Post job

Security Engineer jobs at Check Point Software Technologies

- 3609 jobs
  • Systems Engineer

    Lockheed Martin 4.8company rating

    Orlando, FL jobs

    What We're Doing At Lockheed Martin Rotary and Mission Systems, Training and Logistics Simulation, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and forward-thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training, and education. Do you want to be part of the team that provides training systems for the world's most advanced aircraft - F-35 Joint Strike Fighter? Do you enjoy a dynamic, fast-paced work environment? At Lockheed Martin, we believe that by applying the highest standards of business ethics and forward-thinking, everything is within our reach - and yours as a Lockheed Martin employee. The Work Lockheed Martin Rotary and Mission Systems has an opportunity in Orlando, Florida for a Systems Engineer supporting the F35 Pilot Training Devices Program. As a key member of our Systems Engineering team, you can help us take on the world's most important and complex challenges by providing solutions to a variety of technical problems of moderate scope and complexity. In this important role, you will collaborate with a team of technical professionals and interact with outside customers. The successful candidate will be flexible, motivated, dedicated, detail-focused, team-oriented, and capable of multi-tasking. As a key member of our Systems Engineer team, you will • Perform under general supervision to complete milestones associated with specific projects • Contribute to the creation of design solutions that address complex engineering problems across the full software cycle • Develop operational scenarios, based on the customer's goals and contractual requirements • Develop system requirements and architectures to ensure customer needs and contracts are appropriately translated into the products development cycle • Develop the product design and delivery optimization requirements • Participate as a member of a multi-disciplinary team that represents all capabilities within DevSecOps. The successful candidate will be flexible, motivated, dedicated, detail-focused, team-oriented, and capable of multi-tasking. Note: This position requires a candidate who is a U.S. Citizen and holds a Secret security clearance to start. The role is located at a facility that requires special access. Why Join Us Lockheed Martin offers a continuous learning environment with strong career growth and advancement opportunities over the long-term. As members of the DevOps Organization, engineers will engage in the development of solutions across components of software systems through design, integration, implementation, and support. Keeping up-to-date on emerging technologies and tools will be encouraged. Proficiency may develop in infrastructure, security, software development, database management systems, systems integration, and automation. Joining Lockheed Martin means becoming part of a team that is pushing the boundaries of aerospace technology while making a tangible impact on global defense readiness. You'll work on some of the most advanced training systems in the world, collaborate with top engineering talent, and see your work directly contribute to mission-critical outcomes. Basic Qualifications: - Bachelor's degree in Systems Engineering, Computer Engineering, Electrical Engineering, Applied Mathematics, Physics or related technical field and 2 years of relevant work experience - Experience developing or testing technical system requirements - Experience creating or revising technical system documentation - Active Secret Security Clearance Desired Skills: Individuals considered for this position may have experience in one or more of the following areas: - Working knowledge of Model Based Engineering (MBE), DOORs, Enterprise Architect, Rhapsody - Working knowledge of Agile development and Atlassian tool suite - Experience with Integration and Test, developing/executing test procedures - Experience with aircraft systems, sensors, pilot & maintenance training systems Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret with Investigation or CV date within 5 years Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 4x10 hour day, 3 days off per week Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Systems Engineering: Requirements Development Type: Full-Time Shift: First
    $63k-80k yearly est. 2d ago
  • Acquisition Security Analyst

    Mantech 4.5company rating

    Los Angeles, CA jobs

    MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA. The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle. Responsibilities include but are not limited to: In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy. Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process. Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers. Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI. Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided. Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E. Minimum Qualifications: Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree. 10+ years of related experience with acquisition programs 6+ years of experience with SCI programs. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process. Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation) Preferred Qualifications: 4+ years of experience with SAR program acquisitions desired. Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision. Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $67k-89k yearly est. 1d ago
  • Personnel Security Specialist

