Post job

Senior Cyber Security Analyst jobs at ActioNet

- 1571 jobs
  • Acquisition Security Analyst

    Mantech 4.5company rating

    Los Angeles, CA jobs

    MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA. The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle. Responsibilities include but are not limited to: In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy. Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process. Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers. Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI. Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided. Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E. Minimum Qualifications: Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree. 10+ years of related experience with acquisition programs 6+ years of experience with SCI programs. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process. Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation) Preferred Qualifications: 4+ years of experience with SAR program acquisitions desired. Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision. Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $67k-89k yearly est. 2d ago
  • Senior Information System Security Officer

    Mantech 4.5company rating

    Huntsville, AL jobs

    MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Provide liaison support between the system owner and other IS security personnel Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes Minimum Qualifications: Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience. Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $53k-71k yearly est. 5d ago
  • Senior Cyber Security Analyst -(ISSM)

    DNI (Delaware Nation Industries 3.6company rating

    Aiken, SC jobs

    DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC. Requirements Reports to the Chief Information Security Officer (CISO) and Program Manager. Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks. Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise. Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary. Oversee operational information systems security implementation programs. Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization). Oversee ISSOs to ensure they follow established policies and procedures and timelines. Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR. Ensure approved procedures are used for sanitizing and releasing system components and media as necessary. Ensure proper measures are taken when cyber security incident or vulnerability is discovered. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. Manage, maintain, and execute the information security continuous monitoring plan. Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization. Other related tasks as assigned. Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security. Knowledge, Skills, and Abilities: Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required. Excellent written and oral communication skills (writing samples may be requested). Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result. Ability to identify problems, brainstorm and analyze answers, and implement the best solutions. Ability to develop and review security related procedures or processes and reports. Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders. Capable of attending all customer-required meetings and promptly providing responses as requested. Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards. Clearance: Must possess (or be able to obtain) a “Q” level security clearance. Education: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis. Experience: 7+ years in IT security or related field. Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones Certification: Highly desired certifications: Certified Information System Security Professional (CISSP) Certified Information Security Manager (CISM) Benefits Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $75k-102k yearly est. 4d ago
  • Senior Security Architect

    Technogen, Inc. 4.3company rating

    Orange, CA jobs

    Security, Compliance and Audit Readiness: Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies. Provide documentation and evidence for security audits and compliance reviews. Implementation, Operations and Support: Serve as the hands-on engineer for network deployment, upgrades, and incident response. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP). SME Leadership and Staff Development: Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired. Any other activities reasonably related to the foregoing, as assigned by the Client
    $127k-167k yearly est. 2d ago
  • Sr Security Engineer SSO (PingFederate)

    Spectraforce 4.5company rating

    Southlake, TX jobs

    Role: Sr Security Engineer SSO (PingFederate) Location: Southlake, TX and Secondary Locations - Austin, TX or Phoenix, AZ. (Hybrid - Mondays - Thursdays on site and Friday Remote.) Duration: 18+ Months Looking for a Sr Engineer with following skills (5-8 years of experience) PingFederate hands-on experience (Ping Fed, Ping ID, Ping Access). Good troubleshooting skills and ability to work independently. Experience working with docker technologies /Kubernetes Good communication and self-starter HYPR affirm/ password less experience is a plus Monitor new and emerging security threats from various sources. Assist with creating product detection mechanisms based on emerging threats. Working knowledge of Linux, Firewalls, Virtual Private Networking, Intrusion Detection / Prevention and penetration testing. Strong technical track record and hands on experience with many of the following technologies: L2/L3 firewalls, application layer security, Intrusion Detection/Prevention, anti-virus solutions, spyware/malcode tools, DDOS mitigation, traffic profiling/anomaly detection, wireless security, VPN and VoIP security. Ability to troubleshoot through network traces and maintains the highest levels of client assurance and confidence. Bachelor's degree in computer science or equivalent. 2-5 years with Security implementation experience.
    $97k-130k yearly est. 1d ago
  • Staff Blockchain Security Engineer

