements, diagrams and other documentation from which applications will be developed and maintained. Works with user experience specialists, developers, architects and others during all phases of the application development lifecycle. Works company wide, in multi-platform environments, on multiple project assignments. Monitored on projects' progress and results. Roles & Responsibilities: Experience in evaluating and adapting rapidly changing technology to business needs. Demonstrated experience leading application development and automation projects Relational database design experience knowledge of a variety of data sources including Dataverse, SQL, Oracle and SharePoint Experience guiding the development of applications that work across multiple devices such as laptop, tablet, phone Demonstrated competency in verbal communications, written communications, and interpersonal understanding. Demonstrated ability to seek out and understand customers' issues and business needs. Demonstrated ability to handle deadlines and pressure. Conceptual thinking and reasoning abilities. Demonstrated competency in logical and analytical thinking. Demonstrated decision making ability. Demonstrated competency in identifying and solving problems. Demonstrated ability in utilizing multiple tools to solve problems. Ability to work independently, Achievement orientation, Self-starter, Self-control, Concern for quality, Flexibility. Top 3 Required Skills: Working with business customers to understand and prepare requirements, diagrams and other documentation from which applications and automations will be developed and maintained. Project management skills working with user experience specialists, developers, architects and others during all phases of the application development lifecycle. Systems analysis and design What soft skill requirements do you have (team fit and personality requirements)? Strong communication skills both verbal and written Ability to lead, collaborate, or work effectively in a variety of teams, including multi-disciplinary teams Ability to work independently, Achievement orientation, Self-starter, Self-control, Concern for quality, Flexibility. Nice to Have Skills: Experience in evaluating and adapting rapidly changing technology to business needs. Relational database design experience knowledge of a variety of data sources including Dataverse, SQL, Oracle and SharePoint Preferred Years of Experience: 7+ years directly related experience in systems analysis / project management. Education: Bachelor: Preferred Discipline(s): Business, Project Management, Computer Engineering, Computer Science, Information Systems, Are there any specific companies/industries you'd like to see in the candidate's experience? No Preferred Interview Process Overview (High level): 1 hour interview over Teams with hiring manager and 2 others on the panel. If selected to proceed, additional 30-minute interview with Director.
Our direct client is looking for a Microsoft Dynamics 365 Developer for a Hybrid Long term contract in Trenton, NJ. NOTE: 3 days a week ON-SITE 8-4:30 physically IN-Office in Trenton, NJ. (2 days remote work). Government position; remote work days is limited to 2 and is non-negotiable. JOB DESCRIPTION: - Experience implementing Microsoft Dynamics 365 CRM-based business solutions. This position is responsible for the provisioning, development and maintenance of Microsoft Dynamics 365 CRM platform and the ideal candidate will have sound knowledge in Dynamics CRM Best Practices, entities/tables, workflows, configurations, business process flows, portals, custom development, integration development, Reporting, Dashboards, Web Resources, CRM Solutions File Management, and developing custom applications using the xRM framework. - The person should be an expert at Dynamics 365 CRM configurations and only utilize custom code when absolutely required. Strong background in the planning, designing, installing, configuring, and customizing of relational data modeling of Dynamics CRM solutions that are innovative, while observing best practices in regards to supported extensions of the platform. - Work with business users to help them improve their processes and systems. Assess processes, determine requirements and deliver recommendations, design documentation and reports. Engage with business users to understand how changes to process, services and software can improve efficiencies and add value. Conduct research and analysis in order to come up with solutions to business problems and help to introduce these recommendations. Must articulate those ideas but also balance them against what's technologically feasible and functionally reasonable. EXPERIENCE: - Ability to communicate effectively in both spoken and written English. Developer: - 2+ years of experience with Microsoft Dynamics 365 configuration and custom code. - 5+ years of experience with Microsoft Dynamics CRM as a developer. - Significant knowledge of Dynamics 