    Mantech 4.5company rating

    Los Angeles, CA jobs

    MANTECH seeks a motivated, career and customer-oriented Personnel Security Specialist II to join our team in El Segundo, CA. The Personnel Security Specialist's primary function is to handle personnel security functions in support of the customer's facility and organization. The position will provide day to day PERSEC services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Responsibilities include but are not limited to: Build and Maintain tracking spreadsheets/databases for customer PERSEC activities. Provide support for the security awareness and education programs. Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Government Security Representative. Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions. Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access. Perform data entry and record checks in the Joint Access Database (JADE) and maintain all customer sponsored personnel access information. Receive and/or transmit classified visit requests as necessary to meet customer needs. Minimum Qualifications: Bachelor's degree; an additional 4 years of related experience might be considered for a degree. 6 + years of related experience. 4 + years of relevant SCI or SAP experience. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Clearance Requirements: Current Top Secret Clearance with SCI Eligibility. Eligibility for access to Special Access Program Information. Willingness to submit to a Counterintelligence polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $73k-103k yearly est. 1d ago
  • Systems Engineer

    Mantech 4.5company rating

    Annapolis, MD jobs

    MANTECH seeks a motivated, career and customer-oriented Systems Engineer III to join our team in Annapolis Junction, Maryland. ManTech is currently seeking Systems Engineer III to join our team at Annapolis Junction, MD. We are seeking a Senior Systems Engineer who is a seasoned IT professional responsible for designing, implementing, and a top-level trouble shooter supporting a high-level architecture of an organization's backend infrastructure. You will communicate with other project personnel, Government stakeholders, and senior executives. Responsibilities include but are not limited to: Administer and maintain IT infrastructure by utilizing expert-level knowledge of the Linux operating system, along with deep expertise in server administration, virtualization, and cloud platforms like AWS or Azure, to manage the organization's backend systems. Develop and implement automation solutions through creating scalable automation services using strong scripting and orchestration skills, with proficiency in tools like Python, Bash, and Ansible. Design and manage system architecture by applying systems engineering principles to design, implement, and manage the high-level architecture of the organization's backend infrastructure. Ensure network and system security through a strong understanding of networking and security fundamentals, including TCP/IP, firewalls, and VPNs, to protect the organization's infrastructure. Communicate with stakeholders - Interact directly with government personnel, senior executives, and other project members to discuss technical issues and project status. Provide technical guidance and troubleshooting as a top-level troubleshooter, addressing technical considerations, problems, and issues for both internal teams and government stakeholders. Minimum Qualifications: Bachelor's degree in STEM field or Highschool and 13 years of experience; Associates and 11 years of experience in lieu of degree, a candidate holding a relevant master's degree may be granted 2 years' experience credit for that extra education, a candidate holding a relevant PhD degree may be granted 4 years' experience credit for that extra education. 5 years of position-relevant work experience. DoD 8570.01-m IAT Level II. Strong proficiency in scripting and automation, with hands-on experience in Python, Bash, and an infrastructure orchestration tool like Ansible. Experience in front-end web development to create internal tools and solutions. Proven background as an Orchestration Engineer or in a similar role focused on building scalable automation services. Solid grasp of TCP/IP networking, firewalls, VLANs, and VPNs. Expert-level knowledge of the Linux operating system. Preferred Qualifications: Experience with full-stack development, including creating and interacting with databases and APIs. Knowledge of Infrastructure as Code (IaC) principles, preferably with experience using Terraform. Familiarity with public cloud platforms (AWS, Azure, GCP) and container technologies (Docker, Kubernetes). Proficiency with virtualization platforms such as VMware vSphere or Microsoft Hyper-V. Exceptional troubleshooting and problem-solving skills, with a talent for systematically diagnosing and resolving complex technical issues. A foundational understanding of traditional Systems Administration principles Clearance Requirements: Must have a current/active TS/SCI Physical Requirements: The person in this position must have the ability to perform tasks while stationary 50% of the time at a computer, with specific emphasis on visual acuity for close-range work. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
    $81k-106k yearly est. 2d ago
  • Growth Hacker (Telecommute OK)

