Post job

Information Systems Security Officer jobs at COLSA - 625 jobs

  • Senior Security Engineer

    Ladder 4.4company rating

    Palo Alto, CA jobs

    Senior Security Engineer (Must have 3-5 years exp, Google SecOps & Security Command Center Enterprise) About Ladder We saw a problem within the life insurance industry: getting covered took too long, involved too much paperwork, and required too many in-person meetings with sales agents. Having lost his father at a young age, our CEO, Jamie, was determined to make it easier for people to get the coverage they needed to provide for their families. So, we got to work. We developed a method of real-time underwriting leveraging AI and, in doing so, reduced the months-long process of applying for life insurance to minutes. Our digital experience is quick (instant decisions!), loved by users (check out our Trustpilot or Google reviews) and prolific ($74 billion+ in coverage provided). About the role We're looking for a Senior Security Engineer to help us build out our monitoring and detection capabilities. Please note, this can be a hybrid role based in our Palo Alto headquarters or a remote role based role in one of the 23 States Ladder is currently hiring in - AZ, CA, CO, CT, FL, GA, IA, KS, MA, MD, MN, NC, NH, NJ, NV, NY, OH, OR, PA, TX, VA, WA, WI. Please note, Ladder is not currently sponsoring or transferring OPT or H1-B visa's. What You'll Do Improve ongoing monitoring and detection capabilities by adding data sources, creating detections, and building workflows in Google SecOps and Security Command Center Enterprise Ensure we are protected against the latest threat by staying current on emerging security threats and actively monitoring various threat intelligence sources for latest trends, campaigns, and adversary TTPs Collaborate with our Engineering and Product teams via threat modeling and design reviews Help secure our Googlebased corporate and production environments Assist IT in manage our SaaS applications and make sure people have access to what they should and not more Iterate on cloud, network, application, personnel, and device security Assess and secure internal and external applications, APIs, and CI/CD processes Assist with SOC2 and compliance program control implementation Triage alerts and respond to security incidents Collaborate with peers and stakeholders across the company to ensure our customers are protected as best as possible at all times Who You Are 3-5 years of experience in information security, with a strong focus on application security and/or detection engineering 1-2 years of experience in information technology Working knowledge of secure coding practices, application security frameworks, and common vulnerabilities OSCP, HTB-CPTS, PNPT, eCPPTv2, or equivalent training/certs Apple workstation security experience Familiarity with Google Cloud Platform, Datadog, Google SecOps (Chronicle), JAMF Protect, etc Passion for building security tooling to enhance and automate security processes Contributions to open-source projects or communities Experience in securing AI/ML models and pipelines What We Offer Whether you work in our beautiful office in Palo Alto or remotely, Ladder is highly collaborative and fun. To support you in your role, we offer fantastic perks and benefits that reflect our mission of care and support, including: Excellent medical, dental, and vision coverage | We offer competitive healthcare and dental plans for you and your family. Flexible paid time off | Take the time that you need to rest and recharge, including our week-long winter holiday closure. Stock options | We offer competitive stock option packages to participate in the success of building Ladder. A rewarding 401k match program | We'll match up to 4% of your contributions as you save for your retirement goals. Commuter benefits | When you work from the office, you will receive pre-tax benefits for your commute and free parking. A stocked, beautiful new office | Located in downtown Palo Alto, our office was specifically designed to accommodate all working styles. We've invested in technology to support our hybrid team, plus we provide office snacks and catered lunches so that team members can work well and have fun together. Paid parental leave | We think it's crucial that new parents have time to adjust to their new lives without worrying about work, so we provide all parents inclusive of birthing, adoption, or fostering ten weeks of paid baby bonding. Work-from-home flexibility and support | We recognize that everyone's homelife is different and support remote and hybrid work. Upon joining, we provide a one‑time $500 remote office stipend for all team members and then a monthly $150 stipend to cover WFH costs such as the internet. Fun company-wide events | Whether we work locally or remotely, we genuinely enjoy spending time together. That's why we plan fun virtual and in‑person events to let loose and laugh. The base pay range targeted for this position is $140,000.00 - $184,000.00 per year. Base pay is determined by market location and may vary depending on job‑related knowledge, skills, and experience. This role is eligible for equity and benefits as shared above. Voluntary Self-Identification For government reporting purposes, we ask candidates to respond to the below self‑identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file. Voluntary Self-Identification of Disability Form CC-305 Page 1 of 1 OMB Control Number 1250-0005 Expires 04/30/2026 Why are you being asked to complete this form? We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years. Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at ****************** How do you know if you have a disability? A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to: Alcohol or other substance use disorder (not currently using drugs illegally) Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS Blind or low vision Cancer (past or present) Cardiovascular or heart disease Celiac disease Cerebral palsy Deaf or serious difficulty hearing Diabetes Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders Epilepsy or other seizure disorder Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome Intellectual or developmental disability Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD Missing limbs or partially missing limbs Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports Nervous system condition, for example, migraine headaches, Parkinson's disease, multiple sclerosis (MS) Neurodivergence, for example, attention‑deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities Partial or complete paralysis (any cause) Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema Short stature (dwarfism) Traumatic brain injury Public burden statement: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete. EEO Statement Ladder is building a diverse team of talented and enthusiastic people. We are an equal opportunity workplace. At Ladder, differences are celebrated and supported to benefit our people, products, and community. Let us know why you're interested in this position and what unique contributions you can make to the Ladder team. We look forward to hearing from you. Interested in building your career at Ladder? Get future opportunities sent straight to your email. #J-18808-Ljbffr
    $140k-184k yearly 4d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Senior Cloud Security Engineer: SecOps & Detections