    Blizzard Entertainment 4.6company rating

    Irvine, CA jobs

    About the Company: Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like World of Warcraft , Overwatch , and Diablo , Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment. The Role: Staff Blockchain Security Engineer Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle. This role requires in-person collaboration two days per week at our Irvine, California headquarters. Key Responsibilities: Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws Advise game development teams on secure blockchain practices and remediation strategies Establish and maintain secure development processes within the blockchain software lifecycle Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks) Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations Minimum Qualifications: 8+ years in application security, Web3 security, or related disciplines Proven experience auditing smart contracts, blockchain protocols, or Web3 applications Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation) Experience with secure key management, wallet systems, or cryptography Familiarity with blockchain security tools such as Slither, Echidna, or similar Scripting or programming experience in Python, C++, JavaScript, or other relevant languages Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams Preferred Qualifications: Experience in formal verification of smart contracts Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems Contributions to blockchain security communities, bug bounty programs, or published research Experience defining and executing long-term blockchain security strategies alongside engineering leadership Why Blizzard? Competitive base salary and discretionary annual bonus Equity opportunities and long-term incentives Comprehensive health, dental, and vision plans 401(k) with company match Paid parental leave and flexible time off A hybrid work model that balances collaboration with flexibility Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards. Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
    $170k-250k yearly 1d ago
  • Cloud Security Engineer

    Pyramid Consulting, Inc. 4.1company rating

    Richmond, VA jobs

    Immediate need for a talented Cloud Security Engineer.This is a 12+ Months contract opportunity with long-term potential and is located in Richmond, VA USA (Onsite) Please review the job description below and contact me ASAP if you are interested. Job Diva ID: 25-95757 Pay Range: $80 - $84/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location). Key Responsibilities: Wiz Platform Deployment & Ownership CSPM, CWPP, CI/CD Integration & Remediation Alerting, Monitoring & Incident Response Integration Remediation, Ownership & Continuous Improvement Cloud Security Engineering & Architecture playbook creation. Leadership, Strategy & Governance Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing. Lead efforts related to designing, planning, enhancing, and testing all Cloud cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies. Analyze information to determine, recommend, and plan the use of new Cloud information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or workload, efficient operation and effective use of allotted resources Lead the implementation of new Cloud security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions. Responsible for technical support of Cloud security technologies providing expert problem analysis and resolution in a timely manner. Creation of CI/CD automation leveraging Terraform for Cloud Security Services and Modules Leads teams or projects with moderate resource requirements, risk, and complexity. Key Requirements and Technology Experience: Key Skills; Cloud Security, AWS/Azure/GCP, Wiz platform Bachelor's degree and eight years of experience in systems engineering or administration or an equivalent combination of education and work experience Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security Previous experience in leading complex IT projects 10+ years Cloud Security experience 6+ years securing AWS/Azure/GCP Deep expertise in Wiz platform Strong experience with CSPM, CWPP, CI/CD security Strong automation and scripting background Experience in Global 100 or Fortune 50 environments Wiz Architect/Practitioner certifications AWS/Azure/GCP security certifications Banking or financial services experience. Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.) Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.) Certification in Information Security Management (e.g. Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) or Certified Information Security Manager (CISM)), or related security certification(s) Our client is a leading Banking Industry , and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. By applying to our jobs, you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
    $80-84 hourly 2d ago
  • Senior Security Systems Engineer

