Cyber security analyst jobs in Bellingham, WA - 301 jobs
All
Cyber Security Analyst
Information Systems Security Officer
Senior Security Analyst
Information Security Engineer
Information Security Analyst
Security System Engineer
Security Engineer
Senior Security Engineer
Defense Analyst
Senior Cyber Security Analyst
Senior Red Team Engineer - Finance Security & Adversarial Testing
Robinhood 4.7
Cyber security analyst job in Bellevue, WA
A leading financial technology company based in Menlo Park, CA seeks an Offensive Security Engineer to enhance security and build resilience across their products. This role involves mentoring, conducting Red Team exercises, and collaborating on security findings with various teams. Ideal candidates have 5+ years of experience and strong communication skills. Attractive compensation includes health insurance and support for personal wellness. Join us to help democratize finance for all.
#J-18808-Ljbffr
$137k-192k yearly est. 1d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst - Full time must include working one weekend day (Sunday)
GDIT
Cyber security analyst job in Washington
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Event Security, Security Audit, Splunk (Inactive)
Certifications:
None
Experience:
8 + years of related experience
US Citizenship Required:
Yes
Job Description:
CyberSecurityAnalyst - Full time position, but must include working one weekend day (Sunday)
Own your career as a CyberSecurityAnalyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cybersecurity at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow.
At GDIT, people are our differentiator. As a CyberSecurityAnalyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a CyberSecurityAnalyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
HOW A CYBERSECURITYANALYST WILL MAKE AN IMPACT
Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information.
Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations.
Identify acceptable use policy infractions.
Review event logs to determine events of interest.
Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).
Prepare case evidence and incident reports.
Work on special projects as assigned.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.
DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date.
DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date.
Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph
Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems
Saturday and Sunday weekend Day Shift work required.
Willing to work holidays supporting your assigned shift.
Location: 100% On Customer Site
Bolling AFB, Washington D.C.
Reston, VA
Colorado Springs, CO
Riverdale, MD
Pearl Harbor, HI
Tampa is available for part time weekend only support
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
Less than 10%
Telecommuting Options:
Onsite
Work Location:
USA DC Washington
Additional Work Locations:
USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$61.3-82.9 hourly Auto-Apply 20d ago
Cyber Security Analyst
Zone It Solutions
Cyber security analyst job in Seattle, WA
Job Description
We is seeking a talented CyberSecurityAnalyst. As a CyberSecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cybersecurity trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cybersecurity awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cybersecurity or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$80k-111k yearly est. Easy Apply 9d ago
Senior Cyber Defense Incident Responder
M9 Solutions
Cyber security analyst job in Washington
M9 Solutions is dedicated to providing IT services and solutions to the Federal Government by mobilizing the right people, skills, clearance levels, and technologies to help organizations who desire improved performance and modern, sustainable change. M9 has provided quality IT services and support to more than 30 Federal Agencies and multiple commercial customers nationwide. Our capabilities include digital transformation, software development, cloud migration, applications & infrastructure, cybersecurity, data delivery & analytics, and IT talent solutions.
M9 Solutions is seeking a Senior Cyber Defense Incident Responder to work on-site in support of a government contract for a client located in Washington, DC. An active TS/SCI clearance is required.
Responsibilities
Facilitates and coordinates with leadership to provide expert technical support to the enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Correlates incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation to any attacks within the client networks.
Respond to cyber incidents as necessary and act as a liaison between entities with internal and external stakeholders within the organization.
Collects intrusion artifacts (e.g., source code, malware, trojans) and uses discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Performs analysis of log files from a variety of sources to identify possible threats to network security.
Performs cyber defense incident triage, to include determining scope, urgency, and potential impact, identifies the specific vulnerability, and makes recommendations that enable expeditious remediation.
Performs cyber defense trend analysis and reporting.
Assists in Incident Response processes and in the enhancement of behavioral analytics, including the development of Concept of Operations and Standards Operating Procedures.
Develops and maintains models for cyber threat mitigation and improves threat modeling.
Uses behavior analytics (UBA) and ensures all infrastructure components meet proper performance standards.
Coordinates and provides expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Coordinates incident response functions.
Monitors external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
Performs cyber defense trend analysis and reporting.
Performs initial, forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems.
Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts.
Writes and publishes after-action reviews.
Writes and publishes cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
Assists junior Incident Response Technicians in their tasks.
Required Skills and Qualifications
TS/SCI security clearance.
Bachelor's degree in a related field.
8 years of relevant experience. In lieu of some experience, industry certifications can be substituted.