    Ladder 4.4company rating

    Palo Alto, CA jobs

    A technology company is seeking a Senior Security Engineer to enhance its security monitoring and detection processes. This role requires 3-5 years of experience in information security, focusing on application security and detection engineering. Candidates will work collaboratively, ensuring the protection of corporate environments. The position offers flexibility to work from the office in Palo Alto or remotely across multiple states. Excellent benefits include competitive healthcare, stock options, and a supportive work environment. #J-18808-Ljbffr
    $143k-189k yearly est. 4d ago
  • Senior Digital Assets Security Architect - Payments & Crypto

    Early Warning Services LLC 4.7company rating

    San Francisco, CA jobs

    * Collaborates closely with Engineering leaders, Architecture, Security, and external partners* Minimum 15+ years of software engineering experience* Minimum 10+ years of leading efforts or processes in a Technology organization, with deep experience architecting or scaling payment systems, digital asse* Demonstrated experience with payment networks, FX, liquidity, and reconciliation systems* Experience with smart contract design, auditing, threat models, and security best practices**CURRENT EMPLOYEES: Apply for open positions via Job Hub in your Workday Account.** for an assistance request.E-Verify***.***## Privacy Notice***Effective:** May 2, 2025*This privacy notice is intended to inform California residents of the personal information we collect, how it's used and disclosed, and the rights you have in regard to such information.Click below for the full privacy notice #J-18808-Ljbffr
    $129k-170k yearly est. 3d ago
  • Firmware Security Engineer: 25-07341

    Akraya, Inc. 4.0company rating

    Seattle, WA jobs

    Primary Skills: Chips Security (Expert), Cryptography (Proficient), C++ (Advanced), Hardware Security (Intermediate), Embedded Systems (Intermediate) Contract Type: W2 Duration: 12 months with possible extension Pay Range: $105.00 - $120.00 per hour #LP Job Summary: We are seeking a highly skilled Security Engineer IV to join our Devices and Services Security team, dedicated to ensuring the security integrity of hardware for emerging products. This position will focus on hardware security assessments, secure boot implementations, and cryptography to protect the privacy and integrity of our devices. The ideal candidate will work closely with third-party manufacturers to update and assess designs, ensuring compliance and protection against vulnerabilities. Key Responsibilities: Conduct hardware security assessments and audits of emerging products. Design and implement secure boot solutions for embedded systems. Utilize expertise in cryptography to enhance device security. Collaborate with third-party manufacturers to ensure secure and compliant designs. Analyze and assess hardware security architectures and debug interfaces. Must-Have Skills: Bachelor's degree in Computer Engineering, Computer Science, or related technical field 5+ years of experience in hardware security, embedded systems security, or similar Experience programming in at least one modern language such as C, C++, or Rust Strong knowledge of secure boot implementations, cryptography (RSA, AES, HMAC, PQC), and hardware security architectures (e.g. ARM TrustZone or Client SGX) ABOUT AKRAYA Akraya is an award-winning IT staffing firm consistently recognized for our commitment to excellence and a thriving work environment. Most recently, we were recognized Inc's Best Workplaces 2024 and Silicon Valley's Best Places to Work by the San Francisco Business Journal (2024) and Glassdoor's Best Places to Work (2023 & 2022)! Industry Leaders in IT Staffing As staffing solutions providers for Fortune 100 companies, Akraya's industry recognitions solidify our leadership position in the IT staffing space. We don't just connect you with great jobs, we connect you with a workplace that inspires! Join Akraya Today! Let us lead you to your dream career and experience the Akraya difference. Browse our open positions and join our team!
    $105-120 hourly 2d ago
  • Information System Security Officer