    Data Intelligence, LLC 4.5company rating

    Dahlgren, VA jobs

    Data Intelligence LLC is seeking an experienced Senior Security Systems Engineer to support one of our premier Navy customers in Dahlgren, VA. This role provides advanced cybersecurity engineering and systems security support to U.S. Navy tactical and strategic weapons programs. The successful candidate will lead efforts related to Assessment & Authorization (A&A), Risk Management Framework (RMF) implementation, vulnerability management, and secure systems design for complex afloat and shore-based systems. This position is fully on-site in Dahlgren, VA. This position is contingent upon winning contract award. Key Responsibilities Lead cybersecurity engineering and systems security integration for U.S. Navy programs, with specific focus on tactical combat and Submarine-Launched Ballistic Missile (SLBM) systems. Perform system security engineering in accordance with DoD, DON, and NIST cybersecurity policies, standards, and best practices. Execute the full lifecycle of the Systems Engineering Technical Review (SETR) process, including design, review, and validation activities. Conduct and support Assessment and Authorization (A&A) activities under RMF, ensuring systems achieve and maintain Authorization to Operate (ATO). Manage vulnerability analysis and remediation for critical Navy systems and applications. Develop and maintain System Security Plans (SSPs), Cybersecurity Strategy and Evaluation (CSSE) documentation, and related artifacts. Design and evaluate secure network architectures and system boundaries, incorporating cybersecurity technologies such as: Firewalls, Intrusion Detection/Prevention Systems (IDS/IPS) Routers, Switches, and Cross-Domain Solutions (CDS) Host-Based Security Systems (HBSS) Provide cybersecurity guidance for Platform IT (PIT) systems, supporting both land-based and afloat/tactical environments. Contribute to cybersecurity test planning, Model-Based Systems Engineering (MBSE) integration, and secure software/hardware development. Collaborate with multidisciplinary engineering teams and Navy program offices to ensure compliance with DoD cyber and safety standards. Deliver concise technical presentations and reports to senior leadership and stakeholders. Required Skills/Experience SLBM Programs: Minimum 7 years of direct experience with Submarine-Launched Ballistic Missile (SLBM) systems; OR Other Navy Programs: At least 5 years of program-specific security engineering experience with Navy afloat/tactical combat systems (e.g., Aegis, SSDS, Zumwalt); OR General Experience: 10+ years of general security engineering experience supporting DoD systems. Minimum 5 years of engineering experience on Aegis, SSDS, Zumwalt, or other Navy tactical combat systems (for at least six senior positions on this contract). Demonstrated experience in: Cybersecurity engineering and risk management DoD/Navy Assessment & Authorization (A&A) Vulnerability management across complex networked systems Proven understanding of DoD Cybersecurity policies, RMF, and Platform IT (PIT) implementation. Experience with the SSP Validator Handbook (for SLBM programs). Familiarity with combat weapons systems and afloat/tactical environments. Hands-on experience designing and assessing secure network architectures, cyber boundaries, and defense-in-depth strategies. Experience with cyber testing, test analysis, and secure computing system development. Strong written and verbal communication skills with the ability to brief senior leadership. Certifications (Required) IAT II, IAM II, or higher (e.g., Security+, CASP+, CISSP, or equivalent) NQV certification (desired, if applicable) Security Clearance Active Top Secret Clearance required; eligibility for higher-level access may be necessary based on program needs. Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $102k-139k yearly est. 1d ago
  • Information Security Engineer

    Intraedge 3.9company rating

    Phoenix, AZ jobs

    We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect. 🔐 Key Responsibilities Support endpoint and access security across Windows and mac OS environments. Review and validate privileged access requests using least-privilege principles. Assist in developing and implementing security policies, elevation rules, and device configurations. Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM. Participate in compliance and governance initiatives, including secure analytics and data protection efforts. Prepare clear documentation, meeting updates, and stakeholder communications. Contribute to continuous improvements in cyber engineering and endpoint security. 💡 Ideal Candidate Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM). Strong understanding of access control, least-privilege frameworks, and security best practices. Ability to collaborate with cross-functional teams and communicate effectively. Curious, proactive, and ready to solve complex security problems.
    $80k-104k yearly est. 2d ago
  • Information Security Analyst

