Post job

Cyber Security Analyst jobs at Adapt Forward - 49 jobs

  • Cyber Security Engineer I

    Adapt Forward 4.0company rating

    Cyber security analyst job at Adapt Forward

    Security Engineer North Charleston, SC Minimum of a Secret Clearance Required with ability to obtain Top Secret As a Security Engineer you will The SIEM/SOAR Engineer will be responsible for managing and maintaining the CSSP's Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) systems. Position Requirements and Duties: • Design, implement, and maintain the SIEM and SOAR infrastructure (Elastic and Splunk). • Manage and maintain an enterprise Elastic cluster to support SIEM operations for the CSSP. • Monitor and analyze security events and incidents to protect information assets. • Assist in the development and maintenance of use cases, rules, and alerts for threat detection and response. • Integrate SIEM and SOAR systems with other security tools and data sources. • Automate security operations workflows and incident response procedures using SOAR platforms. • Perform regular system monitoring and health checks to ensure the integrity and availability of SIEM and SOAR systems. • Conduct performance tuning, capacity planning, and scalability assessments for SIEM and SOAR solutions. • Implement and manage data ingestion pipelines for security event data. • Perform regular updates, patches, and upgrades for SIEM and SOAR systems. • Create and maintain documentation for system configurations, processes, and standard operating procedures. • Collaborate with security analysts, operations analysts, incident responders, and other CSSP teams to ensure effective use of SIEM and SOAR capabilities. Required Skills: • 3 years of experience in maintaining an enterprise Elastic cluster • Proficiency in managing and maintaining SIEM and SOAR solutions. • Experience with Elasticsearch Enterprise (including Logstash and Kibana) for SIEM operations. • Strong understanding of security event and incident management processes. • Knowledge of scripting languages (e.g., Python, PowerShell) for automation and integration. • Experience with threat detection and response methodologies. • Extensive experience with Linux Administration of RHEL Operating Systems • Strong experience with networking protocols, solutions, and methodologies Minimum Qualifications: • US Citizen • Possess a high school diploma or GED • Available for on-call after-hours rotational support as needed • Position may require up to 25% travel as needed • OCONUS travel may be required Preferred Qualifications: • Experience with other SIEM platforms (e.g., Splunk). • Knowledge of security frameworks and standards (e.g., MITRE ATT&CK, NIST). • Familiarity with network and endpoint security technologies. • Experience with security incident response and digital forensics. Required Certifications: • 8570 IAT Level II Certification • Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), or Elastic Certified Engineer Company Overview Adapt Forward is a cybersecurity solutions provider for some of the nation's most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment. Summary of Benefits Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan. 401k Retirement Plan with Matching Contribution is immediately available and vested. Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses. Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month. Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered. Equal opportunity employer as to all protected groups, including protected veterans and individuals with disabilities. Adapt Forward's Veteran/Disability Affirmative Action Plan narrative section is available for inspection upon request during normal business hours at the Human Resources office and may be requested by contacting Human Resources at *******************.
    $74k-102k yearly est. Auto-Apply 39d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Analyst - Full time must include working one weekend day (Sunday)

    General Dynamics Information Technology 4.7company rating

    Hawaii jobs

    **Req ID:** RQ210177 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity,Event Security,Security Audit,Splunk (Inactive) **Experience:** 8 + years of related experience **US Citizenship Required:** Yes **Job Description:** **Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday)** Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT + Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information. + Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations. + Identify acceptable use policy infractions. + Review event logs to determine events of interest. + Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII). + Prepare case evidence and incident reports. + Work on special projects as assigned. WHAT YOU'LL NEED TO SUCCEED: + Bachelor's Degree and 8+years of relevant experience, equivalent combinations of education, certifications, and experience will be considered. + DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date. + DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date. + Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph + Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems + Saturday and Sunday weekend Day Shift work required. + Willing to work holidays supporting your assigned shift. Location: 100% On Customer Site + Bolling AFB, Washington D.C. + Reston, VA + Colorado Springs, CO + Riverdale, MD + Pearl Harbor, HI + Tampa is available for part time weekend only support GDIT IS YOUR PLACE: + 401K with company match + Comprehensive health and wellness packages + Internal mobility team dedicated to helping you own your career + Professional growth opportunities including paid education and certifications + Cutting-edge technology you can learn from + Rest and recharge with paid vacation and holidays The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most. We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. Join our Talent Community to stay up to date on our career opportunities and events at ******************** Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $61.3-82.9 hourly 48d ago
  • Cyber Intrusion Analyst