    Vt Enterprise 3.8company rating

    Jersey City, NJ jobs

    We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications. SlashDB clients reap between $35K-$75K a year in savings per developer. Learn more about SlashDB at ****************** Job Description This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game. Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills: Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation. Develop and execute lead generation programs Fill calendar with demo and webinar appointments Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle Reach out to industry bloggers, reporters, conferences and meetup organizers Reach out to software consultancies with partnership opportunity Manage website and blog content creation; write content if so inclined Represent the company at trade shows and conferences Add your best idea here: _______________________ Qualifications You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options. Key skills: 1-3 years of overall work experience in a growth, email marketing or product marketing role Know how to measure effectiveness while avoiding over-analyzing Know how not get ripped off on display advertising Know how to avoid pitfalls with affiliate marketing You are a super-connector Bonus skills: Dabbled in software development or participated in such projects Additional Information In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
    $73k-100k yearly est. 9h ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Illinois jobs

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 60d+ ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Illinois jobs

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 9h ago
  • HackerX D&I Virtual Event

    2U Events 4.2company rating

    New York, NY jobs

    Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability. At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same. Benefits & Culture Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms. 2U offers a comprehensive benefits package: Medical, dental, and vision coverage Life insurance, disability and 401(k) Unlimited snacks and drinks Tuition reimbursement program Generous paid leave policies including unlimited PTO Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years! To learn more, visit 2U.com. #NoBackRow
    $83k-115k yearly est. Auto-Apply 60d+ ago
  • Ethical Hacker

    Chiron Technology Services, Inc. 4.2company rating

    Maryland jobs

    Overview Chiron Technology Services, Inc. currently has a Ethical Hacker career opportunity in the Annapolis Junction, MD area. Type: Pipeline Clearance: Top Secret/SCI with Polygraph Capabilities: Exploit common vulnerabilities and misconfigurations with common operating systems, protocols and network security services, assist with procuring, managing, and training for operational infrastructure associated with Red Team Command and Control (C2) Demonstrate experience related to the use of relevant Cyberspace Operation (CO) tools used for the customer mission Research and develop various cyber threat actor Tactics, Techniques, and Procedures (TTPs) and environments to integrate such findings in Opposition Force (OPFOR) threat emulation Utilize relevant Cyberspace Operation tools used for the customer mission. Provide briefings of intrusion set activity to partner organizations and agencies Organizes training for other team members on analysis, tools, or reporting. Serve as a Subject Matter Expert for working groups and meetings with partner organizations and agencies Generates report as required on development efforts. Conducts planning and execution adversarial emulation in cyber exercises Demonstrate experience in communicating with the ability to provide formal documentation of analysis and/or research results Demonstrate experience in analysis of vulnerabilities, Control and Command (C2) frameworks, intrusion sets; interpreting analytical results, writing and briefing skills at a technical/professional level, and managing internal and external customer relations Demonstrate experience working with any of the following C2 frameworks: Cobalt Strike, Metasploit, PoshC2, and/or Mythic Qualifications: Five (5) to eight (8) years of continuous work experience in the Cyber Mission Force (CMF) either working directly or in-support to Cyber Operations A Bachelor's Degree in Computer Science, Information Systems, or a related discipline from an accredited college or university In lieu of the Bachelor's degree, hold one or more of the following accredited certifications: Offsec Certified Professional (OSCP), Offensive Security Experienced Penetration Testers (OSEP), Practical Network Penetration Tester (PNPT), and GIAC Penetration Tester (GPEN). Compensation & Benefits: $180K - $190K /year Medical, dental, and vision insurance Non-matching 401K - You enjoy our support without having to contribute to get it! Basic Life and AD&D Insurance provided at no cost to eligible employees Access to Chiron's catalog of self-paced training courses Two Paid Time Off (PTO)/Retirement Plan Options 10K employee referral bonus program We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address. Chiron Technology Services, Inc. currently has a Ethical Hacker career opportunity in the Annapolis Junction, MD area. Category: Ethical Hacker IV Type: Pipeline Clearance: Top Secret/SCI with Polygraph Capabilities: Exploit common vulnerabilities and misconfigurations with common operating systems, protocols and network security services, assist with procuring, managing, and training for operational infrastructure associated with Red Team Command and Control (C2) Demonstrate experience related to the use of relevant Cyberspace Operation (CO) tools used for the customer mission Research and develop various cyber threat actor Tactics, Techniques, and Procedures (TTPs) and environments to integrate such findings in Opposition Force (OPFOR) threat emulation Utilize relevant Cyberspace Operation tools used for the customer mission. Provide briefings of intrusion set activity to partner organizations and agencies Organizes training for other team members on analysis, tools, or reporting. Serve as a Subject Matter Expert for working groups and meetings with partner organizations and agencies Generates report as required on development efforts. Conducts planning and execution adversarial emulation in cyber exercises Demonstrate experience in communicating with the ability to provide formal documentation of analysis and/or research results Demonstrate experience in analysis of vulnerabilities, Control and Command (C2) frameworks, intrusion sets; interpreting analytical results, writing and briefing skills at a technical/professional level, and managing internal and external customer relations Demonstrate experience working with any of the following C2 frameworks: Cobalt Strike, Metasploit, PoshC2, and/or Mythic Qualifications: Five (5) to eight (8) years of continuous work experience in the Cyber Mission Force (CMF) either working directly or in-support to Cyber Operations A Bachelor's Degree in Computer Science, Information Systems, or a related discipline from an accredited college or university In lieu of the Bachelor's degree, hold one or more of the following accredited certifications: Offsec Certified Professional (OSCP), Offensive Security Experienced Penetration Testers (OSEP), Practical Network Penetration Tester (PNPT), and GIAC Penetration Tester (GPEN). Compensation & Benefits: $180K - $190K /year Medical, dental, and vision insurance Non-matching 401K - You enjoy our support without having to contribute to get it! Basic Life and AD&D Insurance provided at no cost to eligible employees Access to Chiron's catalog of self-paced training courses Two Paid Time Off (PTO)/Retirement Plan Options 10K employee referral bonus program We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.
    $180k-190k yearly Auto-Apply 60d+ ago
  • Information Security Systems Engineer / ISSE (NSWC IHD Code 104)