2016/365 CRM, and the O365 platform as it pertains to feature sets that integrate with Dynamics CRM solutions, including SharePoint. - Experience in customizations utilizing custom code in C#.NET, JavaScript, HTML and SQL Server, including XrmToolBox, plug-ins, ribbon workbench, scripting and form creation. - Experience with the CRM API, web services REST/ODATA and SOAP endpoints. - Experience in creating and registering add-ins with custom C# code. - The ability to convey knowledge to both developers and business users to balance the use of native (OOB) features and the appropriate use of custom development. - Understanding of the Dynamics 2016/365 CRM data model and at least 3 years designing, creating, customizing and configuring Dynamics 2016/365 CRM solutions, including innovative module solutions using both core CRM capabilities as well as custom xRM solutions. - Extensive experience setting up and configuring Dynamics 2016/365 CRM with O365 - Experience with Dynamics 365 Field Operations modules. - Expertise in Business Process Flows (BPFs), out-of-the box workflows and custom workflows, forms, views and reports. - Knowledge of and ability to configure business units, security groups, teams, roles and web roles. - SSRS development for custom reporting. - Troubleshoot Dynamics CRM errors and performance related issues. - Creating and maintaining task, knowledge transfer and FAQ documentation. Analyst: - Works with other technical and project groups to ensure that software application requirements are identified at an early stage, ensuring that new build requirements or expansions are captured, and plans produced for any upgrades/expansions and new build. - Must maintain requirements, change requests and track gaps between software and business requirements specifications. - Maintain the documentation, processes, guidelines, and procedures of the project management methodology including infrastructure procedures and protocols for the smooth operation of the day-to-day business. - Prepares project documentation as required, champion the production of business cases for software development or migration. - Partners with business, clinical, quality and utilization teams to complete project management activities to ensure successful completion of project needs. - Review current system data structure, and model new data structure based on current operational requirements. - Evaluate and map existing data structure fields for legacy data migration. - Create test cases and report on outcomes. RELEVANT WORK EXPERIENCE: - 6 to 8+ yrs. EDUCATION: - 4 year+ degree preferred SKILLS MATRIX: - Prior experience with Microsoft Dynamics 365 Custom Development (must have: XrmToolBox, scripting, plug-ins, ribbon workbench) Required - Experience with at least two different Microsoft Dynamics 365 Modules (i.e. Customer Service, Field Service, Marketing and Out of the box features) - Required - Prior experience w/Dynamics 365 out of the box Configuration(tables, forms, lists, workflows, business process flows, web resources, users, security)- Required - Extensive programming experience in C# .NET (custom code development) - Required - Prior functional experience packaging Dynamics 365 solutions and deploying them to higher instances (QA, UAT, Prod) - Required - Dynamics 365 Portal Design and Development (Power Apps Portals) - Required - HTML and JavaScript development - Required - Prior hands on experience using custom code to create and consume Web API/Web Services - Required - Experience with CRM API - Required - Prior experience working with SQL Server 2016 and above (includes stored procedures and queries) - Required - Prior experience with SSRS custom development - Required - SharePoint Online integration of Dynamics 365 - Required - Prior experience meeting with Project Stakeholders, SMEs and Business Users to gather and document as-is and to-be processes and requirements - Required - Prior experience creating and maintaining System Development Life Cycle (SDLC) documentation - Required - Prior experience translating business requirements into functional and technical design documentation - Required - Excellent written and verbal communication skills - Required - Hands on experience with Jira or Azure Dev Ops (ADO) or equivalent tools - Strong plus to have Question 1: Where is the candidate geographically located currently? Question 2: If relocation is needed, will the candidate relocate before start of the project (N/A or Yes are only acceptable answers)? Question 3: Does candidate agree that this position is 3 days a week ON-SITE 8-4:30 physically IN-Office in Trenton, NJ. (2 days remote work) ? Question 4: This position requires that candidates interview IN-PERSON - no requests for remote webcam interviews will be accommodated. Are you fine with this? Location: Hybrid in Trenton, NJ. Type: Long term contract Please send resume to "jobs at etechnovision dot com" with B3439B in Subject for immediate consideration.