    AMS Technologies 4.3company rating

    Hawaii jobs

    AMS Technologies is a leader in providing technological solutions tailored to meet the ever-changing needs of our customers. We pride ourselves on delivering scalable, customer-focused, and cost-effective solutions that drive success in complex environments. Summary As a Cybersecurity Analyst at AMS Technologies, you will play a crucial role in safeguarding our clients' information systems. This position is vital for ensuring the security and integrity of our technological solutions, allowing us to maintain our commitment to excellence and customer satisfaction. PRIMARY RESPONSIBILITIES: Detect, analyze, and respond to computer network incidents by identifying anomalous activities that may pose threats to the enterprise. Monitor security tools and applications for suspicious activity, investigate alerts, and recommend appropriate mitigation strategies. Analyze subtle (“low and slow”) events to uncover unauthorized actions using problem-solving and self-learning techniques. Conduct near real-time event triage and analysis, leading to network traffic validations or incident reporting to Mission Partners. Follow established policies and utilize DoD-approved network monitoring and traffic analysis tools to identify suspicious or malicious traffic around the clock. Review and analyze logs promptly to detect intrusions and formally notify Mission Partners of findings through incident reports. Develop, apply, and fine-tune countermeasures to prevent or reduce cyber event impacts. Perform detailed network traffic analysis using raw packet data, net flow, IDS/IPS, and custom sensor outputs to protect communication networks. Maintain a thorough understanding of attack signatures, tactics, techniques, and procedures used by advanced threats. Document all events and analyses clearly in a ticketing system, requiring strong technical writing skills. Communicate effectively with customers and team members, with regular face-to-face interactions and ongoing coordination. BASIC QUALIFICATIONS: Active DoD Top Secret clearance required. Bachelor's Degree plus 4+ years of relevant experience; relevant cyber courses, certifications, or DISA customer experience may substitute for the degree. Current DoD 8570 IAT Level II Certification (e.g., Security+ CE) or higher at start. Current DoD 8570 CSSP Analyst Certification (e.g., CEH, CySA+), or ability to obtain within 180 days of start. Experience performing Computer Network Defense (CND) duties, including Protect, Defend, Respond, and Sustain. Experience working with DoD and government leadership at multiple levels. Strong knowledge of computing systems and networking, including protocols and security elements like IDS/IPS and firewalls. Experience analyzing packet captures. PREFERRED QUALIFICATIONS: Proficiency in command-line scripting (PERL, Python, Shell) for automating analysis tasks. Understanding of hacker tactics, techniques, and procedures (TTP). Familiarity with security frameworks such as MITRE ATT&CK and Cyber Kill Chain. Experience monitoring intrusion detection systems and defense tools (e.g., Splunk, Elastic) and analyzing associated alerts. Knowledge of advanced threat actor tactics and software exploits. Ability to analyze packed and obfuscated code. If you are passionate about cybersecurity and eager to make a difference in a dynamic environment, we invite you to apply today and join our team at AMS Technologies! Talent @ AMS AMS Technologies Please contact us with any questions: Email: ******************************
    $80k-99k yearly est. Easy Apply 60d+ ago
  • Cyber Sec Analyst - ISSO

    Scientific Research Corporation 4.5company rating

    North Charleston, SC jobs

    The SRC Navy Cryptologic Systems (NCS) Directorate supports a number of US Navy Programs, including the Cryptologic Carry-On Program (CCOP), Ships' Signals Exploitation Equipment (SSEE) Program, and Distributed Common Ground System -- Navy (DCGS-N). We specialize in engineering support, software development, integration, testing, technical writing, Cybersecurity (administration, policy and engineering), production, technical support, warehousing, drafting, repair and management. As an NCS Information Systems Security Officer (ISSO), this position is responsible for supporting the information system owner to complete security assessment, continuous monitoring, and configuration management responsibilities of NCS. Responsibilities include, but are not limited to: Performing monthly compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Collaborative Computing Security Services (CS2) audit files, Secure Content Automation Protocol (SCAP), and McAfee Virus Scan Enterprise, reviewing, documenting, and maintaining all results Verifying patches and virus definitions to the systems using existing automated tools Adhering to predefined configuration management and change management policies and procedures for authorizing software prior to its implementation on systems Ensuring that audit trails (system logs) are reviewed as required; audit records will be maintained for future reference Assessing NCS family of systems in accordance with NIST, NSA and NAVINTEL IA guidance Recommending authorization of systems to the Designated Authorizing Official (DAO) as a certified trusted agent Reporting security incidents in accordance with the command's incident response plan Ensuring systems are operated, used, maintained, and disposed of in accordance with all applicable security policies and practices #LI-LL1 Requirements Must possess an active Top Secret clearance A minimum of five (5) years of cybersecurity experience Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months CE/OS certificate may include Windows or Linux Experience creating complete ATO packages using Risk Management Framework process Experience with eMASS, SSPs, POA&Ms, VRAM, ACAS/Nessus, XACTA, SCAP, SCC Tool, Benchmarks, and STIG Viewer Successfully complete a NCIS Polygraph within one year of employment Developed communication skills and the ability to express thoughts and ideas clearly and concisely Be a team player, dedicated to program support, capable of multitasking and working several complex and diverse tasks with simultaneous or near simultaneous deadlines Be a self-starter who is accountable and requires minimal direction and supervision Be open to new and innovative ideas Must be able to be appointed ISSO for NCS systems within six months of employment Desired Skills Bachelor's degree in information systems, computer science, or similar AWS Certified Cloud Practitioner Ability to create and modify authorization boundary and data flow diagrams using Microsoft Visio Knowledge of container security, ability to assess container hardening per NIST 800-190, experience assessing container hosting environments, and knowledge of container and code analysis tools such as JFrog Xray, Trivy, and SonarQube Knowledge of GovCloud, Navy Cloud policies and DISA Cloud Computing Security Requirements Guide Experience in a Linux environment is preferred Experience with WSUS, YUM Clearance Information SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT. THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL with CI POLY ELIGIBILITY Travel Requirements Up to 20% travel may be required About Us Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients. SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. EEO Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law. Scientific Research Corporation endeavors to make ************** accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact *************** for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $57k-73k yearly est. Auto-Apply 1d ago
  • Cyber Sec Analyst II

