Systems Engineer
Orlando, FL jobs
What We're Doing At Lockheed Martin Rotary and Mission Systems, Training and Logistics Simulation, we are driven by innovation and integrity. We believe that by applying the highest standards of business ethics and forward-thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training, and education.
Do you want to be part of the team that provides training systems for the world's most advanced aircraft - F-35 Joint Strike Fighter? Do you enjoy a dynamic, fast-paced work environment?
At Lockheed Martin, we believe that by applying the highest standards of business ethics and forward-thinking, everything is within our reach - and yours as a Lockheed Martin employee.
The Work
Lockheed Martin Rotary and Mission Systems has an opportunity in Orlando, Florida for a Systems Engineer supporting the F35 Pilot Training Devices Program.
As a key member of our Systems Engineering team, you can help us take on the world's most important and complex challenges by providing solutions to a variety of technical problems of moderate scope and complexity. In this important role, you will collaborate with a team of technical professionals and interact with outside customers. The successful candidate will be flexible, motivated, dedicated, detail-focused, team-oriented, and capable of multi-tasking.
As a key member of our Systems Engineer team, you will
• Perform under general supervision to complete milestones associated with specific projects
• Contribute to the creation of design solutions that address complex engineering problems across the full software cycle
• Develop operational scenarios, based on the customer's goals and contractual requirements
• Develop system requirements and architectures to ensure customer needs and contracts are appropriately translated into the products development cycle
• Develop the product design and delivery optimization requirements
• Participate as a member of a multi-disciplinary team that represents all capabilities within DevSecOps.
The successful candidate will be flexible, motivated, dedicated, detail-focused, team-oriented, and capable of multi-tasking.
Note: This position requires a candidate who is a U.S. Citizen and holds a Secret security clearance to start. The role is located at a facility that requires special access.
Why Join Us
Lockheed Martin offers a continuous learning environment with strong career growth and advancement opportunities over the long-term. As members of the DevOps Organization, engineers will engage in the development of solutions across components of software systems through design, integration, implementation, and support. Keeping up-to-date on emerging technologies and tools will be encouraged. Proficiency may develop in infrastructure, security, software development, database management systems, systems integration, and automation.
Joining Lockheed Martin means becoming part of a team that is pushing the boundaries of aerospace technology while making a tangible impact on global defense readiness. You'll work on some of the most advanced training systems in the world, collaborate with top engineering talent, and see your work directly contribute to mission-critical outcomes.
Basic Qualifications:
- Bachelor's degree in Systems Engineering, Computer Engineering, Electrical Engineering, Applied Mathematics, Physics or related technical field and 2 years of relevant work experience
- Experience developing or testing technical system requirements
- Experience creating or revising technical system documentation
- Active Secret Security Clearance
Desired Skills:
Individuals considered for this position may have experience in one or more of the following areas:
- Working knowledge of Model Based Engineering (MBE), DOORs, Enterprise Architect, Rhapsody
- Working knowledge of Agile development and Atlassian tool suite
- Experience with Integration and Test, developing/executing test procedures
- Experience with aircraft systems, sensors, pilot & maintenance training systems
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 4x10 hour day, 3 days off per week
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Systems Engineering: Requirements Development
Type: Full-Time
Shift: First
Acquisition Security Analyst
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Personnel Security Specialist
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Personnel Security Specialist II to join our team in El Segundo, CA.
The Personnel Security Specialist's primary function is to handle personnel security functions in support of the customer's facility and organization. The position will provide day to day PERSEC services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Responsibilities include but are not limited to:
Build and Maintain tracking spreadsheets/databases for customer PERSEC activities.
Provide support for the security awareness and education programs.
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Government Security Representative.
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions.
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access.
Perform data entry and record checks in the Joint Access Database (JADE) and maintain all customer sponsored personnel access information.
Receive and/or transmit classified visit requests as necessary to meet customer needs.
Minimum Qualifications:
Bachelor's degree; an additional 4 years of related experience might be considered for a degree.
6 + years of related experience.