05/19/2026
Full time
Our direct client is looking for a Microsoft Dynamics 365 Developer for a Hybrid Long term contract in Trenton, NJ. NOTE: 3 days a week ON-SITE 8-4:30 physically IN-Office in Trenton, NJ. (2 days remote work). Government position; remote work days is limited to 2 and is non-negotiable. JOB DESCRIPTION: - Experience implementing Microsoft Dynamics 365 CRM-based business solutions. This position is responsible for the provisioning, development and maintenance of Microsoft Dynamics 365 CRM platform and the ideal candidate will have sound knowledge in Dynamics CRM Best Practices, entities/tables, workflows, configurations, business process flows, portals, custom development, integration development, Reporting, Dashboards, Web Resources, CRM Solutions File Management, and developing custom applications using the xRM framework. - The person should be an expert at Dynamics 365 CRM configurations and only utilize custom code when absolutely required. Strong background in the planning, designing, installing, configuring, and customizing of relational data modeling of Dynamics CRM solutions that are innovative, while observing best practices in regards to supported extensions of the platform. - Work with business users to help them improve their processes and systems. Assess processes, determine requirements and deliver recommendations, design documentation and reports. Engage with business users to understand how changes to process, services and software can improve efficiencies and add value. Conduct research and analysis in order to come up with solutions to business problems and help to introduce these recommendations. Must articulate those ideas but also balance them against what's technologically feasible and functionally reasonable. EXPERIENCE: - Ability to communicate effectively in both spoken and written English. Developer: - 2+ years of experience with Microsoft Dynamics 365 configuration and custom code. - 5+ years of experience with Microsoft Dynamics CRM as a developer. - Significant knowledge of Dynamics 2016/365 CRM, and the O365 platform as it pertains to feature sets that integrate with Dynamics CRM solutions, including SharePoint. - Experience in customizations utilizing custom code in C#.NET, JavaScript, HTML and SQL Server, including XrmToolBox, plug-ins, ribbon workbench, scripting and form creation. - Experience with the CRM API, web services REST/ODATA and SOAP endpoints. - Experience in creating and registering add-ins with custom C# code. - The ability to convey knowledge to both developers and business users to balance the use of native (OOB) features and the appropriate use of custom development. - Understanding of the Dynamics 2016/365 CRM data model and at least 3 years designing, creating, customizing and configuring Dynamics 2016/365 CRM solutions, including innovative module solutions using both core CRM capabilities as well as custom xRM solutions. - Extensive experience setting up and configuring Dynamics 2016/365 CRM with O365 - Experience with Dynamics 365 Field Operations modules. - Expertise in Business Process Flows (BPFs), out-of-the box workflows and custom workflows, forms, views and reports. - Knowledge of and ability to configure business units, security groups, teams, roles and web roles. - SSRS development for custom reporting. - Troubleshoot Dynamics CRM errors and performance related issues. - Creating and maintaining task, knowledge transfer and FAQ documentation. Analyst: - Works with other technical and project groups to ensure that software application requirements are identified at an early stage, ensuring that new build requirements or expansions are captured, and plans produced for any upgrades/expansions and new build. - Must maintain requirements, change requests and track gaps between software and business requirements specifications. - Maintain the documentation, processes, guidelines, and procedures of the project management methodology including infrastructure procedures and protocols for the smooth operation of the day-to-day business. - Prepares project documentation as required, champion the production of business cases for software development or migration. - Partners with business, clinical, quality and utilization teams to complete project management activities to ensure successful completion of project needs. - Review current system data structure, and model new data structure based on current operational requirements. - Evaluate and map existing data structure fields for legacy data migration. - Create test cases and report on outcomes. RELEVANT WORK EXPERIENCE: - 6 to 8+ yrs. EDUCATION: - 4 year+ degree preferred SKILLS MATRIX: - Prior experience with Microsoft Dynamics 365 Custom Development (must have: XrmToolBox, scripting, plug-ins, ribbon workbench) Required - Experience with at least two different Microsoft Dynamics 365 Modules (i.e. Customer Service, Field Service, Marketing and Out of the box features) - Required - Prior experience w/Dynamics 365 out of the box Configuration(tables, forms, lists, workflows, business process flows, web resources, users, security)- Required - Extensive programming experience in C# .NET (custom code development) - Required - Prior functional experience packaging Dynamics 365 solutions and deploying them to higher instances (QA, UAT, Prod) - Required - Dynamics 365 Portal Design and Development (Power Apps Portals) - Required - HTML and JavaScript development - Required - Prior hands on experience using custom code to create and consume Web API/Web Services - Required - Experience with CRM API - Required - Prior experience working with SQL Server 2016 and above (includes stored procedures and queries) - Required - Prior experience with SSRS custom development - Required - SharePoint Online integration of Dynamics 365 - Required - Prior experience meeting with Project Stakeholders, SMEs and Business Users to gather and document as-is and to-be processes and requirements - Required - Prior experience creating and maintaining System Development Life Cycle (SDLC) documentation - Required - Prior experience translating business requirements into functional and technical design documentation - Required - Excellent written and verbal communication skills - Required - Hands on experience with Jira or Azure Dev Ops (ADO) or equivalent tools - Strong plus to have Question 1: Where is the candidate geographically located currently? Question 2: If relocation is needed, will the candidate relocate before start of the project (N/A or Yes are only acceptable answers)? Question 3: Does candidate agree that this position is 3 days a week ON-SITE 8-4:30 physically IN-Office in Trenton, NJ. (2 days remote work) ? Question 4: This position requires that candidates interview IN-PERSON - no requests for remote webcam interviews will be accommodated. Are you fine with this? Location: Hybrid in Trenton, NJ. Type: Long term contract Please send resume to "jobs at etechnovision dot com" with B3439B in Subject for immediate consideration.