    The Judge Group 4.7company rating

    Chandler, AZ jobs

    Our client is currently seeking a Information Security Engineer 3 ***W2 only, No corp to corp - No 1099 - No 3rd party*** Information Security Engineer 3 Schedule: Friday-Monday, 10:30am-8:30pm AZT Contract with potential to convert to full-time Pay: $53-$57 HR Role Overview This role supports the Cyber Threat Fusion Center, specifically covering weekend operations. The consultant will work closely with threat analysts, incident responders, and engineering teams to monitor, investigate, and respond to security events across the enterprise. There is potential for: Full‑time conversion, and Transition to the weekday team if a position opens due to promotion or movement. Core Technical Skills (Required) Splunk - SIEM monitoring, alert triage, dashboarding, log analysis CrowdStrike Falcon - EDR investigation, threat hunting, incident response Nice-to-Have Skills FireEye - Malware and threat analysis Palo Alto XSOAR - Case management and automation workflows NetWitness - Network traffic analysis and packet investigation Experience Requirements 2-3 years working in a Security Operations Center (SOC) or Cyber Threat Fusion Center Hands-on experience with incident response, threat detection, and security monitoring Additional Notes Candidates must be willing to work the Friday-Monday schedule
    $53-57 hourly 4d ago
  • Senior Backend Engineer - Cloud Security

    Droisys 4.3company rating

    Sunnyvale, CA jobs

    About Company, Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction. Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters. We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA What You Will Do Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture. Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors. Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces. Work within a Kubernetes-based service infrastructure, while learning new technologies as needed. Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption. Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems. Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems. Collaborate closely with Product Management to review, refine, and finalize requirements. Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases. What You Bring Bachelor's degree in computer science or similar (Master's preferred). 5+ years of experience building scalable, distributed systems. Passion for software engineering, continuous learning, and working in a collaborative environment. Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level. Experience with networking and/or security concepts is a plus. Experience developing containerized services on Kubernetes is strongly desired. Strong programming experience in Java/Spring Boot or Golang. Experience building or using REST APIs. Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus. Understanding of TCP/IP networking fundamentals. Experience developing in Unix/Linux environments. Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
    $119k-160k yearly est. 1d ago
  • Security Architect

    Technogen, Inc. 4.3company rating

    Santa Ana, CA jobs

    1. Security, Compliance and Audit Readiness a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy. b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies. c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies. d. Provide documentation and evidence for security audits and compliance reviews. 2. Implementation, Operations and Support a. Serve as the hands-on engineer for network deployment, upgrades, and incident response. b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints. c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP). 3. SME Leadership and Staff Development a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations. b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians. c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities. d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff. e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired. 4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
    $120k-170k yearly est. 3d ago
  • Infrastructure & Information Security Architect