    Woods Hole Oceanographic Institution 4.7company rating

    Woods Hole, MA jobs

    Woods Hole Oceanographic Institution is searching for a highly skilled and cleared Information System Security Officer (ISSO) / Classified Systems Information Assurance Analyst to join our team, focusing exclusively on the security of classified information systems and networks. This critical role is responsible for ensuring the confidentiality, integrity, and availability of sensitive government information in accordance with stringent U.S. government (USG) security directives. The ISSO will be instrumental in the authorization and accreditation(A&A) process, continuous monitoring, incident response, and the implementation of robust security controls for classified environments. The ideal candidate will possess a deep understanding of relevant security frameworks, policies, and a proven track record of maintaining secure classified systems. This is a regular, full-time, exempt position, and is eligible for full benefits. ESSENTIAL FUNCTIONS Authorization & Accreditation (A&A) / Risk Management Framework (RMF): Lead or support the development, review, and submission of comprehensive security authorization packages (e.g., System Security Plans (SSPs), Risk Assessment Reports, Contingency Plans, Plan of Action and Milestones (POA&Ms)) for classified systems. Ensure all classified systems maintain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC) in accordance with RMF or legacy A&A processes (e.g., DIACAP). Interpret and apply USG security policies, regulations, and guidelines, including but not limited to: NISPOM, DoD Instruction 8500.01, NIST SP 800-53, DCID 6/3, ICD 503, JSIG, and DISA STIGs. Security Control Implementation & Enforcement: Design, implement, and maintain security controls specific to classified systems, including secure configurations, access controls, auditing, media control, and classified spillage prevention/response. Configure and manage specialized security tools relevant to classified environments (e.g., Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), Data Loss Prevention (DLP) solutions). Perform rigorous hardening of operating systems (Windows, Linux), applications, and network devices based on DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs). Vulnerability Management & Continuous Monitoring: Conduct vulnerability scans, analyze results, and work with system administrators to remediate security weaknesses on classified systems. Oversee and perform continuous monitoring activities, including reviewing audit logs, security events, and system alerts for anomalous behavior. Track and ensure compliance with Information Assurance Vulnerability Management (IAVM) directives. Incident Response & Classified Spillage: Act as a primary point of contact and lead for security incidents and classified spillage events on assigned systems. Execute incident response procedures, including containment, eradication, recovery, and detailed reporting to relevant government authorities. Participate in forensic investigations as required for classified incidents. Compliance & Audit Support: Maintain meticulous documentation of all security artifacts, configurations, policies, and procedures for classified systems. Support internal and external security inspections, audits, and assessments by government agencies (e.g., DCSA, DSS, NSA). Develop and implement standard operating procedures (SOPs) for the secure operation of classified systems. User Training & Guidance: Provide guidance and training to users on proper handling, marking, and safeguarding of classified information and operation of classified systems. Ensure all personnel accessing classified systems meet training requirements (e.g., security awareness, insider threat). Configuration Management: Manage and control changes to the hardware, software, and firmware of classified systems to maintain their security posture and accreditation. MINIMUM QUALIFICATIONS Security Clearance: Active U.S. Government Security Clearance required at the SECRET level or above. Education: Bachelor's degree in Computer Science, Information Security, Cybersecurity, or equivalent experience. Experience: 5 years of dedicated experience in Information Assurance/Cybersecurity within classified government or defense environments. Demonstrable expertise in the Risk Management Framework (RMF) or equivalent A&A processes (e.g., DIACAP). Hands-on experience with security tools and technologies used in classified environments (e.g., ACAS, HBSS, SIEM, dedicated firewalls). Proven experience with DISA STIGs and their application to various operating systems and applications. Technical Skills: Strong understanding of network protocols, operating systems (Windows, Linux/Unix), and virtualized environments in a classified context. Experience with encryption technologies and COMSEC devices. Knowledge of scripting languages (e.g., PowerShell, Python, Bash) for automation and auditing is a plus. Desired Certifications: CISSP (Certified Information Systems Security Professional) DoD 8570.01-M IAT Level II (e.g., CompTIA Security+, CySA+, CCNA Security, SSCP) or higher (IAM Level I, II, or III). GIAC Certifications relevant to incident handling, forensics, or security auditing (e.g., GCIH, GCFA, GCCC, GSNA) Additional Job Requirements Salary Range: $114,000 to $148,000 USD The salary range provided for this position reflects the expected minimum and maximum base pay for new hires. Actual compensation will be determined based on factors such as relevant skills, experience, and qualifications, as well as internal equity and market conditions. In addition to base salary, eligible employees also receive a comprehensive benefits package. WHOI accepts applications on a rolling basis - applications will be reviewed as they are received, and we encourage you to submit your application as soon as possible to ensure full consideration. While we will continue to review applications until the position is filled, and early applicants may have an advantage in the selection process. EEO Statement Woods Hole Oceanographic Institution (WHOI) provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
    $114k-148k yearly Auto-Apply 60d+ ago
  • Security Researcher