Proven experience conducting incident response and forensic investigations within large, complex enterprise environments, including analysis of malware, logs, and network traffic to identify and mitigate threats.
Strong understanding of cyber threat intelligence, behavioral analytics, and security operations processes, with the ability to develop and document standard operating procedures and after-action reports.
Full-Time Employee Compensation
M9 Solutions' pay range for this position is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include, but are not limited to, responsibilities of the position, education, experience, knowledge, skills, abilities, as well as internal equity, location, alignment with market data, applicable bargaining agreement (if any), or other law.
M9 Benefits - *************************************************
Salary Range
$60,000 - $180,000 USD
M9 Solutions, LLC (M9) is a Federal contractor and we comply with all applicable federal laws prohibiting discrimination in employment, including Title VII of the Civil Rights Act of 1964. We also adhere to the affirmative action requirements of the Vietnam Era Veterans' Readjustment Assistance Act (VEVRAA) and Section 503 of the Rehabilitation Act, ensuring equal opportunity for veterans and individuals with disabilities. Please click here to complete M9's Voluntary Self-Identification Form and then email it to ******************. If you need accommodation during the application process or encounter difficulties using our website, please contact our Human Resources Department at ****************** or ************.
With 14+ years of proven delivery and steady growth, M9 Solutions is a unique small business with credible past performance and key capabilities offering project management services, solution architects, business analysts, program managers, technical architects, and technical consultants. M9 was recognized as an Inc. 5000 Fastest-Growing Private Companies in 2021, 2020, 2019, 2018, 2017, 2016, and 2012. M9 Solutions believes that work should be fun, rewarding, and something everyone can be excited about. We offer a competitive compensation package and value diversity in driving the vision of the company.
$60k-180k yearly Auto-Apply 60d+ ago
Malware Defense Malware Analyst
Bank of America 4.7
Cyber security analyst job in Washington
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world.
Responsibilities include, but are not limited to:
• In-depth analysis of malware, including authoring analysis reports.
• Tracking malware campaigns, malicious actors, and related infrastructure.
• Creation of tools and scripts to assist in the analysis of malware analysis.
• Field escalations of potentially malicious files and websites from teams within Malware Defense.
Required Qualifications:
• Strong direct experience of analyzing malware.
• Intermediate to advanced malware analysis skills.
• Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors.
• Experience creating tools and scripts to accelerate malware and threat analysis.
• Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc.
• Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc.
• Experience authoring YARA, Suricata, and EKFiddle detection rules.
• Experience with penetration testing and/or adversary emulation is a plus.
• Able to work independently on tasks, but also work well within a team environment
Desired Qualifications:
• Experience analyzing malware targeting Linux, Android, and IOT platforms.
Skills:
CyberSecurity
Data Privacy and Protection
Problem Solving
Process Management
Threat Analysis
Business Acumen
Data and Trend Analysis
Interpret Relevant Laws, Rules, and Regulations
Risk Analytics
Stakeholder Management
Access and Identity Management
Data Governance
Encryption
Information Systems Management
Technology System Assessment
Shift:
1st shift (United States of America)
Hours Per Week:
40
Pay Transparency details
US - CO - Denver - 1144 15th St - Denver Gis (CO9926), US - DC - Washington - 1800 K St NW - 1800 K Street NW (DC1842), US - IL - Chicago - 540 W Madison St - Bank Of America Plaza (IL4540) Pay and benefits information Pay range$95,700.00 - $144,900.00 annualized salary, offers to be determined based on experience, education and skill set.Discretionary incentive eligible This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.BenefitsThis role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.
$95.7k-144.9k yearly Auto-Apply 42d ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Seattle, WA
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$108k-147k yearly est. Easy Apply 8d ago
Information System Security Officer (ISSO)
Istari Digital
Cyber security analyst job in Washington
[ABOUT ISTARI DIGITAL]Istari is a digital engineering software company enabling our customers to turn the physical world into the digital to accomplish their specific mission or business objectives. Istari was founded with the vision of making open, scalable digital engineering ecosystems a reality - where new technologies and systems are created digitally, free from the real-world constraints of costs and schedules. We are creating the world's best engineering model sharing platform, allowing our customers to simply and securely integrate their models across different engineering disciplines, organizations, and security levels.
At Istari, we are passionate about our mission of creating the world's first open and scalable industrial metaverse. Whether our customers are designing prototypes, performing virtual testing, or training AI and autonomy for complex systems, we know that going digital will save them time, resources, and reduce their environmental impact.