4 + years of relevant SCI or SAP experience.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a Counterintelligence polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Systems Engineer
Annapolis, MD jobs
MANTECH seeks a motivated, career and customer-oriented Systems Engineer III to join our team in Annapolis Junction, Maryland.
ManTech is currently seeking Systems Engineer III to join our team at Annapolis Junction, MD. We are seeking a Senior Systems Engineer who is a seasoned IT professional responsible for designing, implementing, and a top-level trouble shooter supporting a high-level architecture of an organization's backend infrastructure. You will communicate with other project personnel, Government stakeholders, and senior executives.
Responsibilities include but are not limited to:
Administer and maintain IT infrastructure by utilizing expert-level knowledge of the Linux operating system, along with deep expertise in server administration, virtualization, and cloud platforms like AWS or Azure, to manage the organization's backend systems.
Develop and implement automation solutions through creating scalable automation services using strong scripting and orchestration skills, with proficiency in tools like Python, Bash, and Ansible.
Design and manage system architecture by applying systems engineering principles to design, implement, and manage the high-level architecture of the organization's backend infrastructure.
Ensure network and system security through a strong understanding of networking and security fundamentals, including TCP/IP, firewalls, and VPNs, to protect the organization's infrastructure.
Communicate with stakeholders - Interact directly with government personnel, senior executives, and other project members to discuss technical issues and project status.
Provide technical guidance and troubleshooting as a top-level troubleshooter, addressing technical considerations, problems, and issues for both internal teams and government stakeholders.
Minimum Qualifications:
Bachelor's degree in STEM field or Highschool and 13 years of experience; Associates and 11 years of experience in lieu of degree, a candidate holding a relevant master's degree may be granted 2 years' experience credit for that extra education, a candidate holding a relevant PhD degree may be granted 4 years' experience credit for that extra education.
5 years of position-relevant work experience.
DoD 8570.01-m IAT Level II.
Strong proficiency in scripting and automation, with hands-on experience in Python, Bash, and an infrastructure orchestration tool like Ansible.
Experience in front-end web development to create internal tools and solutions.
Proven background as an Orchestration Engineer or in a similar role focused on building scalable automation services.
Solid grasp of TCP/IP networking, firewalls, VLANs, and VPNs.
Expert-level knowledge of the Linux operating system.
Preferred Qualifications:
Experience with full-stack development, including creating and interacting with databases and APIs.
Knowledge of Infrastructure as Code (IaC) principles, preferably with experience using Terraform.
Familiarity with public cloud platforms (AWS, Azure, GCP) and container technologies (Docker, Kubernetes).
Proficiency with virtualization platforms such as VMware vSphere or Microsoft Hyper-V.
Exceptional troubleshooting and problem-solving skills, with a talent for systematically diagnosing and resolving complex technical issues.
A foundational understanding of traditional Systems Administration principles
Clearance Requirements:
Must have a current/active TS/SCI
Physical Requirements:
The person in this position must have the ability to perform tasks while stationary 50% of the time at a computer, with specific emphasis on visual acuity for close-range work. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
Growth Hacker (Telecommute OK)
Jersey City, NJ jobs
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
Network Security Analyst / Network Engineer/ System Admin
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
Easy ApplyNetwork Security Analyst / Network Engineer/ System Admin
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
Easy ApplyHackerX D&I Virtual Event
New York, NY jobs
Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability.
At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same.
Benefits & Culture
Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms.
2U offers a comprehensive benefits package:
Medical, dental, and vision coverage
Life insurance, disability and 401(k)
Unlimited snacks and drinks
Tuition reimbursement program
Generous paid leave policies including unlimited PTO
Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years!
To learn more, visit 2U.com. #NoBackRow
Auto-ApplyEthical Hacker
Maryland jobs
Overview Chiron Technology Services, Inc. currently has a Ethical Hacker career opportunity in the Annapolis Junction, MD area.