    Sigma 4.1company rating

    Industry, CA jobs

    We don't just offer jobs; we cultivate careers. Become part of our dynamic team of professionals and experience what it means to truly be valued. We're passionate about empowering our associates to reach their full potential, fostering growth, and celebrating success together. When you join Sigma, you're stepping into a fast-growing, innovative global food organization that's redefining excellence in the industry. Are you ready to elevate your career? Come join our table! Position Summary Responsible for designing, implementing, supporting and administering the IT infrastructure and information security applications. Analyzes system requirements and defines system architecture that will meet business needs, including server infrastructure, capacity planning, storage requirements and networking protocols. Essential Job Functions Responsible for designing and implementing information systems that will adequately support the infrastructure of the organization. Examines system requirements and system architecture and provides new processes/standards that will meet business needs, including server infrastructure, capacity planning, storage requirements, and networking protocols. Ensures that architecture project roll-outs meet security standards and are effectively integrated with current applications. Completes tasks designed to ensure security of the organization's systems and information assets. Protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Authorize user access and familiar with domain structures and digital signatures. Oversees and guides the work of lower-level IT personnel or other IT teams. Develops, implements and maintains policies, procedures, and programs for ensuring the security and integrity of company data, databases, information systems, and technology. Conducts risk management analysis and creates business continuity, contingency, and disaster recovery plans. Leads the development, update, and execution of Business Continuity Plans for systems and data within Enterprise Data. Develops and executes the testing processes utilized to validate the disaster recovery plans and to identify weaknesses and failure points in the plans. Works on advanced, complex technical projects or business issues. Other duties as assigned. Minimum Qualifications Associate degree in Computer Science, Computer Engineering, Technology, Information Systems or equivalent work experience. Eight years of infrastructure or security architecture. Experience in enterprise and security architecture. Experience on day to day IT operation management. Experience on Data Center environments. License/Certifications: N/A Preferred Qualifications Formal training ITIL, COBIT, or Microsoft certification. Project Management certification. Knowledge, Skills & Abilities (KSA's) Knowledge on consolidation of Active Directory environments on a medium to large company. Strong technical knowledge across infrastructure and security services support. Working understanding of Active Directory structure (e.g. GPOs). Working understanding of Agile and RACU Frameworks. Understand industry threats and the methods to apply appropriate controls. Knowledge of PowerShell and other automation methods. Understanding of server hardening. Proficient with Microsoft Office, including skills with Outlook, Word and Excel. Ability to lead and effectively communicate with technical and non-technical staff across multiple disciplines and levels of the organization. Ability to identify complex problems, review information to develop and evaluate options then implement solutions. Environmental/Working Conditions N/A Physical Requirements Usual office environment with frequent sitting, walking, and standing, and occasional climbing, stooping, kneeling, crouching, crawling, and balancing. Frequent use of eye, hand, and finger coordination enabling the use of office machinery. Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone.
    $122k-167k yearly est. 4d ago
  • Security Architect GCP

    Xoriant 4.4company rating

    Sunnyvale, CA jobs

    Security Architect / Implementation Engineer Duration: 6 Months contract with possibility of extension We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation. Key Responsibilities: Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.). Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights. Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics. Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows. Define use cases, rules, policies, and security playbooks to automate detection and response. Document the solution architecture, design decisions, configuration standards, and integration workflows. Conduct knowledge transfer sessions with security operations and support teams. Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies. Required Skills & Experience: 8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security. Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred). Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring. Hands-on experience in integrating SIEM, XDR, and native GCP security tools. Experience with Terraform, Deployment Manager, or automation frameworks for security deployment. Strong documentation and presentation skills. Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
    $115k-157k yearly est. 2d ago
  • Network Security Lead (Telecom GRC)

    Optomi 4.5company rating

    Chantilly, VA jobs

    Network Security Lead (Telecom Compliance Specialist) - Onsite in Chantilly, VA or Charlotte, NC* Optomi, in partnership with a Fortune 50 company, is looking to add a Network Security Lead to help drive Telecom-related compliance initiatives. The Network Security Lead will help safeguard the National Public Safety Broadband Network for first responders, ensuring robust cybersecurity compliance across a mobility ecosystem (LTE, 5G Core, RAN infrastructure, OSS/BSS systems, mobile apps, and IoT deployable devices). This role starts off as a full-time contract to hire role on W2 (benefits like medical, dental and 401K are offered through Optomi during the contract duration). Required Expertise Telecom & Mobility: LTE, 5G, VoIP; familiarity with 3GPP standards and protocols (SS7, SIGTRAN, Diameter, SIP). Virtualization & Cloud: OpenStack, Docker, Kubernetes; experience with hybrid physical/virtual environments. Security Tools: Vulnerability scanning, EDR, patch management, and monitoring aligned with NIST guidelines. Networking: Proficiency in Wireshark, tcpdump, Cisco IOS, BGP, OSPF, VLANs, QoS. Certifications: CISSP, CISM, CRISC (preferred) Experience with government contracts and mobility security standards (preferred) Knowledge of encryption technologies and zero-trust frameworks (preferred) M.S. in Cybersecurity, Telecommunications, Computer Science, or related field (or equivalent experience) preferred Key Responsibilities Cybersecurity Oversight: Lead compliance and security control validation for FirstNet mobility components, including RAN, Core, and associated management systems. Risk & Compliance Management: Align with regulatory frameworks (3GPP, ETSI, NIST, ISO/IEC 27001) and coordinate internal audits, risk assessments, and incident response processes. Architecture & Governance: Drive zero-trust principles, encryption standards, and identity management across virtualized and cloud-native environments. Vendor Security Assurance: Oversee compliance for mobility vendor products (Ericsson, Nokia, Cisco) supporting RAN and Core functions. Technical Leadership: Evaluate security controls for networking, APIs, and emerging technologies (network slicing, edge computing, AI-driven threat detection). Cross-Functional Collaboration: Partner with engineering and program teams to identify and mitigate cybersecurity gaps during deployments. This role is looking for someone who is able to work fully onsite in either Chantilly, VA or Charlotte, NC*
    $79k-126k yearly est. 5d ago
  • Network Sniffer Analysis