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
05/19/2026
Full time
Atlanta, GA Full-Time Hybrid, 3 days in office On-Call Rotation Leapfrog Services is seeking a SOC Security Engineer - Microsoft Defender XDR to help strengthen detection, investigation, response, and remediation across our managed client environments. This is an experienced, hands-on technical role focused on the Microsoft Defender XDR stack, including Defender for Endpoint, Defender for Identity, Defender for Office 365, and related Microsoft security tools. You'll help define workflows, tune detections, improve alert quality, support complex investigations, and build repeatable processes that allow our SOC to scale. This is not a passive alert-monitoring role. We're looking for someone who can step into an evolving environment, separate meaningful risk from noise, and help drive security work from signal to resolution. What You'll Do Own and improve Microsoft Defender deployment and detection standards across managed client environments. Configure, tune, and improve Microsoft Defender XDR, Defender for Endpoint, Defender for Identity, and Defender for Office 365. Identify Defender configuration gaps, incomplete deployments, or configuration drift and help remediate issues. Use Microsoft Defender Advanced Hunting and KQL to investigate suspicious activity, validate detections, and identify threats. Serve as an escalation resource for SOC Analysts when alerts require deeper investigation or response. Help improve the alert pipeline across Microsoft Defender, Arctic Wolf, and client-reported security concerns. Lead complex investigations involving endpoint activity, identity, and authentication signals, email security events, Windows logs, and other available telemetry. Build attack timelines, determine scope and root cause, assess client impact, and support containment, remediation, and long-term prevention. Create clear internal/client-facing documentation and improve SOC playbooks, workflows, and response procedures. Mentor SOC Analysts on alert interpretation, investigation methodology, documentation quality, and use of Defender and Arctic Wolf tools. Participate in the SOC on-call rotation for urgent security incidents and escalations. This is not an entry-level SOC role. This position is for someone with hands-on security experience who can step into an evolving environment, help improve workflows, and operate with appropriate independence. What You'll Bring Hands-on experience with the Microsoft security ecosystem, especially Microsoft Defender XDR and Defender for Endpoint. Experience configuring, tuning, and improving Defender deployments in real environments. Experience using Advanced Hunting and KQL to investigate activity, validate detections, and identify threats. Strong understanding of Windows endpoints, identity-based attacks, email threats, and common attacker techniques. Experience investigating and responding to real security incidents. Experience working with SIEM, MDR, EDR, or similar security monitoring and response platforms. Ability to separate false positives from meaningful risk and recommend appropriate action. Strong written communication skills for technical documentation, incident summaries, and client-facing communication. Ability to operate independently during high-severity incidents while keeping teammates, managers, and stakeholders informed. Comfort working in a multi-client environment with varying configurations, priorities, and risk profiles. Preferred Experience & Certifications Experience working for an MSP, MSSP, or other multi-client security environment. Experience with Arctic Wolf or other MDR platforms. Familiarity with MITRE ATT&CK. Experience with Defender for Identity and Defender for Office 365. Experience creating or improving incident response playbooks. Experience mentoring SOC Analysts or junior security team members. Microsoft security certifications, such as SC-200, AZ-500, or equivalent experience. CompTIA Security+, CySA+, SSCP, CISSP, CISM, or similar security certification. Why Leapfrog? Competitive salary: $80,000-$90,000, based on experience. Comprehensive benefits: medical, dental, vision, life, and disability. Telemedicine and wellness programs. 401(k) with company match. Education/certification reimbursement. Mileage and expense reimbursement, when applicable. Growth opportunities in a service-focused, collaborative culture. About Leapfrog Services Leapfrog Services is a managed IT services and cybersecurity provider serving businesses and nonprofits. Since 1998, we've believed IT should enhance business, not get in the way. We deliver technical expertise with a service-first approach - high-touch, not high-stress. If you want to use your security expertise to protect real organizations, improve how Microsoft Defender XDR is deployed and operated, and help shape a growing SOC, Leapfrog might be the pond you're looking for! Compensation details: 0 Yearly Salary PIc67ff-6910