    EHS Technologies 4.3company rating

    Indian Head, MD jobs

    Apply Description Target Experience: Five (5) years' experience in Cybersecurity and in supporting patching and configuring Windows and Linux operating systems and third-party applications. Specifically, experience with the ACAS platform and hands on experience deploying an ACAS server and troubleshooting issues with each product, as well as the configuration of the application level for internal and customer use. Target Education: Bachelor's level degree in Computer Engineering, Computer Science, or Information Systems, or an equivalent technical degree from an accredited college or university. Applicant must be a US citizen and hold an active DoD Secret security clearance
    $79k-103k yearly est. 60d+ ago
  • Information Security Systems Engineer / ISSE (NSWC IHD Code 104)

    EHS Technologies Corporation 4.3company rating

    Indian Head, MD jobs

    Job DescriptionDescription: Target Experience: Five (5) years' experience in Cybersecurity and in supporting patching and configuring Windows and Linux operating systems and third-party applications. Specifically, experience with the ACAS platform and hands on experience deploying an ACAS server and troubleshooting issues with each product, as well as the configuration of the application level for internal and customer use. Target Education: Bachelor's level degree in Computer Engineering, Computer Science, or Information Systems, or an equivalent technical degree from an accredited college or university. Applicant must be a US citizen and hold an active DoD Secret security clearance Requirements:
    $79k-103k yearly est. 7d ago
  • Sr. Security Researcher