    Scientific Research Corporation 4.5company rating

    North Charleston, SC jobs

    The SRC Navy Cryptologic Systems (NCS) Directorate supports a number of US Navy Programs, including the Cryptologic Carry-On Program (CCOP), Ships Signals Exploitation Equipment (SSEE) Program, and Distributed Common Ground System - Navy (DCGS-N). We specialize in engineering support, software development, integration, testing, technical writing, Cybersecurity (administration, policy and engineering), production, technical support, warehousing, drafting, repair and management. As an NCS Trellix Security Engineer (ISSE), this position is responsible for maintaining the Synchro programs' ePO application across multiple enclaves. The ISSE will assist Synchro ISSO with accreditation efforts in support of RMF. Responsibilities include, but are not limited to: Maintaining Synchro's ePO systems across 3 enclaves to include package updates, STIG/security compliance and customer support Assisting ISSO and System Administrators with Synchro accreditation activities Reviewing and remediating POA&M items in an automated manner and provide advice on the impacts of the system changes Providing configuration management (CM) expertise for information system security software, hardware, and firmware Working closely with system ISSOs to maintain operational security posture Providing input to the RMF process activities and related documentation #LI-LL1 Requirements Must possess an active Top Secret/SCI clearance Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate) CE/OS certificate may include Windows or Linux A minimum of two years of experience configuring and managing McAfee/Trellix ePO A minimum of 2 years of experience with cyber security hardening and assessment tools to include DISA STIGs, ACAS, Nessus and Security Content Automation Protocol (SCAP) Must have previous Trellix experience Be a self-starter who is accountable and requires minimal direction and supervision Be open to new and innovative ideas Desired Skills Experience creating complete ATO packages using Risk Management Framework process Experience with eMASS, SSPs, POA&Ms, VRAM, ACAS/Nessus, XACTA, and STIG Viewer Experience in a Linux environment is preferred Clearance Information SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS, A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET LEVEL WITH TOP SECRET / SCI ELIGIBILITY Travel Requirements None About Us Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients. SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. EEO Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law. Scientific Research Corporation endeavors to make ************** accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact *************** for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $57k-73k yearly est. Auto-Apply 1d ago
  • Cyber Security Analyst (Entry to Senior Level) - Hawaii

    Actionet 4.7company rating

    Hawaii jobs

    ActioNet is looking for a Cyber Security Analyst (Entry, Mid Level, or Senior) with an Active Secret Clearance for the Defense Program, located in Hawaii (Joint Base Pearl Harbor Hickam). The Cyber Security Analyst will provide network defense support on site . Start Date Expected: TBD 2025 Salary range: 76-119K Responsibilities Extracts and analyzes network defense data to reconstruct a timeline of events in response to attempted and successful network intrusions. Supports Enterprise incident response and strengthens incident response methodologies. Supports the development of threat detection capabilities. Applies network operations knowledge to predict how networks might be attacked. Provides recommendations for collecting useful threat data, improving the information available to cybersecurity analysts and IT operations personnel. Analyzes large volumes of data, identifies cybersecurity risks, and translates these risks for decision-makers in a clear, understandable manner. Supports protection of intellectual property. Certified Information Systems Security Professional (CISSP) or similar is preferred. Qualifications Bachelor's Degree and at least 12 months of experience for Entry Level Role. Please NOTE: 5+ years of experience considered in Lieu of Degree. Bachelor's Degree and 2-6 years of system administration experience for Mid Level Position. Please NOTE: 5+ years of experience considered in Lieu of Degree. Bachelor's Degree and 10+ years of system administration experience for Senior Level Position. Please NOTE: 5+ years of experience considered in Lieu of Degree. DoD Secret clearance. Department of Defense Directive (DoDD) 8140 / 8570 Certification requirements (CompTIA Security+ CE or equivalent certification. ActioNet is a CMMI-DEV Level 4, CMMI-SVC Level 4, ISO 20000, ISO 27001, ISO 9001, HDI-certified, woman-owned IT Solutions Provider with strong qualifications and expertise in Agile Software Engineering, Cloud Solutions, Cyber Security and IT Managed Services. With 24+ years of stellar past performance, ActioNet is the premier Trusted Innogrator! Why ActioNet? At ActioNet, our Passion for Quality is at the heart of everything we do: We are committed to make ActioNet a great place to work and continue to invest in our ActioNeters We are committed to our customers by driving and sustaining Service Delivery Excellence We are committed to give back to our community, help others and make the world a better place for our next generation ActioNet is proud to be named as a Top Workplace for the ninth year in a row (2014 - 2022). We have 98% of Customer retention rate. We are passionate about the inspirational missions of our customers and we entrust our employees and teams to deliver exceptional performance to enable the safety, security, health and well-being of our nation. What's in It For You? As an ActioNeter, you get to be part of exceptional team and a corporate culture that nurtures mutual success for our customers, employees and our communities. We give you the tools to be successful; all you need to do is bring your best ideas, your energy and a desire to develop your skills, experience and career. Are you ready to make a difference? ActioNet is an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $74k-92k yearly est. Auto-Apply 60d+ ago
  • Computer Network Defense Analyst (CNDA)