We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more - in our careers and in our communities. Job Description Summary: The Senior Systems Analyst Epic will play a crucial role in designing, building, testing, deploying, and supporting Epic applications to optimize clinical and operational workflows. This position requires a deep understanding of healthcare workflows, system integration, and project management to ensure the efficient operation of the healthcare system's IT infrastructure. Partners closely with operational leaders and end users to translate business requirements into reliable Epic configuration, integrations, and reporting-supporting safe patient care, efficient revenue cycle operations, and regulatory compliance while achieving Service Level Agreements (SLAs) relative to the supported applications. Provides technical expertise by enforcing the vision of the application and safeguarding the integrity and security of the application environment in collaboration and partnership with architects, tech leads and engineers. Leads process improvement activities related to Application Management for Epic and related third party applications. Responsibilities And Duties: System Analysis and Design: Engage stakeholders to gather and refine requirements, map current-state workflows, and design Epic build that aligns with operational goals and policy. Create and maintain specifications, decision logs, and design documents for clear traceability and change control. Conduct gap analyses to identify configuration or workflow changes needed for upgrades, regulatory changes, or new initiatives. Application Build, Configuration and Deployment: Configure records, master files, and tools (e.g., profiles, rules, security classes, workflows) aligned to approved design. Maintain environment parity and adhere to change management and build naming conventions. Develop and execute unit, integrated, and UAT test plans; log and resolve defects; document test evidence. Validate interfaces, printing, reporting, and downstream workflows; confirm regression coverage in upgrades. Coordinate release management, environment moves, and downtime procedures for upgrades and patches. Provide go-live and post-live hypercare, including rounding, office hours, tip sheets, and at-the-elbow support. Manage service requests and incidents ina timely manner; meet SLAs through robust triage and root-cause analysis. Provide advanced support for (Epic, Workday, Kronos,) and other applications. Collaborate with IT and clinical teams to integrate across IT portfolio with other IT systems (e.g., Epic, 3rd Party Imaging Applications, AI, etc.). Project Management: Manage smaller projects related to system implementations and upgrades. Strong knowledge with various project management approaches, e.g. waterfall, agile. Ability to lead project teams in project methodology. Training and Documentation: Create and maintain comprehensive documentation for system configurations and processes. Mentor junior analysts and provide guidance on best practices. Integration and Data Management: Collaborate with interface teams on HL7, FHIR, PDFs, CCD/CCDA, and other exchange workflows. Partner with analytics teams on Clarity/Caboodle extracts, registries, and operational reporting needs. Ensure data integrity and metric definitions are consistent across modules and stakeholders. Compliance & Risk: Support regulatory readiness (e.g., CMS, Joint Commission), audit needs, and policy alignment. Embed privacy/security controls, including sensitive record handling and audit trails. Contribute to ITIL-aligned incident, problem, change, and configuration management processes. Minimum Qualifications: Bachelor's Degree Additional Job Description: Degree in computer science, Information Technology, Healthcare Administration, or a related field. Minimum of 5-7 years of experience in system analysis and support within a healthcare environment. In lieu of degree, 10 years of experience in system analysis and support within a healthcare environment. SPECIALIZED KNOWLEDGE Required Experience with Epic application(s) and healthcare workflows (clinical, revenue cycle or IT experience). Strong requirements gathering, workflow design, and testing skills. Familiarity with ITIL , change control, SDLC practices, system governance, and waterfall/agile project methodologies. Ability to communicate with clinical, operational stakeholders, and managed service providers and produce clear documentation. Proven track record of managing complex projects and leading cross-functional teams. Preferred Current Epic Certification or Proficiency in one or more relevant module(s) (e.g., HB, PB, Cadence, Referrals, Orders, ClinDoc, Clarity). 3 year s of build Epic build and configuration experience Experience with system integration, HL7, FHIR, and interface testing . Exposure to SQL/Clarity, Caboodle, SlicerDicer , or reporting tools (e.g., Radar, Reporting Workbench). Prior work in patient access, billing, coding, finance , or clinical operations (for respective modules). Previous experience in a leadership or supervisory role. DESIRED ATTRIBUTES ITIL Foundation certification desired not required. Certifications in one of more Epic applications Experience in a large healthcare system or hospital setting. Experience with other healthcare applications and systems. Knowledge of healthcare regulations and compliance standards. Familiarity with cloud computing platforms (e.g., AWS, Azure). Experience with business intelligence and analytics tools. Advanced degree (Master's or higher) in a related field is a plus. Work Shift: Day Scheduled Weekly Hours : 40 Department IS Applications Join us! if your passion is to work in a caring environment if you believe that learning is a life-long process if you strive for excellence and want to be among the best