    F5 Networks 4.6company rating

    Chelmsford, MA jobs

    At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. Senior Security Researcher At F5, we make apps faster, smarter, and safer. Come work within the security threat research group in an exciting, fast paced environment. Our team is performing the analysis of the latest security threats, detection and mitigation of our security solutions, as well as pen testing of F5 products. The team works in an intensive environment and is constantly updated with the latest modern technologies. Come and join the best in their field! Position Summary: Being a part of a highly experienced Security Research team, while specializing in web vulnerabilities analysis, threat intelligence and Honeynet projects. The team is handling the research of vulnerabilities and malware, evolving threats analysis, development and updates of attack signatures and product-hacking. Responsibilities: Researching web frameworks and servers to identify and understand emerging threats. Examining and replicating newly disclosed web application vulnerabilities. Focusing on WAF (Web Application Firewall) evasion techniques to preemptively bypass our defenses before hackers can. Creating innovative proof of concept solutions for advanced threats and continuously refining attack signatures, all in collaboration with development teams to enhance the WAF product using our research findings. Gathering web security intelligence from blogs, forums, conferences, and academic papers. Building tools and infrastructure for analyzing attacks. Composing and distributing insights through blogs, reports, and presenting at security conventions. Periodically performing security efficacy assessments on a variety of products, including WAFs, API security solutions, application security scanners, and machine learning models, to verify and improve their defense capabilities. Qualifications: At least 2 years of experience in analyzing real web attacks or web exploitation, with a strong preference for more extensive experience. A deep knowledge of networking fundamentals, the HTTP protocol, web servers, and the inner workings of web applications is essential. Experience in tracking emerging web vulnerabilities in real-time. Experience in building research infrastructure and Python-based tools. Experience with creating and comprehending Regular Expressions for detailed pattern matching and security-related data analysis. In-depth knowledge of security principles, theories, and recognized attack vectors. Experience in creating attack signatures, such as with tools like SNORT. - Advantage Analyzing binary malware and malicious scripts. - Advantage Knowledge in web development (front and back end). - Advantage The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. The annual base pay for this position is: $133,600.00 - $200,400.00 F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change. You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link: ******************************************* . F5 reserves the right to change or terminate any benefit plan without notice. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com). Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
    $133.6k-200.4k yearly Auto-Apply 3d ago
  • Information Security Systems Engineer

    Lancesoft 4.5company rating

    Melbourne, FL jobs

    Role: Information Security Systems Engineer III Pay Rate: $40.00-50.00/hr on W2 Temp to Hire We are searching for talented and experienced Security Engineering professionals to join the Mission Networks Enterprise Security Team as a Level 3 Information Security Systems Engineer (ISSE). •This position is ONSITE at Client offices located in Melbourne, Florida •This role may require weekend, after-hours, or on-call rotations to meet program requirements and/or ongoing program support. •This position may require limited travel in an emergency •This position requires the ability to obtain FAA Public Trust Suitability Security Clearance: Must be able to obtain a Public Trust Key Responsibilities: •Develop and enforce security policies, procedures, and measures in alignment with the program's cybersecurity strategies. •Design, implement, and manage security solutions, including but not limited to firewalls, intrusion detection systems, endpoint protection, and encryption tools. •Develop, maintain and publish technical documentation in accordance with Client Systems Engineering processes. •Act as a Security Support Engineer for State, Federal and commercial customers. •Provide technical guidance and support to less experienced team members. •Stay abreast of the latest security trends, threats, and control technologies. •This position will require weekend, after hours, and on-call support to meet program requirements. Qualifications & Education: •BS/BA (or equivalent) degree in Computer Science, IT Security or STEM related field. o Five or more years of experience in Information Security, Network Engineering, or System Administration •In lieu of a bachelor's degree, a candidate must have ten plus years of Security network or system engineering experience. •Strong understanding of system administration including Windows and Linux operating systems. •Strong knowledge of Cisco network infrastructure, including LAN/WAN, VPNs, routers, and switches. •Strong project engineering experience in security-related environments. •Excellent analytical and problem-solving skills. •Effective communication and interpersonal skills. •Experience with security frameworks (NIST SP800-53, NIST SP800-171, ISO 27001, or FISMA) and risk management methodologies. •The candidate must have the ability to obtain a FAA Public Trust, GSA clearance and Standard Public Trust. PREFERRED TECHNICAL SKILLS •Experience administering Next Generation Firewalls (NGFW) (Fortinet, Cisco, or Palo Alto). •Experience mitigating DDoS floods with on-premise and cloud-based solutions. •Experience deploying Intrusion Detection/Prevention System configurations and providing technical support. •Experience administering Security Information and Event Management (SIEM) infrastructure. •Data Loss Prevention systems configuration, deployment and technical support (Varonis and Manage Engine Audit Plus). •Experience with deployment and administration of Enterprise host intrusion and detections systems (Carbon Black or Sentinel One preferred) Preferred Certifications: •CISSP (Certified Information Systems Security Professional) •CCNA (Cisco Certified Network Associate)
    $40-50 hourly 39d ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Spring, TX jobs