While we are a distributed team with most team-members working remotely, we place an emphasis on staying connected and collaborative, prioritizing in-person opportunities to build trust as a team. At Istari, we still believe that trust is best built in-person. To do this, we have an engineering headquarters in Cambridge, MA for focused technical development and several times per year we gather for an off-site that allows us to develop our professional skills and our team relationships.
[VALUES]At Istari, we live by our values, which include:
- Focus is rewarded. Finish is remembered. - Facts are friendly. Even when they are not fun.- Fellowship is fundamental. Make others successful.
Equal Opportunity Istari is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
We are seeking a highly experienced and knowledgeable Information System Security Officer (ISSO) to join our Cybersecurity team. The ISSO will serve as a principal advisor on all matters, technical and otherwise, involving the cybersecurity of information systems under their purview. This role requires a deep understanding of cybersecurity principles, practices, and frameworks, as well as the ability to develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, both on premises and in cloud environments. The ISSO will work closely with various stakeholders across the organization to ensure the confidentiality, integrity, and availability of our information systems.Key Responsibilities
Serve as the principal advisor on all matters involving the cybersecurity of assigned information systems.
Develop, implement, and evaluate information system security program policy consistent with Federal and Commercial regulatory requirements, including JSIG, NIST 800-171, NIST 800-53, CMMC, and ITAR.
Conduct risk assessments and identify vulnerabilities in information systems.
Develop and implement security controls to mitigate identified risks.
Monitor and evaluate the effectiveness of security controls.
Develop and deliver cybersecurity awareness training to employees.
Investigate security incidents and breaches.
Maintain security documentation, including system security plans (SSPs), risk assessments, and incident reports.
Stay up-to-date with the latest cybersecurity threats and vulnerabilities.
Collaborate with the engineering and customer success teams to ensure secure implementation and configuration of systems.
Required Qualifications
Active Top Secret Security Clearance, with SCI eligibility.
Minimum of 5 years of experience in a relevant field.
Deep understanding of cybersecurity principles, practices, and frameworks, including JSIG, NIST 800-171, NIST 800-53, ITAR, ISO, and CMMC.
Experience with risk assessments, vulnerability identification, and security control implementation.
Experience with security incident investigation and response.
Excellent communication and collaboration skills, with the ability to effectively communicate with both technical and non-technical audiences.
Strong analytical and problem-solving skills.
Relevant certifications (e.g., Sec+, CISSP, CISM).
Must be a US citizen living within the United States.
Preferred Qualifications
Bachelor's degree in computer science, information systems, or a related field.
Experience with SOC compliance and audits.
$108,800 - $163,200 a year BENEFITSWe offer highly competitive benefits, including:
Health and Family- Medical/Dental/Vision- Employee Premiums are 100% Company Paid- Life Insurance- Flexible Work Hours - Unlimited Paid Time Off (PTO) with federal government holidays
Financial- Competitive Compensation - 401k - Company Stock Options- Home Office Setup Budget
Learning- Reimbursement for approved trainings and subscriptions- Conferences (travel, lodging, and fees)
Note - some benefits are not available to interns or contractors.
Thank you for your interest in Istari. Expect to hear back from us soon with next steps.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$108.8k-163.2k yearly Auto-Apply 60d+ ago
Senior Cloud Security Analyst
GW Cancer Center
Cyber security analyst job in Washington
GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud SecurityAnalyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position
Minimum Qualifications
Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience.
Preferred Qualifications
4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling
Work Schedule
Monday - Friday, 8am - 5pm (occasional evenings and weekends)
$96k-132k yearly est. 60d+ ago
Information Security Specialist (Cyber security analysis)
Aditistaffing
Cyber security analyst job in Bellevue, WA
Job Title: “Information Security Specialist” (Cybersecurity analysis)
Duration: 9+ Months (with high possibility of extending into full time)
Job Description:
This position is in Corporate Information Security and under the direction of the Manager, Third-Party Cybersecurity Assessments. The Cybersecurity Assessment Analyst will perform cybersecurity assessments on new and existing third parties. The Analyst will construct detailed and summary reports of assessments, including customized reports, as needed. The Analyst will work with Subject Matter Experts (SME) to develop and apply risk assessment criteria (aligned with Policy) to new and existing suppliers using internal and external business intelligence. The Analyst will work with Third-Party Risk Management, Privacy and Legal Counsel, Procurement and Contract Managers, Compliance, and Business Owners to develop and maintain an internal service model that informs the business of key risks in a timely manner to limit unnecessary impediments and avoid bureaucracy.