    Caci International 4.4company rating

    Wahiawa, HI jobs

    Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local * * * The Opportunity: As cyber threats evolve and proliferate at a rapid pace, CACI is at the forefront of cyber network operations (CNO) and enabling information superiority. We help our customers prepare, defend, and sustain their cyber missions and protect their enterprises against cyber threats. CACI is seeking experienced Computer Network Defense Analysts (CNDAs) to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals. **Responsibilities:** As a Computer Network Defense Analyst (CNDA), you will: + Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. + Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. + Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. + Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. + Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. + Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. + Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. **Qualifications:** + Active TS/SCI with polygraph clearance + STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. Extended military cyber training courses may be counted toward degree requirement. + Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. + Must also have experience in network or system administration. + Documented foreign language proficiency may count toward experience requirements. + Specific labor category determined by years of experience + educational degrees and/or equivalencies. ***NextGen salaries are higher than national reflected average** This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. **________________________________________________________________________________________** **What You Can Expect:** **A culture of integrity.** At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation. **An environment of trust.** CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. **A focus on continuous growth.** Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy. **Your potential is limitless.** So is ours. Learn more about CACI here. (************************************************ **________________________________________________________________________________________** **Pay Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here (***************************************************** . Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $105,100-$231,100 _CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
    $58k-75k yearly est. 60d+ ago
  • Computer Network Defense Analyst (CNDA)

    Caci International Inc. 4.4company rating

    Wahiawa, HI jobs

    Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local * * * The Opportunity: As cyber threats evolve and proliferate at a rapid pace, CACI is at the forefront of cyber network operations (CNO) and enabling information superiority. We help our customers prepare, defend, and sustain their cyber missions and protect their enterprises against cyber threats. CACI is seeking experienced Computer Network Defense Analysts (CNDAs) to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals. Responsibilities: As a Computer Network Defense Analyst (CNDA), you will: * Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. * Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. * Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. * Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. * Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. * Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. * Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications: * Active TS/SCI with polygraph clearance * STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. Extended military cyber training courses may be counted toward degree requirement. * Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. * Must also have experience in network or system administration. * Documented foreign language proficiency may count toward experience requirements. * Specific labor category determined by years of experience + educational degrees and/or equivalencies. * NextGen salaries are higher than national reflected average This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here. Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $105,100-$231,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
    $58k-75k yearly est. 60d+ ago
  • Computer Network Defense Analyst (CCA allowed)

    Link 3.9company rating

    Urban Honolulu, HI jobs

    As a Computer Network Defense Analyst (CNDA), you will: Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications:STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. Extended military cyber training courses may be counted toward degree requirement.Strong understanding with customer policies and workflows Strong understanding in interpreting cyber activity Demonstrative experience w/SIGINT and AMOD (XKS, DX, UTT and others) LEVEL 1: Bachelors Degree + 2 years of experience LEVEL 2: Bachelors Degree + 5 years of experience LEVEL 3: Bachelors Degree + 8 years of experience LEVEL 4: Bachelors Degree + 11 years of experience
    $55k-65k yearly est. Auto-Apply 41d ago
  • Computer Network Defense Analyst (CCA allowed)

    Link, LLC 3.9company rating

    Urban Honolulu, HI jobs

    Job DescriptionAs a Computer Network Defense Analyst (CNDA), you will: Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications:STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. Extended military cyber training courses may be counted toward degree requirement.Strong understanding with customer policies and workflows Strong understanding in interpreting cyber activity Demonstrative experience w/SIGINT and AMOD (XKS, DX, UTT and others) LEVEL 1: Bachelors Degree + 2 years of experience LEVEL 2: Bachelors Degree + 5 years of experience LEVEL 3: Bachelors Degree + 8 years of experience LEVEL 4: Bachelors Degree + 11 years of experience We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $55k-65k yearly est. 11d ago
  • Information Assurance Analyst