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 9h ago
  • Network Security Analyst with CCIE and Juniper (L2 Support)

    Tekskills 4.2company rating

    Spring, TX jobs

    Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable. Responsibilities - Provide Level 2 support consistent with Network data and voice support models - Provide network based authentication, authorization, and accounting services - Implement and support an 802.1x capable network infrastructure - Understanding of PKI / certificate based authentication - Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance - Generation of custom rule sets for accurate profiling and network placement of client systems - Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform - Experience with Cisco Firewall, VPN, and IPS/ IDS systems - Recommendations of system changes in support of operational needs and system efficiencies - Generation of technology documentation and diagramming with tools such as MS Word and Visio - Ensure network access control systems meet compliance and auditing requirements - Plan network changes - Resolve network problems - Participate in review meetings as required to support network implementation activities - Provide recovery and restoration of the network in event of a disaster or major incident Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools Additional Information All your information will be kept confidential according to EEO guidelines.
    $63k-91k yearly est. 60d+ ago
  • Denver CO_Data Security Analyst_Cisco Certified_Linux exp

    360 It Professionals 3.6company rating

    Denver, CO jobs

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Job Description We are looking to fill a position for Data Security in Denver CO. Qualifications Short Description: Selected person will be responsible to maintain systems to protect data from unauthorized users. Identifies, reports, and resolves security violations. May require a bachelor's degree in area of specialty and at least 1 year or equivalent experience in the field or in a related area. CCNA CCNP+ (security) CCSA (security) Linux Additional Information Webcam interview is acceptable.
    $68k-93k yearly est. 60d+ ago
  • Computer Network Defense Analyst I-IV

    Chiron Technology Services, Inc. 4.2company rating

    Maryland jobs

    Overview Chiron Technology Services, Inc. currently has a Computer Network Defense Analyst career opportunity in the Annapolis Junction area. Clearance: Top Secret/SCI with Polygraph Capabilities: Work on developing and refining secure information systems, implementing design changes to strengthen defense against potential threats Use programming and scripting skills to create automation scripts, analyze data, and support vulnerability testing and mitigation efforts Apply security protocols to maintain secure operations, regularly updating and reinforcing network security practices Run vulnerability assessments and penetration tests to uncover weaknesses in systems and applications, using tools like Nessus and Metasploit Conduct digital forensic investigations to identify the cause and scope of security incidents, analyzing and documenting findings Perform regular reviews to ensure systems meet regulatory standards and information assurance requirements, supporting a compliant security posture Qualifications: A.A. degree with 4-13+ years of experience B.A. degree with 2-11+ years of experience Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) Relevant certs / training would include (but not limited to): Sec+, Net+, CEH, JCAC course Compensation & Benefits: $100K-$219K/ year Medical, dental, and vision insurance Non-matching 401K - You enjoy our support without having to contribute to get it! Basic Life and AD&D Insurance provided at no cost to eligible employees Access to Chiron's catalog of self-paced training courses Two Paid Time Off (PTO)/Retirement Plan Options 10K employee referral bonus program We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.
    $67k-89k yearly est. Auto-Apply 60d+ ago
  • Computer Network Defense Analyst (CNDA)