Specific responsibilities:
- Coordinate the development of information security policies, standards and procedures. Work with key IT offices, data custodians and governance groups in the development of such policies. Ensure that company policies support compliance with external requirements. Oversee the dissemination of policies, standards and procedures to the user community
- Coordinate the development and delivery of an education and training program on information security and privacy matters for employees, other authorized users, and vendors
- Serve as the company compliance officer with respect to state and federal information security policies and regulations. Work with the -designated internal audit, SOX compliance, legal, and HR on compliance issues as necessary. Prepare and submit and submit required reports to external agencies.
- Develop and implement an Incident Reporting and Response System to address security incidents (breaches), respond to alleged policy violations, or complaints from external parties.
- Serve as the official company contact point for information security, privacy and copyright infringement incidents, including relationships with law enforcement entities.
- Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing.
Required Qualifications:
Talent management, results focus and inspirational leadership.
Essential Functions
• Conduct third-party cybersecurity risk assessments, applying established criteria
• Support assessment team with quality assurance reviews over work product and reporting
• Collaborate with internal partners and third parties to mitigate and otherwise resolve third-party cyber risks
• Consistently deliver on commitments, deadlines and objectives while remaining in scope and leveraging appropriate tools, methods, frameworks, and professional standards
• Demonstrate consistent credibility with business partners and leadership while recommending initiatives, identifying gaps, and potential issues
• Continuously demonstrate the ability to work independently while representing the services of the department with the highest level of professionalism
• Demonstrate the ability to appropriately influence business decisions, and the professional judgment for selecting the appropriate methods and techniques to do so
Preferred Qualifications:
• Solid background both educationally and via professional experience. No less than 3 years' professional experience in business operations, project/program management, finance, risk management, information security, business analytics or similar.
• Experience in large companies and/or complex environments, or providing professional consulting services for them.
• Demonstrated abilities in problem-solving and analysis: identifies issues, analyses information to assess root cause and relationships, risks, and potential risk responses. Proven ability to synthesize and summarize complex data into concise recommendations and reports.
• Demonstrated strong business writing and professional oral communication skills.
• Proven ability to balance multiple priorities, adapt to a constantly changing business environment, work independently, drive projects to completion, and meet deadlines in a fast-paced environment-with only periodic supervision.
• Ability to work collaboratively and manage and initiate effective cross-functional relationships.
• Strong computer skills, including MS Office products (e.g. Word, Excel, PowerPoint, Visio) and other business software to prepare reports, memos, summaries, and analyses.
Desired
• Analytical - Synthesizes complex or diverse information; Collects and researches data; employs intuition and experience to complement data; Designs work flows and procedures.
• Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness. Applies feedback to improve performance; Monitors own work to ensure quality
• Planning/Organizing - Prioritizes and plans work activities to achieve success; Sets and achieves goals and objectives; Develops realistic action plans
• Professionalism - Reacts well under pressure; Keeps commitments; Accepts responsibility for own actions.
• Career Growth: Focus on cybersecurity auditing with potential advancement goals in engineering or threat analysis roles
• Self-directed team player with Agile environment experience
Education
Minimum Required
• Bachelor's Degree
• Equivalent experience is acceptable.
License or Certification
Desired: (one of the following):
CISA (Certified Information Systems Auditor)
GSEC (GIAC Security Essentials Certification)
CompTIA - Security+
ECSA - EC-Council Certified SecurityAnalyst
SSCP (Systems Security Certified Practitioner)
Other:
Six Sigma, PMP or Agile certificates
Other comments - suppliers:
Organizational skills; office suite knowledge; and good communication skills are “must haves”. Cybersecurity analysis experience is preferred.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$85k-126k yearly est. 60d+ ago
Information Systems Security Officer (ISSO) Senior
Avint
Cyber security analyst job in Washington
Avint LLC is seeking a highly motivated, solution-oriented, and customer-focused Information Systems Security Officer (ISSO) III to join our growing team. We are looking for a senior-level ISSO who is confident working independently and demonstrates deep technical and operational expertise.
**This position is 100% on-site
1750 Pennsylvania Ave, Washington, DC***
Requirements
Responsibilities:
Provide subject matter expertise to ensure compliance with Treasury, DHS, and NIST cybersecurity policies and frameworks.
Support the implementation and sustainment of security controls in alignment with the NIST Risk Management Framework (RMF).
Responsibility for and to assist system owners in maintaining system Authorization to Operate (ATO) status.
Enhance Treasury's ability to measure, report, and manage cybersecurity posture and control effectiveness at a maturity level consistent with OIG FISMA Metrics Level 4 (“Managed and Measurable”).
Strengthen collaboration and information sharing across internal Treasury offices and external partners to support cybersecurity risk reduction and resilience.