    Infojini 3.7company rating

    Columbia, SC jobs

    SCOPE OF THE PROJECT: The SCDHHS Office of Information Assurance (OIA) is charged with ensuring the security and compliance of SCDHHS' information systems and data. OIA seeks experienced consultants to assist with the establishment, implementation, and/or enhancement of information system security and compliance efforts based on Federal, State, and Agency regulatory requirements, policies, standards, and guidelines. Role Summary/Purpose Overview: The IA Analyst will report to the Office of Information Assurance and operate as an experienced information assurance consultant to SCDHHS leadership, business units, business partners, vendors, and other stakeholders. Security Program Experience: Demonstrated work experience and high degree of familiarity with FISMA or NIST Risk Management Framework-based programs is required. Experience and knowledge of MARS-E is preferred. This experience should include documented success in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones. Such experience will necessarily require excellent communication skills with the ability to interview staff and vendors, to review and analyze existing documentation and diagrams, and to create or collect other required supporting documents as appropriate. Experience with integrating RMF and A&A tasks into the System Development Life Cycle (SDLC) is preferred. Experience in security as related to Cloud services and vendor management is desirable for this position. Technical Knowledge: Although this is not a technical position, suitable candidates will have a good working knowledge of a broad range of information technologies such as IBM System 390/zSeries, Linux and Windows servers, database management systems, firewalls, IPS solutions, switching and routing infrastructure, data types and data classifications, and related information technologies and concepts. General Duties and Responsibilities: 1. Assist in the development, implementation, and/or ongoing maturation of SCDHHS security and compliance initiatives. 2. Audit and assess internal agency systems as well as business partner, service provider, and vendor information system security controls. 3. Utilize the Microsoft Office software suite, eGRC system, Bizagi, Atlassian, and other products to document and report on information gathered during audit and assessment activities or other OIA efforts. 4. Participate in third-party audits and/or assessments of agency and business partner systems. 5. Collaborate with agency leadership, business partners, and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts. REQUIRED CERTIFICATION: ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required. EDUCATION PREFERRED: Bachelor's degree in computer science or similar discipline is preferred. 1. Strong working knowledge of FISMA, NIST, and HIPAA Security and Privacy requirements, standards, and guidelines. 2. 5+ years of experience working in the Information Technology field or auditing Information Technology systems or programs. 3. ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required. 4. Documented experience in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones. 5. Ability to work independently and as a member of a team. 6. Ability to multitask and prioritize tasks effectively in order to meet deadlines. 7. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives. 8. Ability to collaborate and coordinate efforts among multiple teams and vendors. 9. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency. 10. Keen attention to detail while maintaining the ability to see the big picture. 11. Ability to absorb, retain, and communicate complex processes. 12. Strong English language skills. 13. Demonstrable understanding of the rules of English grammar and usage. 14. Ability to accept changes and constructive criticism and to remain flexible in dealing with leadership and teams of varying technical and business knowledge. Preferred Requirements/Skills: 1. Bachelor's degree in computer science or similar discipline. 2. Strong working knowledge of CMS MARS-E compliance requirements. 3. Prior experience working with an organization subject to CMS MARS-E requirements. 4. Experience and training with eGRC solutions. 5. Prior Health Information Technology experience. 6. Previous Medicaid experience. 7. Understanding of LEAN and Agile development practices. Additional Information All your information will be kept confidential according to EEO guidelines.
    $53k-70k yearly est. 60d+ ago
  • Senior Information Systems Security Officer (ISSO)

    Sos International LLC 3.9company rating

    Hawaii jobs

    Pearl Harbor, HI, USA Full-time FLSA Status: Exempt Clearance Requirement: Secret Compensation: USD110556 - USD113805 - yearly ** Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. **Job Description** **Join SOSi and Shape the Future of Secure Networks in the Pacific!** SOSi is seeking a **Secret-cleared Senior Information Systems Security Officer (ISSO)** to join our elite team at **Hickam AFB, Hawaii** . We design and deliver **secure, resilient, and innovative network infrastructures** that power **USINDOPACOM's mission** and connect **5,000+ customers across the Pacific theater** . As part of our team, you'll tackle **complex cybersecurity challenges** , architect **unique solutions** , and help deploy a **private cloud platform** that empowers the warfighter. If you're ready to make an impact with cutting-edge technology and ensure the health and security of enterprise systems spanning hundreds of embedded devices, this is your opportunity to lead from the front. **Principal Duties:** + Assist the ISSM in developing and maintaining a formal information system (IS) security program and policies for their assigned area of responsibility. + Provide technical and procedural IS Security advice to engineering team and senior management regarding the RMF process. + Establish and maintain computer systems and networks for classified processing, responsible for administration, maintenance, and security auditing. + Develop and oversee operational information systems security implementation policy and guidelines. + Maintain a repository using eMASS with all security authorizations for IS under their purview. + Coordinate IS security inspections, tests, and reviews. + Ensure proper measures are taken when an IS incident or vulnerability is discovered. + Ensure development and implementation of an effective IS security education, training, and awareness program. + Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification. + Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. + Manage, maintain, and execute the information security continuous monitoring plan. + Ensure records are maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO. + Assess changes to the system, its environment, and operational needs that could affect the security authorization. **Qualifications** **Minimum Requirements** + Active Secret DoD security clearance. + Bachelor's degree in a related field plus 4 years of related experience. + DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP). + Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS). + Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09. + Prior experience with eMASS. + Strong communication skills and ability to coordinate tasks across functional groups. **Preferred Qualifications** + Master's degree in Information Technology or related discipline + Recent experience supporting system authorizations. **Additional Information** **Work Environment:** + Working conditions are normal for an office environment. + Fast paced, deadline-oriented environment. + May require periods of non-traditional working hours including consecutive nights or weekends. + Target Salary Range: $110,556 to $136,257. **Working at SOSi:** All interested individuals will receive consideration and will not be discriminated against for any reason. SOSi is an equal employment opportunity employer and affirmative action employer. All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. SOSi takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.
    $110.6k-136.3k yearly 19d ago
  • Lead Security Engineer - Cyber Security