    Cynet 4.5company rating

    Tampa, FL jobs

    Shape the Future of Cybersecurity with Us Are you driven by deep curiosity, bold innovation, and the desire to transform cutting-edge AI research into real-world cybersecurity impact? Join Cynet, an established yet rapidly growing cybersecurity startup, where you'll help build next-generation AI-powered security products from the ground up. You'll be part of a small, elite, cross-disciplinary team working closely with security researchers, R&D engineers, data engineers, and product leaders. Here, you're not just joining a company, you're stepping into a place where you can envision, build, and deploy foundational AI technologies that protect organizations worldwide. You will have the rare opportunity to drive innovation end-to-end, shape our future technology, and create AI systems that make a real difference in defending against modern cyber threats. This is a role for someone who wants to put their soul into their craft, someone hungry to learn fast, experiment boldly, and turn ambitious ideas into production-ready AI solutions. What will you do * Drive innovation by combining deep security research with modern AI techniques to build impactful, customer-facing security capabilities. * Build and refine intelligent generative AI agents that drive automated cybersecurity reasoning, investigation workflows, and threat analysis. * Extend and enhance our next-generation AI antivirus engine by designing new feature representations, building file parsers, and developing ML models end-to-end. * Engineer and implement core parser and model components in C++ and Python to seamlessly integrate into the Cynet Endpoint Agent and platform infrastructure. * Use Cynet's ML experimentation pipelines to run experiments, optimize performance, and deliver production-ready detection models. * Serve as the cybersecurity expert within the Data Science team, guiding threat modeling, malware understanding, and security-driven AI design decisions. Requirements * 5+ years of hands-on cybersecurity research experience. * Proven experience working with EDR, malware analysis, threat detection, and security tooling. * Proficiency in C, C++, and Python with strong debugging abilities. * Solid understanding of Windows internals, including low-level OS concepts. * Experience with static and dynamic analysis, reverse engineering, and real-world threat investigations. * A scientific, data-driven approach to problem-solving, from ideation through experimentation and production. * Strong understanding of statistical concepts and ML feature engineering techniques. * Experience analyzing large-scale datasets using SQL, Spark, or similar tools. Preferred / Nice to Have * Certifications or academic background in Data Science / Machine Learning / AI. * Experience with ML frameworks and experimentation environments. * Experience with generative models, agentic reasoning, or building LLM-based AI systems. * Familiarity with cloud security, DevOps tooling, or MLOps practices. You are About Us Cynet is a leader in threat detection and response, designed to simplify security for organizations of all sizes. Our mission is to empower lean security teams and their partners with an AI-powered, unified platform that autonomously detects, protects, and responds to threats - backed by 24×7 security experts. With a Partner First mindset, we focus on helping customers and partners stay protected, operate confidently, and achieve their goals. Our vision is to give every organization true cybersecurity peace of mind, providing fast, accurate protection without the noise or complexity. This role follows a hybrid work model in countries where Cynet has offices (Israel, USA), while being fully remote in England, Poland, Italy, and Germany.
    $100k-149k yearly est. 16d ago
  • Security Researcher

    Cynet 4.5company rating

    Boston, MA jobs

    Shape the Future of Cybersecurity with Us Are you driven by deep curiosity, bold innovation, and the desire to transform cutting-edge AI research into real-world cybersecurity impact? Join Cynet, an established yet rapidly growing cybersecurity startup, where you'll help build next-generation AI-powered security products from the ground up. You'll be part of a small, elite, cross-disciplinary team working closely with security researchers, R&D engineers, data engineers, and product leaders. Here, you're not just joining a company, you're stepping into a place where you can envision, build, and deploy foundational AI technologies that protect organizations worldwide. You will have the rare opportunity to drive innovation end-to-end, shape our future technology, and create AI systems that make a real difference in defending against modern cyber threats. This is a role for someone who wants to put their soul into their craft, someone hungry to learn fast, experiment boldly, and turn ambitious ideas into production-ready AI solutions. What will you do * Drive innovation by combining deep security research with modern AI techniques to build impactful, customer-facing security capabilities. * Build and refine intelligent generative AI agents that drive automated cybersecurity reasoning, investigation workflows, and threat analysis. * Extend and enhance our next-generation AI antivirus engine by designing new feature representations, building file parsers, and developing ML models end-to-end. * Engineer and implement core parser and model components in C++ and Python to seamlessly integrate into the Cynet Endpoint Agent and platform infrastructure. * Use Cynet's ML experimentation pipelines to run experiments, optimize performance, and deliver production-ready detection models. * Serve as the cybersecurity expert within the Data Science team, guiding threat modeling, malware understanding, and security-driven AI design decisions. Requirements * 5+ years of hands-on cybersecurity research experience. * Proven experience working with EDR, malware analysis, threat detection, and security tooling. * Proficiency in C, C++, and Python with strong debugging abilities. * Solid understanding of Windows internals, including low-level OS concepts. * Experience with static and dynamic analysis, reverse engineering, and real-world threat investigations. * A scientific, data-driven approach to problem-solving, from ideation through experimentation and production. * Strong understanding of statistical concepts and ML feature engineering techniques. * Experience analyzing large-scale datasets using SQL, Spark, or similar tools. Preferred / Nice to Have * Certifications or academic background in Data Science / Machine Learning / AI. * Experience with ML frameworks and experimentation environments. * Experience with generative models, agentic reasoning, or building LLM-based AI systems. * Familiarity with cloud security, DevOps tooling, or MLOps practices. You are About Us Cynet is a leader in threat detection and response, designed to simplify security for organizations of all sizes. Our mission is to empower lean security teams and their partners with an AI-powered, unified platform that autonomously detects, protects, and responds to threats - backed by 24×7 security experts. With a Partner First mindset, we focus on helping customers and partners stay protected, operate confidently, and achieve their goals. Our vision is to give every organization true cybersecurity peace of mind, providing fast, accurate protection without the noise or complexity. This role follows a hybrid work model in countries where Cynet has offices (Israel, USA), while being fully remote in England, Poland, Italy, and Germany.
    $89k-127k yearly est. 16d ago
  • Information System Security Officer II