    Datasync Technologies Inc. 3.3company rating

    Maryland jobs

    PRIMARY RESPONSIBILITIES: Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, CNDAs must have experience in network or system administration. Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. BASIC QUALIFICATIONS UNITED STATES CITIZENSHIP IS REQUIRED. THIS POSITION REQUIRES AN ACTIVE TOP SECRET/SCI WITH POLYGRAPH CLEARANCE. Requires a degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Relevant Certs or Specialized Training would include (but not limited to): JCAC graduate, CEH, CFR, CySA+, GCIH, CNDSP Foreign Language may count toward experience requirements. Recent Interagency Language Roundtable (ILR) scores are required to substantiate proficiency level (e.g. Russian, L 2+ / R3) Excellent written and verbal communication skills are required with the ability to present complex technology into layman terms. Self- motivated, creative, willing to work as a member of a team, organized and able to manage individual schedule. Ability to work in a dynamic environment and non-standard hours when needed NOTE: Training, education, specialized skills, language proficiency can be used in lieu of the number of years experience for all levels
    $69k-93k yearly est. Auto-Apply 60d+ ago
  • Information Security Systems Engineer-Ss

    McLaughlin Research Corporation 4.0company rating

    Philadelphia, PA jobs

    McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division. The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments. Requirements Key Responsibilities Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems. Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series. Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP. Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals. Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements. Required Qualifications Education: BS in Computer Science or relevant field. Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments. Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP. Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial. Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance. Equal Employment Opportunity Statement: McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws. EEO is the Law: Applicants and employees are protected under Federal law from discrimination.
    $74k-100k yearly est. 60d+ ago
  • Information Security Systems Engineer

    Lancesoft 4.5company rating

    Palm Bay, FL jobs

    Systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security. Throughout the lifecycle of system, works closely with customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early, and in a sustainable manner that will allow for the security authorization of the system of interest. Works with systems developers or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products using methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security perimeter and environment while implementing the policies and procedures necessary to monitor and maintain such an environment. Prepares certification and accreditation documentation, using multiple industry standards such as DITSCAP, NIACAP, DCID 6/3, common criteria, and NIST 800-37, to achieve security authorization of supported systems. Represents program security needs, concerns and requirements at customer meetings. Responsibilities: Lead the development and implementation of program protection throughout the System Development Lifecycle. Key tasks include Assessing systems for Critical Program Information Conducting trade studies Developing program protection requirements Implementing security architectures Assessing threats via attack/countermeasure analysis Conducting Verification and Validation activities. Serve as a SME in the area of program protection Draft Program Protection Plans (PPPs), Cybersecurity Strategies, Security Classification Guides (SCGs), and Program Protection Plans Interact with customer to define program protection requirements, solutions, trades, costs, implementation, system impacts, and effectiveness Utilize Risk Management Framework (RMF) accreditation and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body of evidence (BoE) package development. A&A package processing RMF accreditation of Platform IT (PIT) systems NSA Type 1 Certification of cryptographic high assurance devices Experience with NSA High Assurance products and IASRD and SERD requirements Support security engineering activities, including basis of estimate development, requirements development, design, test, configuration management and maintenance of information systems and data Assist program security in the development of policies and procedures for emerging security technologies Support the evaluation, qualification, testing and delivery of security architecture improvement, obsolescence replacement and vulnerability response projects Provide Security Testing and Verification Work is to be accomplished 100% onsite, in a lab environment Required Skills: Bachelor's Degree and a minimum of 12 years of prior relevant ISSE experience. Graduate Degree and a minimum of 10 years of prior related experience. In lieu of a degree, minimum of 16 years of prior related experience. Minimum of Collateral Secret security clearance required Professional experience with RMF (Risk Management Framework) required Must be able to obtain and maintain a DOD 8140 certification (or NIST 800-181), appropriate for the position within 6-months of start Preferred Additional Skills: Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. Active TS/SCI Clearance is highly desired
    $60k-78k yearly est. 39d ago

Learn more about Check Point Software Technologies jobs