    Relativity Oda 4.7company rating

    South Carolina jobs

    Posting Type Remote As a Lead Cyber Security Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities. Job Description and Requirements Responsibilities: Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources. Assess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations. Develop and deploy detection and prevention signatures with response actions as part of a layered defensive strategy leveraging multiple technologies and data types. Build automation to search through collected telemetry to detect and isolate advanced threats that evade existing security solutions. Create Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards. Automate incident handling processes. Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment. Serve as a subject matter expert in the mechanism and analysis of observed malicious activity. Clearly document and communicate investigation findings to both technical and executive stakeholders. Identify and automate away technical burden. Build automation to deploy, operate and connect multiple cyber security tools and applications. Preferred Qualifications: 7+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team for Cloud applications and corporate networks Exposure to threat detection development and tuning Experience in software design and development DevSecOps experience Ability to perform threat hunting, threat emulation, and/or purple teaming exercises Familiarity with industry standard security devices and their configuration Experience in reverse engineering malicious code to explore infection and propagation mechanisms Experience with threat intelligence tools and processes Certifications: One or more of the following certifications are preferred (GCFA, GCIA, GCIH, GNFA, GREM, OSCP, OSEP, OSED, OSWE, OSDA, OSCE3, CompTIA Security+, CCNA CyberOps, or CEH) 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Minimum Qualifications: 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Ability to leverage programming and scripting languages to build automations and develop SOAR playbooks Relativity is committed to competitive, fair, and equitable compensation practices. This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives. The expected salary range for this role is between following values: $150,000 and $226,000 The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position. Suggested Skills: Cybersecurity, Infrastructure Security, Network Security, Penetration Testing, Security Architecture Design, Security Audit, Security Information, Security Information and Event Management (SIEM), Security Operations, Vulnerability Management
    $75k-97k yearly est. Auto-Apply 28d ago
  • Security Analyst

    Infojini 3.7company rating

    Columbia, SC jobs

    Infojini Consulting is a full service IT consulting, services, and staffing firm with offices in Linthicum Heights ,Maryland, Washington, DC and Mumbai, India. Infojini Consulting is recognized as one of the fastest growing IT services and software development Companies. With a partnership of all major technology vendors, Infojini Consulting has built a strong Government and commercial customer base including fortune 100 companies and most state and federal agencies such as State of North Carolina, State of South Carolina, State of Maryland, State of California, State of Pennsylvania, State of Virginia, State of Washington and many others. Infojini Consulting is an equal opportunity employer and considers all qualified individuals for employment irrespective of their race, gender, age, color, sexual orientation. We offer an excellent compensation package Job Description We are looking for Security Analyst in Columbia, SC for 7+ Months contract position. Job details mentioned below: Title: Security Analyst Location: Columbia, SC Duration: 7+ months Client: Direct Client RESPONSIBILITIES: Perform computer forensics investigations on Linux, OSX and Microsoft clients and servers following processes defined in the state's established incident response procedure. Work with SOC to identify and document improvements in incident response processes. Disseminate incident response process revisions to stakeholders within the Division of Technology (DT) and state agencies. Validate that security and privacy controls and reporting meet established standards. REQUIRED SKILLS : Expertise with incident response, industry standard forensics tools and processes, and SIEM log and flow correlation Thorough understanding of computer and network operating system fundamentals (e.g. operating systems, applications, storage, networking) In-depth understanding of information security topics related to computers, networks, and software. Excellent written and oral communication skills, including document design principles. PREFERRED SKILLS : Solid understanding of information security incident response processes, including forensic analysis processes. Understanding of triage collections and forensics over the wire in an enterprise environment REQUIRED EDUCATION: Bachelor's degree, plus 4 years of experience in information security. Additional Information
    $52k-64k yearly est. 60d+ ago
  • Security Analyst