    Grs, Inc. 4.4company rating

    Colorado Springs, CO jobs

    Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II. Job Descriptio n: Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of security safeguards applied to computer systems Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices Perform ISSO duties in support of in-house and external customers Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Review, track, and conduct AIS training Requirement: Four (4) years related experience Bachelor's Degree in a related area or equivalent experience (Four (4) years) Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Security Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Programs Willingness to submit to a Counterintelligence Polygraph Skills: Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation) Must be able to lift up to 50lbs Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk. Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English. GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
    $77k-100k yearly est. Auto-Apply 58d ago
  • Junior Information Systems Security Officer with Top Secret / SCI, Full Scope Polygraph

    Calnet 4.4company rating

    Fort Meade, MD jobs

    Description CALNET has a requirement for a Junior Information Systems Security Officer with Top Secret / SCI, Full Scope Polygraph to support an NSA Contract in Ft Meade, MD. Position Description The Junior Information Systems Security Officer shall have the following qualifications. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation. Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools. Researches, evaluates, tests, and implements new security software or devices. Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems. Desired Skills: Configuration and Document Management Security Policy Security Vulnerability Scanning Tools System Security Plan (SSP) Clearance: Top Secret / SCI Clearance with Full Scope Polygraph Certifications: IAT Level 1 - CompTIA Security+ CE or CompTIA Network+ CE, CEH Education: Bachelor's Degree in Information Technology or Computer Science or equivalent. Position Number: GW-0040 CALNET, Inc. offers a competitive salary and a generous benefits package. This package includes medical, dental, vision, life, short- and long-term disability insurances, a 401(k)-retirement savings plan, and generous leave time. CALNET, Inc. is an Equal Opportunity Employer. EEO/M/F/D/V **************
    $67k-89k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO) (Job ID: 4062)

    Valkyrie Enterprises 4.9company rating

    Huntsville, AL jobs

    Position: Cyber Security Engineer/Information Systems Security Officer (ISSO) (Job ID: 4062) Location: Huntsville, AL Cyber Security Engineer/Information Systems Security Officer (ISSO) Contingent upon prime contractor approval Purpose: * Valkyrie Enterprises has need for a Cyber Security Engineer/Information Systems Security Officer (ISSO) in Huntsville, AL. * In this role you will be providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. Job Description: * Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. * Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. * Ensure that system security artifacts are developed, reviewed, and updated as needed. * Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). * Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. * Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. * Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. * Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. * Track and monitor Plan of Action and Milestones (POA&Ms). * Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. * Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. * Track deliverables (i.e., artifacts, schedules, metrics). Qualifications: * Must have a Bachelor's degree and 7+ years of related professional experience. * Must have DoD 8570 compliant IAM Level II certification (Sec +). * Must have experience with DoD's RMF and SSP processes. Desired Qualifications: * Experience with MDA specific RMF and SSP processes, preferred. * Self-Motivated * Customer-oriented Security Requirements: * Must have an Active DOD Secret Security clearance, and the ability to maintain clearance. Travel Requirements: * Minimal Travel; 10% or less * If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: **************************** Physical Requirements: * Remaining in a stationary position, often standing, or sitting for prolonged periods * Able to sit and work on a computer for long periods of time * Moving about to accomplish tasks or moving from one worksite to another * Communicating with others to exchange information * Light work that includes moving objects up to 20 pounds Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO)
    $64k-84k yearly est. 18d ago
  • Senior Information Systems Security Officer (ISSO)