in the healthcare industry Equal Employment Opportunity OhioHealth is an equal opportunity employer and fully supports and maintains compliance with all state, federal, and local regulations. OhioHealth does not discriminate against associates or applicants because of race, color, genetic information, religion, sex, sexual orientation, gender identity or expression, age, ancestry, national origin, veteran status, military status, pregnancy, disability, marital status, familial status, or other characteristics protected by law. Equal employment is extended to all person in all aspects of the associate-employer relationship including recruitment, hiring, training, promotion, transfer, compensation, discipline, reduction in staff, termination, assignment of benefits, and any other term or condition of employment Remote Work Disclaimer: Positions marked as remote are only eligible for work from Ohio .5c143e31-5e48-4549-b2d185386
05/19/2026
Full time
We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more - in our careers and in our communities. Job Description Summary: The Senior Systems Analyst Epic will play a crucial role in designing, building, testing, deploying, and supporting Epic applications to optimize clinical and operational workflows. This position requires a deep understanding of healthcare workflows, system integration, and project management to ensure the efficient operation of the healthcare system's IT infrastructure. Partners closely with operational leaders and end users to translate business requirements into reliable Epic configuration, integrations, and reporting-supporting safe patient care, efficient revenue cycle operations, and regulatory compliance while achieving Service Level Agreements (SLAs) relative to the supported applications. Provides technical expertise by enforcing the vision of the application and safeguarding the integrity and security of the application environment in collaboration and partnership with architects, tech leads and engineers. Leads process improvement activities related to Application Management for Epic and related third party applications. Responsibilities And Duties: System Analysis and Design: Engage stakeholders to gather and refine requirements, map current-state workflows, and design Epic build that aligns with operational goals and policy. Create and maintain specifications, decision logs, and design documents for clear traceability and change control. Conduct gap analyses to identify configuration or workflow changes needed for upgrades, regulatory changes, or new initiatives. Application Build, Configuration and Deployment: Configure records, master files, and tools (e.g., profiles, rules, security classes, workflows) aligned to approved design. Maintain environment parity and adhere to change management and build naming conventions. Develop and execute unit, integrated, and UAT test plans; log and resolve defects; document test evidence. Validate interfaces, printing, reporting, and downstream workflows; confirm regression coverage in upgrades. Coordinate release management, environment moves, and downtime procedures for upgrades and patches. Provide go-live and post-live hypercare, including rounding, office hours, tip sheets, and at-the-elbow support. Manage service requests and incidents ina timely manner; meet SLAs through robust triage and root-cause analysis. Provide advanced support for (Epic, Workday, Kronos,) and other applications. Collaborate with IT and clinical teams to integrate across IT portfolio with other IT systems (e.g., Epic, 3rd Party Imaging Applications, AI, etc.). Project Management: Manage smaller projects related to system implementations and upgrades. Strong knowledge with various project management approaches, e.g. waterfall, agile. Ability to lead project teams in project methodology. Training and Documentation: Create and maintain comprehensive documentation for system configurations and processes. Mentor junior analysts and provide guidance on best practices. Integration and Data Management: Collaborate with interface teams on HL7, FHIR, PDFs, CCD/CCDA, and other exchange workflows. Partner with analytics teams on Clarity/Caboodle extracts, registries, and operational reporting needs. Ensure data integrity and metric definitions are consistent across modules and stakeholders. Compliance & Risk: Support regulatory readiness (e.g., CMS, Joint Commission), audit needs, and policy alignment. Embed privacy/security controls, including sensitive record handling and audit trails. Contribute to ITIL-aligned incident, problem, change, and configuration management processes. Minimum Qualifications: Bachelor's Degree Additional Job Description: Degree in computer science, Information Technology, Healthcare Administration, or a related field. Minimum of 5-7 years of experience in system analysis and support within a healthcare environment. In lieu of degree, 10 years of experience in system analysis and support within a healthcare environment. SPECIALIZED KNOWLEDGE Required Experience with Epic application(s) and healthcare workflows (clinical, revenue cycle or IT experience). Strong requirements gathering, workflow design, and testing skills. Familiarity with ITIL , change control, SDLC practices, system governance, and waterfall/agile project methodologies. Ability to communicate with clinical, operational stakeholders, and managed service providers and produce clear documentation. Proven track record of managing complex projects and leading cross-functional teams. Preferred Current Epic Certification or Proficiency in one or more relevant module(s) (e.g., HB, PB, Cadence, Referrals, Orders, ClinDoc, Clarity). 