    Infojini 3.7company rating

    Columbia, SC jobs

    Infojini Consulting is a full service IT consulting, services, and staffing firm with offices in Linthicum Heights ,Maryland, Washington, DC and Mumbai, India. Infojini Consulting is recognized as one of the fastest growing IT services and software development Companies. With a partnership of all major technology vendors, Infojini Consulting has built a strong Government and commercial customer base including fortune 100 companies and most state and federal agencies such as State of North Carolina, State of South Carolina, State of Maryland, State of California, State of Pennsylvania, State of Virginia, State of Washington and many others. Infojini Consulting is an equal opportunity employer and considers all qualified individuals for employment irrespective of their race, gender, age, color, sexual orientation. We offer an excellent compensation package Job Description: • Perform computer forensics investigations on Linux, OSX and Microsoft clients and servers following processes defined in the state's established incident response procedure. • Work with SOC to identify and document improvements in incident response processes. Disseminate incident response process revisions to stakeholders within the Division of Technology (DT) and state agencies. • Validate that security and privacy controls and reporting meet established standards. PREFERRED SKILLS: • Solid understanding of information security incident response processes, including forensic analysis processes. • Understanding of triage collections and forensics over the wire in an enterprise environment Qualifications REQUIRED SKILLS: • Expertise with incident response, industry standard forensics tools and processes, and SIEM log and flow correlation • Thorough understanding of computer and network operating system fundamentals (e.g. operating systems, applications, storage, networking) • In-depth understanding of information security topics related to computers, networks, and software. • Excellent written and oral communication skills, including document design principles REQUIRED EDUCATION: • Bachelor's degree, plus 4 years of experience in information security. Additional Information
    $52k-64k yearly est. 60d+ ago
  • Security Analyst

    Infojini 3.7company rating

    Columbia, SC jobs

    Scope of the project: The division of information security is tasked with ensuring compliance with state guidelines. This position will be performing those services including: • Supporting agencies during their development of the information security program with direct tactical implementation assistance. • Developing and tracking agency information security implementation plans • Interviewing administrators, managers, and third parties to aid in development of program artifacts • Ensuring high-level assessments of agencies infosec work to ensure progress is made • Providing high-level analysis of process and procedures work to ensure compliance with state standards Daily duties / responsibilities: This implementation assistance would include, but is not limited to: • Interviewing business and technical owners to determine policies and procedures used for each agency process • Developing and tracking infosec implementation plan progress • Documenting information gathered during both interviews and document reviews to assist with developing formal process and procedures • Assessing agency documentation to ensure adequate approaches are used to comply with controls • Facilitating agency status reporting • Collaborating with agencies to provide recommendations for compliance required education/certifications: 10+ years of experience in information security and compliance experience certifications: CISA or CISSP or CISM or GSLC or equivalent Required skills (rank in order of importance): • Have completed an information security plan or system security plan workbook • Prior experience working with fisma standards • Must have a strong working knowledge of NIST 800-53 • Prior experience POA&M or CAP • Strong communication experience Preferred skills (rank in order of importance): • Simultaneously manage multiple Infosec work efforts • Strong schedule management and resource planning skills • Ability to work at a high-volume and fast pace • Strong collaborator and strong ability to meet deadlines • Knowledge of IRS 1075, HIPAA, CJIS, MARS-E, and/or PCI-DSS • Ability to identify, map, and re-engineer business processes Additional Information All your information will be kept confidential according to EEO guidelines.
    $52k-64k yearly est. 60d+ ago
  • Information System Security Officer Mid-Level

    Bae Systems 4.7company rating

    Columbia, SC jobs

    Designs, tests and implements security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. **Required Education, Experience, & Skills** Typically a Bachelor's Degree and 8 years work experience or equivalent experience **Preferred Education, Experience, & Skills** Experience with either CSAM or JCAM **Pay Information** Full-Time Salary Range: $95106 - $161680 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business considerations, local market conditions, and internal equity, as well as candidate qualifications, such as skills, education, and experience. Employee Benefits: At BAE Systems, we support our employees in all aspects of their life, including their health and financial well-being. Regular employees scheduled to work 20 hours per week are offered: health, dental, and vision insurance; health savings accounts; a 401(k) savings plan; disability coverage; and life and accident insurance. We also have an employee assistance program, a legal plan, and other perks including discounts on things like home, auto, and pet insurance. Our leave programs include paid time off, paid holidays, as well as other types of leave, including paid parental, military, bereavement, and any applicable federal and state sick leave. Employees may participate in the company recognition program to receive monetary or non-monetary recognition awards. Other incentives may be available based on position level and/or job specifics. **Information System Security Officer Mid-Level** **119224BR** EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression
    $52k-72k yearly est. 11d ago
  • Information Systems Security Officer TS/SCI with Poly REQUIRED