    Jovian Concepts 3.8company rating

    Jessup, MD jobs

    Jovian Concepts, Inc is looking to hire a ISSO for a great opportunity in the Annapolis Junction area. A current and active TS\/SCI Clearance with a MD Polygraph is required. No CCA's will be accepted at this time. Enhancing security posture by supporting the program, organization, system, or enclave's information assurance initiatives and enforcing security policies, standards, and methodologies. Overseeing security operations for information systems, managing daily security aspects, evaluating security solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. Developing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Ensuring compliance with security authorization activities following the Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Providing technical expertise in security policies and operations, supporting the implementation and maintenance of security measures, and collaborating with stakeholders to strengthen the security posture. Driving continuous improvement by assessing existing security processes, identifying vulnerabilities, and implementing proactive solutions to enhance system resilience. Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day\-to\-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability\/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with NSA\/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements A current and active TS\/SCI Clearance with a MD Polygraph is required. No CCA's will be accepted at this time. Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or related discipline and 12 or more years of related experience. Minimum of 7+ years of experience as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate) Experience with customer Info Security tool suite, as well: Latteart, Biscoti, Xacata. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"45709801","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Posting ID","uitype":1,"value":"WO\-ISSO\-25\-001"},{"field Label":"Listing TTO\/DO","uitype":1,"value":"820"},{"field Label":"Industry","uitype":2,"value":"Technology"},{"field Label":"Number of Positions","uitype":32,"value":"1"},{"field Label":"Clearance Required","uitype":2,"value":"Top Secret\/SCI with Polygraph"},{"field Label":"City","uitype":1,"value":"Annapolis Junction"},{"field Label":"State\/Province","uitype":1,"value":"MD"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"20701"}],"header Name":"Senior Information Systems Security Officer (ISSO)","widget Id":"**********00812086","is JobBoard":"false","user Id":"**********00076003","attach Arr":[],"custom Template":"5","is CandidateLoginEnabled":true,"job Id":"**********10798104","FontSize":"12","location":"Annapolis Junction","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $62k-83k yearly est. 60d+ ago
  • Sr. Information System Security Officer

    Prosync 4.1company rating

    Annapolis, MD jobs

    ProSync Technology Group, LLC (ProSync) is an award-winning, SDVOSB Defense Contracting company with a strong military heritage and a record of excellence in supporting the Department of Defense and the Intelligence Community. If you have prior military service or government contracting experience, are proud to serve and support our nation, and want to help support ProSync's mission to "Define and Redefine the State of Possible,” please apply today! The Senior Information Systems Security Officer (ISSO) will provide aid to the program, organization, system, or enclave's information assurance program and will also lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies in addition to the below. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements A minimum of twelve (12) years of total experience in the information security arena. A minimum of seven (7) years of experience directly as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. A Bachelors of Science degree in Computer Science, Information Assurance, Information Security, or related discipline. Experience supporting over 30 SSP's. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate). A Top Secret/SCI w/ Polygraph is required. Benefits Join PROSYNC and enjoy our great benefits! Compensation: We offer bonuses that are awarded quarterly to our employees and our compensation rates are highly competitive. Health & Retirement: We offer a comprehensive Health Benefits package and 401K Retirement plan so you can take care of yourself and your family, now and in the future. Other health-related benefits include an employee assistance program for those difficult times or when you need to take care of your mental health. Education: Individual growth is a priority at ProSync. Employees are encouraged to take advantage of our company-sponsored continuing education program so you can get your degree or that next certification you need to propel you to the next level. Work/Life Balance: A healthy work/life balance is essential for building and executing your work effectively at ProSync, but it's also necessary to allow you the room to pursue everything else you want to develop in your personal life.. We offer generous Paid Time Off and 11 paid holidays a year. ProSync also provides flexible work options that work with your schedule and lifestyle.
    $75k-103k yearly est. Auto-Apply 60d+ ago
  • Sr. Information System Security Officer

    Prosync 4.1company rating

    Annapolis, MD jobs

    Job Description ProSync Technology Group, LLC (ProSync) is an award-winning, SDVOSB Defense Contracting company with a strong military heritage and a record of excellence in supporting the Department of Defense and the Intelligence Community. If you have prior military service or government contracting experience, are proud to serve and support our nation, and want to help support ProSync's mission to "Define and Redefine the State of Possible,” please apply today! The Senior Information Systems Security Officer (ISSO) will provide aid to the program, organization, system, or enclave's information assurance program and will also lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies in addition to the below. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements A minimum of twelve (12) years of total experience in the information security arena. A minimum of seven (7) years of experience directly as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. A Bachelors of Science degree in Computer Science, Information Assurance, Information Security, or related discipline. Experience supporting over 30 SSP's. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate). A Top Secret/SCI w/ Polygraph is required. Benefits Join PROSYNC and enjoy our great benefits! Compensation: We offer bonuses that are awarded quarterly to our employees and our compensation rates are highly competitive. Health & Retirement: We offer a comprehensive Health Benefits package and 401K Retirement plan so you can take care of yourself and your family, now and in the future. Other health-related benefits include an employee assistance program for those difficult times or when you need to take care of your mental health. Education: Individual growth is a priority at ProSync. Employees are encouraged to take advantage of our company-sponsored continuing education program so you can get your degree or that next certification you need to propel you to the next level. Work/Life Balance: A healthy work/life balance is essential for building and executing your work effectively at ProSync, but it's also necessary to allow you the room to pursue everything else you want to develop in your personal life.. We offer generous Paid Time Off and 11 paid holidays a year. ProSync also provides flexible work options that work with your schedule and lifestyle.
    $75k-103k yearly est. 5d ago
  • Computer Network Defense Analyst Senior Level (TS/SCI w/poly required to start)