Type: Pipeline
Clearance: Top Secret/SCI with Polygraph
Capabilities:
Exploit common vulnerabilities and misconfigurations with common operating systems, protocols and network security services, assist with procuring, managing, and training for operational infrastructure associated with Red Team Command and Control (C2)
Demonstrate experience related to the use of relevant Cyberspace Operation (CO) tools used for the customer mission
Research and develop various cyber threat actor Tactics, Techniques, and Procedures (TTPs) and environments to integrate such findings in Opposition Force (OPFOR) threat emulation
Utilize relevant Cyberspace Operation tools used for the customer mission. Provide briefings of intrusion set activity to partner organizations and agencies
Organizes training for other team members on analysis, tools, or reporting. Serve as a Subject Matter Expert for working groups and meetings with partner organizations and agencies
Generates report as required on development efforts. Conducts planning and execution adversarial emulation in cyber exercises
Demonstrate experience in communicating with the ability to provide formal documentation of analysis and/or research results
Demonstrate experience in analysis of vulnerabilities, Control and Command (C2) frameworks, intrusion sets; interpreting analytical results, writing and briefing skills at a technical/professional level, and managing internal and external customer relations
Demonstrate experience working with any of the following C2 frameworks: Cobalt Strike, Metasploit, PoshC2, and/or Mythic
Qualifications:
Five (5) to eight (8) years of continuous work experience in the Cyber Mission Force (CMF) either working directly or in-support to Cyber Operations
A Bachelor's Degree in Computer Science, Information Systems, or a related discipline from an accredited college or university
In lieu of the Bachelor's degree, hold one or more of the following accredited certifications: Offsec Certified Professional (OSCP), Offensive Security Experienced Penetration Testers (OSEP), Practical Network Penetration Tester (PNPT), and GIAC Penetration Tester (GPEN).
Compensation & Benefits:
$180K - $190K /year
Medical, dental, and vision insurance
Non-matching 401K - You enjoy our support without having to contribute to get it!
Basic Life and AD&D Insurance provided at no cost to eligible employees
Access to Chiron's catalog of self-paced training courses
Two Paid Time Off (PTO)/Retirement Plan Options
10K employee referral bonus program
We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.
Chiron Technology Services, Inc. currently has a Ethical Hacker career opportunity in the Annapolis Junction, MD area.
Category: Ethical Hacker IV
Type: Pipeline
Clearance: Top Secret/SCI with Polygraph
Capabilities:
Exploit common vulnerabilities and misconfigurations with common operating systems, protocols and network security services, assist with procuring, managing, and training for operational infrastructure associated with Red Team Command and Control (C2)
Demonstrate experience related to the use of relevant Cyberspace Operation (CO) tools used for the customer mission
Research and develop various cyber threat actor Tactics, Techniques, and Procedures (TTPs) and environments to integrate such findings in Opposition Force (OPFOR) threat emulation
Utilize relevant Cyberspace Operation tools used for the customer mission. Provide briefings of intrusion set activity to partner organizations and agencies
Organizes training for other team members on analysis, tools, or reporting. Serve as a Subject Matter Expert for working groups and meetings with partner organizations and agencies
Generates report as required on development efforts. Conducts planning and execution adversarial emulation in cyber exercises
Demonstrate experience in communicating with the ability to provide formal documentation of analysis and/or research results
Demonstrate experience in analysis of vulnerabilities, Control and Command (C2) frameworks, intrusion sets; interpreting analytical results, writing and briefing skills at a technical/professional level, and managing internal and external customer relations
Demonstrate experience working with any of the following C2 frameworks: Cobalt Strike, Metasploit, PoshC2, and/or Mythic
Qualifications:
Five (5) to eight (8) years of continuous work experience in the Cyber Mission Force (CMF) either working directly or in-support to Cyber Operations
A Bachelor's Degree in Computer Science, Information Systems, or a related discipline from an accredited college or university
In lieu of the Bachelor's degree, hold one or more of the following accredited certifications: Offsec Certified Professional (OSCP), Offensive Security Experienced Penetration Testers (OSEP), Practical Network Penetration Tester (PNPT), and GIAC Penetration Tester (GPEN).
Compensation & Benefits:
$180K - $190K /year
Medical, dental, and vision insurance
Non-matching 401K - You enjoy our support without having to contribute to get it!