    E Pro Consulting 3.8company rating

    McLean, VA jobs

    E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ****************** We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Job Description Position Title : Network Sniffer Analysis Location : Mclean, VA Length : Full time / Permanent Position Work Status : US Citizen/ Green Card Holder/ EAD (GC) Required Skills • Strong data analysis ability with sniffer, packet, net flow data. • Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications. • Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components. Technologies Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion. Sincerely Yours, Ranjit Technical Recruiter | E*Pro Inc., Work: ************ x (234) Email: [email protected] E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095 Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-115k yearly est. 60d+ ago
  • Network Sniffer Analysis

    E*Pro 3.8company rating

    McLean, VA jobs

    E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ****************** We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Job Description Position Title : Network Sniffer Analysis Location : Mclean, VA Length : Full time / Permanent Position Work Status : US Citizen/ Green Card Holder/ EAD (GC) Required Skills • Strong data analysis ability with sniffer, packet, net flow data. • Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications. • Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components. Technologies Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion. Sincerely Yours, Ranjit Technical Recruiter | E*Pro Inc., Work: ************ x (234) Email: [email protected] E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095 Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-115k yearly est. 5h ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Spring, TX jobs

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 60d+ ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Spring, TX jobs

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 4h ago
  • Sr. Information Assurance Analyst

    Dkw Communications Inc. 4.6company rating

    California jobs

    Come Join Our Team! DKW Communications, Inc. (DKW) is a government contractor providing professional and technical services to various government agencies i.e. defense, law enforcement and security. We are currently looking for an Senior Information Assurance Analyst to join our winning team. The individual hired for this position will provide support for our government customers located in the Greater San Diego area. This is an onsite position. Overview The IA Analyst will support our NAVY SWMFTS contract, and be responsible for duties such as (but not limited to): Collect and maintain data needed to meet system cybersecurity reporting Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. Participate in an information security risk assessment during the Security Assessment and Authorization process. Participate in the development or modification of the computer environment cybersecurity program plans and requirements. Recognize a possible security violation and take appropriate action to report the incident, as required Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. Provide technical documents, incident reports, and findings from computer examinations, summaries, and other situational awareness information to higher headquarters Develop and maintain RMF Assess and Authorize documentation required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS) Run vulnerability assessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM) Qualifications/Requirements MUST have or be able to obtain an active Secret Security Clearance. Minimum of Bachelor's Degree in Computer Science, Information Systems or a relevant technical discipline. An Associate's degree + 3 years of experience may be substituted for degree requirement. 3-5 years of cyber security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of computer/network security mechanisms. Must have an IAT Level II Certification or higher. **All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.**
    $96k-126k yearly est. Auto-Apply 60d+ ago

Learn more about ActioNet jobs