    Integrity Technology 3.7company rating

    Fort Meade, MD jobs

    ITC is a Woman Owned Small Business delivering exceptional consultation to the U.S. Government in Systems/Software Engineering, Cybersecurity Solutions, Mission Operations/INTEL Analysis, and Management Services in order to enable our customers to solve the most challenging problems. With continued growth comes opportunity, and we are currently searching for a Top-Secret SCI with polygraph-cleared Senior-Level Digital Network Exploitation Analyst. Responsibilities: The Computer Network Defense Analyst will use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance , and/or systems engineering. Additionally, must have experience in netowrk or system administation. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undgergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Requirements TS/SCI with CI or FS Poly Required 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree (applicable to Level 1 - Level 4). With an Associate's Degree, at least 10 years demonstrated experience related to . With a Bachelor's Degree, at least 8 years demonstrated experience related to . With a Master's Degree, at least 6 years demonstrated experience related to . With a Doctorate Degree, at least 4 years demonstrated experience related to job description. Benefits for this position include: 401K plan with company contributions (safe harbor and profit sharing) 11 Federal holidays, 21 Days PTO Medical, Dental, & Vision with substantial company contributions Company provided Life, LTD and STD Insurance Health Savings Accounts/ Flexible Spending Accounts Referral Bonuses Performance Bonuses Tuition Assistance for Education, Training, and Professional certifications Career Development Many factors can influence final salary including, but not limited to relevant prior work experience, specific skills and competencies, education, and certifications. Final salary can also be influenced by a position's geographic location, Federal Government contract labor categories, and contract wage rates. The salary Range for this position is: $100,000-200,000 ITC is an Equal Opportunity employer. Qualified applicants or employees will receive consideration for employment without regard to race, color, religion, ethnic or national origin, ancestry, age, sex, sexual orientation, gender identity, pregnancy (including childbirth or related condition) citizenship, familial status, mental or physical disability status, veteran status, genetic information, other non-disqualifying disability, or any other characteristic protected by law.
    $100k-200k yearly 60d+ ago
  • Information Systems Security Officer

    Fuse Engineering 4.0company rating

    Annapolis, MD jobs

    Full-time Description **A SECURITY CLEARANCE AND POLYGRAPH ARE REQUIRED This opportunity supports an Enterprise IT contract with a team of 60+ engineers responsible for the architecture, engineering, integration, operations, maintenance and sustainment of a world-wide multi-level / multiple classification Enterprise IT environment enabling collaboration between the US and Foreign parties. This Enterprise architecture serves as a gateway for the deployment of new network, enterprise software, and SIGINT applications into a custom global collaboration environment. Cross domain security, user access controls and continuous monitoring are critical to the success of the program. Requirements Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's degree. Fifteen (15) years' experience as an ISSO on programs and contracts of similar scope, type and complexity is required. Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation, communication protocols; and encryption techniques/tools. One (1) year experience in Enterprise IT systems and projects. Managing and performing integration operations and maintenance activities on multiple system domains of various security classification levels and diverse user bases concurrently. DoD 8570 compliance with Information Assurance Management (IAM) Level 1 or higher is required Task Desired Skills Experience with Nessus (Tenable), Nmap, and Splunk (Security Essentials). Experience is to include at least two (2) of the following areas: knowledge of current security tools hardware/software security implementation communication protocols encryption techniques/tools EQUAL OPPORTUNITY EMPLOYER VETERANS DISABLED
    $65k-87k yearly est. 60d+ ago
  • Security Researcher