3 year s of build Epic build and configuration experience Experience with system integration, HL7, FHIR, and interface testing . Exposure to SQL/Clarity, Caboodle, SlicerDicer , or reporting tools (e.g., Radar, Reporting Workbench). Prior work in patient access, billing, coding, finance , or clinical operations (for respective modules). Previous experience in a leadership or supervisory role. DESIRED ATTRIBUTES ITIL Foundation certification desired not required. Certifications in one of more Epic applications Experience in a large healthcare system or hospital setting. Experience with other healthcare applications and systems. Knowledge of healthcare regulations and compliance standards. Familiarity with cloud computing platforms (e.g., AWS, Azure). Experience with business intelligence and analytics tools. Advanced degree (Master's or higher) in a related field is a plus. Work Shift: Day Scheduled Weekly Hours : 40 Department IS Applications Join us! if your passion is to work in a caring environment if you believe that learning is a life-long process if you strive for excellence and want to be among the best in the healthcare industry Equal Employment Opportunity OhioHealth is an equal opportunity employer and fully supports and maintains compliance with all state, federal, and local regulations. OhioHealth does not discriminate against associates or applicants because of race, color, genetic information, religion, sex, sexual orientation, gender identity or expression, age, ancestry, national origin, veteran status, military status, pregnancy, disability, marital status, familial status, or other characteristics protected by law. Equal employment is extended to all person in all aspects of the associate-employer relationship including recruitment, hiring, training, promotion, transfer, compensation, discipline, reduction in staff, termination, assignment of benefits, and any other term or condition of employment Remote Work Disclaimer: Positions marked as remote are only eligible for work from Ohio .5c143e31-5e48-4549-b2d185386
Duration: 12+ Months Job Description: Overall: We are looking for a candidate who can support QCIT operations in a GMP environment, including: Developing and executing periodic validation activities (backup and restore testing, user access reviews, and audit trail reviews) Front-line client support and triage (initial assessment and coordination of repair activities when systems are down) Supporting GxP workstation patching activities Supporting decommissioning activities (for example, final backups and account deactivations) Job Description: The QC IT Application Analyst collaborates with the business and IT teams to provide project support for MA Biologics Operations Site Functions - Quality, Validation and Product Development. The QC IT Application Analyst manages their work with limited oversight- The scope of work includes, but is not limited to the following: Project upgrades from win 7- win 10 Provide oversight of vendor-provided solutions Handle ad-hoc technical requests from both internal and external partners in accordance with projects that are assigned. Work with other Direct team members for descions, and clariffications as needed Must be able to juggle multiple projects and deliverables, and split billing time between projects where needed. Experience with performing design testing of application to help author SDLC documents, including SDCS, URS, FRA, Admin Sop, IQ, IOQ, ATR, Application Data Flow diagrams, etc. Must poses GXP experience with lab equipment. Recommended Experience Service now, Veeva, Trackwise, Active Directory, firewall rules, My Access, NTFS permissions. Excellent written and verbal communication. Applications impacted by upgrades, Idele candidate should have previous experience implementing, and or upgrading. Other application experience can be considered. Vaya Raman 7500 Fast PCR Hiac Particle Counters Maldi-tof Vi-Cell Cell counter Antaris II Waters Andrew + Alliance Education and Experience Requirements More than 5 years relevant IT/business experience, analysis, and documentation of business and technical requirements (required) Experience with software application implementations in GxP environment (required) Bachelor's degree or equivalent in information technology, computer science, engineering, or business administration, Experience in the Pharmaceuticals or Life Sciences industry (preferred) Experience consulting or working in a complex, global matrix organization (preferred) Knowledge of Lean operational techniques (preferred) Key Skills, Abilities, and Competencies IT Technology Skills & Competencies IT Experience deploying and supporting Quality and Manufacturing Systems including Analytical Instruments - Empower, Chromeleon, SOLO VPE, GE Unicorn, Nova Biomedical Bioprofile CDV and Flex2, Roche Cedex, Roche LightCycler 480, FileMaker Pro, Bartender, Charles River EndoScan-V, GE DataPro2, Informait InForm/CC, Lonza WinKQCL, Mettler Toledo LabX, PerkinElmer Asset Genius, Thermo WebAdmin for TruScan RM Analyzer, and various Laboratory desktop applications used in GxP environment Familiarity with Automation