Basic Life and AD&D Insurance provided at no cost to eligible employees
Access to Chiron's catalog of self-paced training courses
Two Paid Time Off (PTO)/Retirement Plan Options
10K employee referral bonus program
We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.
Auto-ApplyInformation Security Systems Engineer / ISSE (NSWC IHD Code 104)
Indian Head, MD jobs
Apply Description
Target Experience: Five (5) years' experience in Cybersecurity and in supporting patching and configuring Windows and Linux operating systems and third-party applications. Specifically, experience with the ACAS platform and hands on experience deploying an ACAS server and troubleshooting issues with each product, as well as the configuration of the application level for internal and customer use.
Target Education: Bachelor's level degree in Computer Engineering, Computer Science, or Information Systems, or an equivalent technical degree from an accredited college or university.
Applicant must be a US citizen and hold an active DoD Secret security clearance
Information Security Systems Engineer / ISSE (NSWC IHD Code 104)
Indian Head, MD jobs
Job DescriptionDescription:
Target Experience: Five (5) years' experience in Cybersecurity and in supporting patching and configuring Windows and Linux operating systems and third-party applications. Specifically, experience with the ACAS platform and hands on experience deploying an ACAS server and troubleshooting issues with each product, as well as the configuration of the application level for internal and customer use.
Target Education: Bachelor's level degree in Computer Engineering, Computer Science, or Information Systems, or an equivalent technical degree from an accredited college or university.
Applicant must be a US citizen and hold an active DoD Secret security clearance
Requirements:
Sr. Security Researcher
Chelmsford, MA jobs
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.
Senior Security Researcher
At F5, we make apps faster, smarter, and safer. Come work within the security threat research group in an exciting, fast paced environment. Our team is performing the analysis of the latest security threats, detection and mitigation of our security solutions, as well as pen testing of F5 products. The team works in an intensive environment and is constantly updated with the latest modern technologies. Come and join the best in their field!
Position Summary:
Being a part of a highly experienced Security Research team, while specializing in web vulnerabilities analysis, threat intelligence and Honeynet projects. The team is handling the research of vulnerabilities and malware, evolving threats analysis, development and updates of attack signatures and product-hacking.
Responsibilities:
Researching web frameworks and servers to identify and understand emerging threats.
Examining and replicating newly disclosed web application vulnerabilities.
Focusing on WAF (Web Application Firewall) evasion techniques to preemptively bypass our defenses before hackers can.
Creating innovative proof of concept solutions for advanced threats and continuously refining attack signatures, all in collaboration with development teams to enhance the WAF product using our research findings.
Gathering web security intelligence from blogs, forums, conferences, and academic papers.
Building tools and infrastructure for analyzing attacks.
Composing and distributing insights through blogs, reports, and presenting at security conventions.
Periodically performing security efficacy assessments on a variety of products, including WAFs, API security solutions, application security scanners, and machine learning models, to verify and improve their defense capabilities.
Qualifications:
At least 2 years of experience in analyzing real web attacks or web exploitation, with a strong preference for more extensive experience.
A deep knowledge of networking fundamentals, the HTTP protocol, web servers, and the inner workings of web applications is essential.
Experience in tracking emerging web vulnerabilities in real-time.
Experience in building research infrastructure and Python-based tools.
Experience with creating and comprehending Regular Expressions for detailed pattern matching and security-related data analysis.
In-depth knowledge of security principles, theories, and recognized attack vectors.
Experience in creating attack signatures, such as with tools like SNORT. - Advantage
Analyzing binary malware and malicious scripts. - Advantage
Knowledge in web development (front and back end). - Advantage
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.
The annual base pay for this position is: $133,600.00 - $200,400.00
F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change.
You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link:
*******************************************
. F5 reserves the right to change or terminate any benefit plan without notice.
Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com).
Equal Employment Opportunity
It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Auto-ApplyInformation Security Systems Engineer
Melbourne, FL jobs
Role: Information Security Systems Engineer III Pay Rate: $40.00-50.00/hr on W2 Temp to Hire We are searching for talented and experienced Security Engineering professionals to join the Mission Networks Enterprise Security Team as a Level 3 Information Security Systems Engineer (ISSE).