    Accenture 4.7company rating

    Herndon, VA jobs

    At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands-on experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! **Job Description:** Accenture Federal Services is seeking bold, innovative thinkers to tear apart our world of code and find vulnerabilities. Software and applications, PCs, Macs, Linux and IoT are all the objects of our investigation, so we need someone who likes to solve puzzles and deep dive into new topics to solve some of the most challenging problems. Our projects involve small teams working a variety of research efforts in close coordination with customers. As a technical leader, you will drive vulnerability research (VR) and operational success for our customers **Here's what you need:** + In-depth knowledge of C, C++, Python and Bash scripting; additional languages desired include C#, Java, Swift + Experience with fuzzer development, AFL, Ida Pro, Ghidra and custom forensic analysis tools + Academic degree(s) in Computer Science, Cyber Security, Software Engineering, Electrical or Computer Engineering, Physics and/or military training/experience + Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, TILE, or others) + Working experience with Git, GitLab, or Jira **Bonus points if you have:** + Experience utilizing full system emulation for research and analysis + Experience using VMware vCenter, vSphere + Experience setting up networking and packet capture in Virtual Machine environments **Security Clearance:** Must have an active TS/SCI level clearance \#clearancejobs As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of **California, Colorado, Hawaii, Illinois, Maryland,** **Massachusetts,** **Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland** . The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. (********************************************************************* We accept applications on an on-going basis and there is no fixed deadline to apply. The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is: $113,500-$234,900 USD **_What We Believe_** _As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on._ **_Equal Employment Opportunity Statement_** _We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement. (**************************************************************************** _Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an Affirmative Action Employer for Veterans and Individuals with Disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women._ **_Requesting An Accommodation_** _Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired._ _If you_ **_ _** _are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter._ **_Other Employment Statements_** _Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States._ _Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration._ _Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process._ _The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information._ _California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here (********************************************************************************* for additional important information._
    $79k-107k yearly est. 60d+ ago
  • Computer Network Defense (CND) Analyst

    CTC Group 3.1company rating

    Fort Meade, MD jobs

    CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Responsibilities Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications Active TS/SCI with polygraph clearance STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Documented foreign language proficiency may count toward experience requirements. Level 1 Requirements Associate's degree plus 4 years of relevant experience. OR: Bachelor's degree or 2 years of relevant experience. Level 2 Requirements Associate's degree plus 7 years of relevant experience. OR: Bachelor's degree plus 5 years of relevant experience. OR: Master's degree plus 3 years of relevant experience. OR: Doctorate degree plus 2 years of relevant experience. Level 3 Requirements Associate's degree plus 10 years of relevant experience. OR: Bachelor's degree plus 8 years of relevant experience. OR: Master's degree plus 6 years of relevant experience. OR: Doctorate degree plus 4 years of relevant experience. Level 4 Requirements Associate's degree plus 13 years of relevant experience. OR: Bachelor's degree plus 11 years of relevant experience. OR: Master's degree plus 9 years of relevant experience. OR: Doctorate degree plus 7 years of relevant experience. #CJ Why CTC Group? As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations. CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here. CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
    $66k-94k yearly est. Auto-Apply 60d+ ago
  • Computer Network Defense (CND) Analyst

    CTC Group 3.1company rating

    Fort Meade, MD jobs

    Job Description CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Responsibilities Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications Active TS/SCI with polygraph clearance STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Documented foreign language proficiency may count toward experience requirements. Level 1 Requirements Associate's degree plus 4 years of relevant experience. OR: Bachelor's degree or 2 years of relevant experience. Level 2 Requirements Associate's degree plus 7 years of relevant experience. OR: Bachelor's degree plus 5 years of relevant experience. OR: Master's degree plus 3 years of relevant experience. OR: Doctorate degree plus 2 years of relevant experience. Level 3 Requirements Associate's degree plus 10 years of relevant experience. OR: Bachelor's degree plus 8 years of relevant experience. OR: Master's degree plus 6 years of relevant experience. OR: Doctorate degree plus 4 years of relevant experience. Level 4 Requirements Associate's degree plus 13 years of relevant experience. OR: Bachelor's degree plus 11 years of relevant experience. OR: Master's degree plus 9 years of relevant experience. OR: Doctorate degree plus 7 years of relevant experience. #CJ Why CTC Group? As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations. CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here. CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Powered by JazzHR Luf4o3VeSC
    $66k-94k yearly est. 21d ago
  • Senior Information Assurance (IA) Lead Analyst

    Vor Technology 3.9company rating

    Arlington, VA jobs

    VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training. Job Description VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A). Responsibilities will include the following: Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise. Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies. Qualifications *All Candidates must have a TS/SCI clearance with a Full Scope Polygraph Must have a minimum ten (10) years experience with the following: • Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager • Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks • Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans • Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes • Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes • Leading FISMA reporting for DoD customers • Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences • Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects Additional Desired Qualifications: • DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA) • eMASS experience is a plus Additional Information Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field) Clearance Requirement: Active TS/SCI with Full Scope clearance * US citizenship is required. EOE/M/F/D/V
    $72k-96k yearly est. 1d ago
  • Senior Information Assurance (IA) Lead Analyst

    VOR Technology 3.9company rating

    Arlington, VA jobs

    VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training. Job Description VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A). Responsibilities will include the following: Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise. Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies. Qualifications *All Candidates must have a TS/SCI clearance with a Full Scope Polygraph Must have a minimum ten (10) years experience with the following: • Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager • Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks • Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans • Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes • Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes • Leading FISMA reporting for DoD customers • Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences • Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects Additional Desired Qualifications: • DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA) • eMASS experience is a plus Additional Information Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field) Clearance Requirement: Active TS/SCI with Full Scope clearance * US citizenship is required. EOE/M/F/D/V
    $72k-96k yearly est. 60d+ ago

Learn more about COLSA jobs