systems such as SCADAs, PLCs, DCS, BAS, Historians Experience with Computerized Systems Validation (CSV), 21 CFR Part 11 regulations, and Data Integrity compliance Experience working with ITIL processes in ServiceNow such as Incident Management, Change Management, Problem Management, Asset and Configuration Management (CMDB) Familiarity with following tools and processes - TrackWise - CAPA, Deviation, Change Control Veeva - Document Workflows Familiarity with Operational Excellence and/or Continuous Improvement processes Knowledge and familiarity of following Tools and technologies MS Office 365, MS Visio, MS Project Citrix, Windows Desktop, Windows Server, SQL Databases, LDAP, Group Policy, TCP/IP Networks, Server Virtualization, RDP, Backup and Restore Architectures - 2 Tier, 3 Tier, On-premise, Cloud Physical Demands: Must be able to lift, push, pull and carry up to 30 lbs. In general, the position requires a combination of sedentary work and walking around observing conditions in the facility. About US Tech Solutions: US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit . US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
05/19/2026
Full time
Duration: 12+ Months Job Description: Overall: We are looking for a candidate who can support QCIT operations in a GMP environment, including: Developing and executing periodic validation activities (backup and restore testing, user access reviews, and audit trail reviews) Front-line client support and triage (initial assessment and coordination of repair activities when systems are down) Supporting GxP workstation patching activities Supporting decommissioning activities (for example, final backups and account deactivations) Job Description: The QC IT Application Analyst collaborates with the business and IT teams to provide project support for MA Biologics Operations Site Functions - Quality, Validation and Product Development. The QC IT Application Analyst manages their work with limited oversight- The scope of work includes, but is not limited to the following: Project upgrades from win 7- win 10 Provide oversight of vendor-provided solutions Handle ad-hoc technical requests from both internal and external partners in accordance with projects that are assigned. Work with other Direct team members for descions, and clariffications as needed Must be able to juggle multiple projects and deliverables, and split billing time between projects where needed. Experience with performing design testing of application to help author SDLC documents, including SDCS, URS, FRA, Admin Sop, IQ, IOQ, ATR, Application Data Flow diagrams, etc. Must poses GXP experience with lab equipment. Recommended Experience Service now, Veeva, Trackwise, Active Directory, firewall rules, My Access, NTFS permissions. Excellent written and verbal communication. Applications impacted by upgrades, Idele candidate should have previous experience implementing, and or upgrading. Other application experience can be considered. Vaya Raman 7500 Fast PCR Hiac Particle Counters Maldi-tof Vi-Cell Cell counter Antaris II Waters Andrew + Alliance Education and Experience Requirements More than 5 years relevant IT/business experience, analysis, and documentation of business and technical requirements (required) Experience with software application implementations in GxP environment (required) Bachelor's degree or equivalent in information technology, computer science, engineering, or business administration, Experience in the Pharmaceuticals or Life Sciences industry (preferred) Experience consulting or working in a complex, global matrix organization (preferred) Knowledge of Lean operational techniques (preferred) Key Skills, Abilities, and Competencies IT Technology Skills & Competencies IT Experience deploying and supporting Quality and Manufacturing Systems including Analytical Instruments - Empower, Chromeleon, SOLO VPE, GE Unicorn, Nova Biomedical Bioprofile CDV and Flex2, Roche Cedex, Roche LightCycler 480, FileMaker Pro, Bartender, Charles River EndoScan-V, GE DataPro2, Informait InForm/CC, Lonza WinKQCL, Mettler Toledo LabX, PerkinElmer Asset Genius, Thermo WebAdmin for TruScan RM Analyzer, and various Laboratory desktop applications used in GxP environment Familiarity with Automation systems such as SCADAs, PLCs, DCS, BAS, Historians Experience with Computerized Systems Validation (CSV), 21 CFR Part 11 regulations, and Data Integrity compliance Experience working with ITIL processes in ServiceNow such as Incident Management, Change Management, Problem Management, Asset and Configuration Management (CMDB) Familiarity with following tools and processes - TrackWise - CAPA, Deviation, Change Control Veeva - Document Workflows Familiarity with Operational Excellence and/or Continuous Improvement processes Knowledge and familiarity of following Tools and technologies MS Office 365, MS Visio, MS Project Citrix, Windows Desktop, Windows Server, SQL Databases, LDAP, Group Policy, TCP/IP Networks, Server Virtualization, RDP, Backup and Restore Architectures - 2 Tier, 3 Tier, On-premise, Cloud Physical Demands: Must be able to lift, push, pull and carry up to 30 lbs. In general, the position requires a combination of sedentary work and walking around observing conditions in the facility. About US Tech Solutions: US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit . US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.