•This position is ONSITE at Client offices located in Melbourne, Florida
•This role may require weekend, after-hours, or on-call rotations to meet program requirements and/or ongoing program support.
•This position may require limited travel in an emergency
•This position requires the ability to obtain FAA Public Trust Suitability
Security Clearance: Must be able to obtain a Public Trust
Key Responsibilities:
•Develop and enforce security policies, procedures, and measures in alignment with the program's cybersecurity strategies.
•Design, implement, and manage security solutions, including but not limited to firewalls, intrusion detection systems, endpoint protection, and encryption tools.
•Develop, maintain and publish technical documentation in accordance with Client Systems Engineering processes.
•Act as a Security Support Engineer for State, Federal and commercial customers.
•Provide technical guidance and support to less experienced team members.
•Stay abreast of the latest security trends, threats, and control technologies.
•This position will require weekend, after hours, and on-call support to meet program requirements.
Qualifications & Education:
•BS/BA (or equivalent) degree in Computer Science, IT Security or STEM related field.
o Five or more years of experience in Information Security, Network Engineering, or System Administration
•In lieu of a bachelor's degree, a candidate must have ten plus years of Security network or system engineering experience.
•Strong understanding of system administration including Windows and Linux operating systems.
•Strong knowledge of Cisco network infrastructure, including LAN/WAN, VPNs, routers, and switches.
•Strong project engineering experience in security-related environments.
•Excellent analytical and problem-solving skills.
•Effective communication and interpersonal skills.
•Experience with security frameworks (NIST SP800-53, NIST SP800-171, ISO 27001, or FISMA) and risk management methodologies.
•The candidate must have the ability to obtain a FAA Public Trust, GSA clearance and Standard Public Trust.
PREFERRED TECHNICAL SKILLS
•Experience administering Next Generation Firewalls (NGFW) (Fortinet, Cisco, or Palo Alto).
•Experience mitigating DDoS floods with on-premise and cloud-based solutions.
•Experience deploying Intrusion Detection/Prevention System configurations and providing technical support.
•Experience administering Security Information and Event Management (SIEM) infrastructure.
•Data Loss Prevention systems configuration, deployment and technical support (Varonis and Manage Engine Audit Plus).
•Experience with deployment and administration of Enterprise host intrusion and detections systems (Carbon Black or Sentinel One preferred)
Preferred Certifications:
•CISSP (Certified Information Systems Security Professional)
•CCNA (Cisco Certified Network Associate)
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Denver CO_Data Security Analyst_Cisco Certified_Linux exp
Denver, CO jobs
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Job Description
We are looking to fill a position for Data Security in Denver CO.
Qualifications
Short Description:
Selected person will be responsible to maintain systems to protect data from unauthorized users. Identifies, reports, and resolves security violations.
May require a bachelor's degree in area of specialty and at least 1 year or equivalent experience in the field or in a related area.
CCNA
CCNP+ (security)
CCSA (security)
Linux
Additional Information
Webcam interview is acceptable.
Computer Network Defense Analyst I-IV
Maryland jobs
Overview Chiron Technology Services, Inc. currently has a Computer Network Defense Analyst career opportunity in the Annapolis Junction area.
Clearance: Top Secret/SCI with Polygraph
Capabilities:
Work on developing and refining secure information systems, implementing design changes to strengthen defense against potential threats
Use programming and scripting skills to create automation scripts, analyze data, and support vulnerability testing and mitigation efforts
Apply security protocols to maintain secure operations, regularly updating and reinforcing network security practices
Run vulnerability assessments and penetration tests to uncover weaknesses in systems and applications, using tools like Nessus and Metasploit
Conduct digital forensic investigations to identify the cause and scope of security incidents, analyzing and documenting findings
Perform regular reviews to ensure systems meet regulatory standards and information assurance requirements, supporting a compliant security posture
Qualifications:
A.A. degree with 4-13+ years of experience
B.A. degree with 2-11+ years of experience
Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
Relevant certs / training would include (but not limited to): Sec+, Net+, CEH, JCAC course
Compensation & Benefits:
$100K-$219K/ year
Medical, dental, and vision insurance
Non-matching 401K - You enjoy our support without having to contribute to get it!