    CGI Group Inc. 4.5company rating

    Columbia, SC jobs

    Seeking an Information Systems Security Officer (ISSO) with a proven track record of DevSecOps success to include a combination of technical skills, communication skills, and cybersecurity skills. is located in Columbia, MD. Your future duties and responsibilities: . Ensure the implementation and maintenance of security controls in accordance with RMF v5 . Manage ATO packages . Draft security documentation including Operating Procedures, Cybersecurity Strategy (CSS), System Security Plans (SSP) ATO packages as well as System Security and Privacy Plan (SSPP) in accordance with DoD policies, Department of Airforce (DAF) regulations and our Federal Government customer's guidance. . The candidate must have expert knowledge and demonstrated experience with cybersecurity technologies, risk management, and incident response procedures as well as have a solid working understanding of computer functions, including hardware, software, and operating systems. This includes knowledge of Windows, Unix, and Linux operating systems, along with other applications such as databases, web servers, networking technologies, including routing, switching, and VPNs. . The ISSO must be able to work autonomously, manage their workload effectively, shift priorities with little to no loss of productivity and communicate effectively with technical and non-technical personnel. Required qualifications to be successful in this role: . Bachelor's degree and 8+ years of experience, or Master's Degree and 6+ years of experience, or PhD and 3+ years of experience. A degree should be within one of the following fields: Information Technology, Computer Science, Cybersecurity, Information Systems, Data Science, or Software Engineering. However, an additional 4 years of relevant experience may be considered in lieu of a Bachelor's degree. . Well-versed in best practices for cyber security program standards, processes, and procedures compliance, industry-standard security frameworks and demonstrated expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity Program Management. . Ability writing security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts. . Expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.). . Ability to use eMASS to execute, RMF v5 to include document / update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce report and track Plan of Action and Milestone (POA&M) due dates, etc. . The ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance. . Ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers. . Ability to conduct risk assessments, monitor security Incidents and respond appropriately to Security Threats. . Working understanding of network technology (includes knowledge of network protocols Desired qualifications/non-essential skills required: . Experience transitioning from RMF v4 to v5. . Experience with cloud computing platforms such as AWS and Azure. . Basic understanding of identity and access management system capabilities and configuration. . Experience with TASKORDS, OPORDS, etc. . Experience leading Cybersecurity (ISSO & ISSE) teams. CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $79,600.00 - $194,000.00. CGI Federal's benefits are offered to eligible professionals on their first day of employment to include: . Competitive compensation . Comprehensive insurance options . Matching contributions through the 401(k) plan and the share purchase plan . Paid time off for vacation, holidays, and sick time . Paid parental leave . Learning opportunities and tuition assistance . Wellness and Well-being programs #CGIFederalJob #LI-LB1 #ClearanceJobs Skills: * CompTIA Security+ * Network * TCP/IP What you can expect from us: Together, as owners, let's turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you'll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That's why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company's strategy and direction. Your work creates value. You'll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You'll shape your career by joining a company built to grow and last. You'll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team-one of the largest IT and business consulting services firms in the world. Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, pregnancy, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status or responsibilities, reproductive health decisions, political affiliation, genetic information, height, weight, or any other legally protected status or characteristics to the extent required by applicable federal, state, and/or local laws where we do business. CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_******************. You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned. We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members. All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements, and in accordance with applicable laws, some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.
    $56k-78k yearly est. 15d ago
  • Security Analyst

    Avani Technology Solutions 3.9company rating

    Mount Pleasant, SC jobs

    Job Title : Security Analyst Duration : 12+ Months Job Description: Daily Duties / Responsibilities: 1. Configure, optimize, AND MAINTAIN current security tools to include network and server monitors as well as vulnerability scanners and Intrusion detection. 2. Review firewall reports and create reports of attack methods and their risk to the agency. 3. Create Sit-rep reports for management. 4. Rework our vulnerability scanning tools to better allow us to identify risk. Required Skills: • Nessus vulnerability scanner • Forescout • Configuration and maintenance • Vulnerability analysis and remediation methods • Data classification and management tools • Incident handling experience • SIEM experience - IBM Qradar • Security policy and procedures Required Education: Prefer Bachelor's Degree in Information Technology related discipline with 3 years of experience or minimum 5 years related experience. Required Certifications: Not required but Security certifications will be factored in the selection process Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-68k yearly est. 60d+ ago
  • Security Analyst

    Avani Technology Solutions 3.9company rating

    South Carolina jobs

    Daily Duties / Responsibilities: 1. Configure, optimize, AND MAINTAIN current security tools to include network and server monitors as well as vulnerability scanners and Intrusion detection. 2. Review firewall reports and create reports of attack methods and their risk to the agency. 3. Create Sit-rep reports for management. 4. Rework our vulnerability scanning tools to better allow us to identify risk. Required Skills: • Nessus vulnerability scanner • Forescout • Configuration and maintenance • Vulnerability analysis and remediation methods • Data classification and management tools • Incident handling experience • SIEM experience - IBM Qradar • Security policy and procedures Required Education: Prefer Bachelor's Degree in Information Technology related discipline with 3 years of experience or minimum 5 years related experience. Required Certifications: Not required but Security certifications will be factored in the selection process Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-68k yearly est. 1h ago

Learn more about Adapt Forward jobs

Most common jobs at Adapt Forward