Basic Life and AD&D Insurance provided at no cost to eligible employees
Access to Chiron's catalog of self-paced training courses
Two Paid Time Off (PTO)/Retirement Plan Options
10K employee referral bonus program
We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state, or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at **********************, and let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.
Auto-ApplyComputer Network Defense Analyst (CNDA)
Maryland jobs
PRIMARY RESPONSIBILITIES:
Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
Additionally, CNDAs must have experience in network or system administration.
Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all.
Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
BASIC QUALIFICATIONS
UNITED STATES CITIZENSHIP IS REQUIRED. THIS POSITION REQUIRES AN ACTIVE TOP SECRET/SCI WITH POLYGRAPH CLEARANCE.
Requires a degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant Certs or Specialized Training would include (but not limited to): JCAC graduate, CEH, CFR, CySA+, GCIH, CNDSP
Foreign Language may count toward experience requirements. Recent Interagency Language Roundtable (ILR) scores are required to substantiate proficiency level (e.g. Russian, L 2+ / R3)
Excellent written and verbal communication skills are required with the ability to present complex technology into layman terms.
Self- motivated, creative, willing to work as a member of a team, organized and able to manage individual schedule.
Ability to work in a dynamic environment and non-standard hours when needed
NOTE: Training, education, specialized skills, language proficiency can be used in lieu of the number of years experience for all levels
Auto-ApplyInformation Security Systems Engineer-Ss
Philadelphia, PA jobs
McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.
Information Security Systems Engineer
Palm Bay, FL jobs
Systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security.
Throughout the lifecycle of system, works closely with customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early, and in a sustainable manner that will allow for the security authorization of the system of interest.
Works with systems developers or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products using methods such as encryption technology, vulnerability analysis and security management.
Responsible for integration of multiple methods into a cohesive system security perimeter and environment while implementing the policies and procedures necessary to monitor and maintain such an environment.
Prepares certification and accreditation documentation, using multiple industry standards such as DITSCAP, NIACAP, DCID 6/3, common criteria, and NIST 800-37, to achieve security authorization of supported systems.
Represents program security needs, concerns and requirements at customer meetings.
Responsibilities:
Lead the development and implementation of program protection throughout the System Development Lifecycle. Key tasks include
Assessing systems for Critical Program Information
Conducting trade studies
Developing program protection requirements
Implementing security architectures
Assessing threats via attack/countermeasure analysis
Conducting Verification and Validation activities.
Serve as a SME in the area of program protection
Draft Program Protection Plans (PPPs), Cybersecurity Strategies, Security Classification Guides (SCGs), and Program Protection Plans
Interact with customer to define program protection requirements, solutions, trades, costs, implementation, system impacts, and effectiveness
Utilize Risk Management Framework (RMF) accreditation and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body of evidence (BoE) package development.
A&A package processing
RMF accreditation of Platform IT (PIT) systems
NSA Type 1 Certification of cryptographic high assurance devices
Experience with NSA High Assurance products and IASRD and SERD requirements
Support security engineering activities, including basis of estimate development, requirements development, design, test, configuration management and maintenance of information systems and data
Assist program security in the development of policies and procedures for emerging security technologies
Support the evaluation, qualification, testing and delivery of security architecture improvement, obsolescence replacement and vulnerability response projects
Provide Security Testing and Verification
Work is to be accomplished 100% onsite, in a lab environment
Required Skills:
Bachelor's Degree and a minimum of 12 years of prior relevant ISSE experience. Graduate Degree and a minimum of 10 years of prior related experience. In lieu of a degree, minimum of 16 years of prior related experience.
Minimum of Collateral Secret security clearance required
Professional experience with RMF (Risk Management Framework) required
Must be able to obtain and maintain a DOD 8140 certification (or NIST 800-181), appropriate for the position within 6-months of start
Preferred Additional Skills:
Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC.
Active TS/SCI Clearance is highly desired