Position Requirements:
US citizen without dual citizenship
Ability to obtain a Public Trust clearance
Currently possess at least 8570 IAT II certification
Thorough knowledge of and experience with executing the seven key steps of the Risk Management Framework (RMF)
Thorough knowledge of and experience with completing the components of a FedRAMP system package, to include the System Security Plan (SSP) and the Control Implementation Summary (CIS)/Customer Responsibilities Matrix (CRM)
Experience with security control implementation statement development and testing
Familiarity with AI-based systems
Benefits
Joining Avint is a win-win proposition! You will feel the personal touch of a small business and receive BIG business benefits. From competitive salaries, full health, and generous time off and Federal Holidays. Additionally, we encourage every Avint employee to further their professional development. To assist you in achieving your goals, we offer reimbursement for courses, exams, and tuition. Interested in a class, conference, program, or degree? Avint will invest in YOU and your professional development!
Salary range $115,000-125,000
$115k-125k yearly Auto-Apply 22d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Olympia, WA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Information Systems Security Officer
Demand Drive Solutions 3.1
Cyber security analyst job in Washington
Job Title: Information Systems Security Officer (ISSO)
Salary: - $110,000 $120,000 / yr
Roles and Responsibilities:
Services to support IS Security performed by the Senior Cloud Information System Security Officer (ISSO), at a minimum, shall consist of the following activities:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
Provide liaison support between the system owner and other IS security personnel
Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Ensure that system security documentation is developed, maintained, reviewed, and updated continuously
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs)
Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an agency IS, its environment, and operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Provide baseline security controls to the system owner, contingent upon the ISs security categorization, type of information processed, and entity type
Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems impact levels and ISs authorization boundary
Ensure that new entities are created in the GRC application with the security categorization of agency ISs
Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreements (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
Perform an independent review of the System Security Plan (SSP) and make approval decisions
Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official
Schedule security control assessments in coordination with the system owner.
Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
Advise the agency's authorized official on IS vulnerabilities and residual risks.
Ensure that all POA&M actions are completed and tested
Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
Ensure the removal and retirement of agency ISs being decommissioned in coordination with the SO, ISSM, ISSE, and ISSR
What are the 3-4 non-negotiable requirements of this position?
Active U.S. Government (DoD-Issued) Top Secret Security Clearance with SCI and a CI-Polygraph eligibility.
At least 5 years serving as an Information Systems Security Officer (ISSO) at a cleared facility DoD Instruction 8570.1
Information Assurance Management (IAM) Level III Certification
What are the nice-to-have skills?
A bachelors and/or advanced degree in computer science, business management, or IT-related discipline
$110k-120k yearly 60d+ ago
Security Engineer - Full Time, Day Shift
Island Health Careers
Cyber security analyst job in Anacortes, WA
Island Health is searching for an experienced Security Engineer for our full-time day shift at our hospital in Anacortes, WA.
Work Schedule:
1.0 FTE/Full Time
Day Shift, Exempt Status
On-site, does not offer remote capabilities
For Information on Employee Benefits
Annual Salary Range: $104,163 - 156,223
Why Choose Island Health?
Whether you're a new grad or experienced in your field and considering a change, we invite you to explore a wide range of careers at Island Health with exceptional benefits including:
Medical, Vision, & Dental Insurance
Paid Time Off
Extended Illness Benefit
Life Insurance
Long-Term Disability
Vested Retirement Contribution
Flexible Spending Account
Tuition Reimbursement
Employee Assistance Program
Employee Recognition Events
And More!
Duties:
Responsible for establishing, documenting, and maintaining security standards across all Island Hospital systems and networks.
Responsible for security hardware and software configuration, including but not limited to Firewalls, IDS/IPS, Web & Mail Filtering, Endpoint Security products.
Responsible for identifying, defining, documenting and communicating security risks and vulnerabilities to leadership.
Responsible for Incident Response planning, implementation, and execution
Coordinates efforts with systems, network, operations, and technical support staff to establish and modify network configurations to ensure quality, integrity, and performance.
Monitors network performance and resolves problem areas as needed.
Owns, tracks, and resolves security related issues and requests.
Develops and maintains policies and procedures for network implementation, usage, and disaster recovery in cooperation with Network and Systems Engineers.
Provide backup support for the Systems Engineer and/or Network Engineer as required.
Skills/Qualifications:
Professional experience and detailed technical knowledge in multiple areas of security engineering, system and network security, authentication and security protocols.
Experience in building and maintaining security systems.
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Working knowledge of risk and security frameworks, standards, and best practices (e.g. NIST, ISO, SANS Critical Security Controls).
Experience with HIPAA and PCI.
Knowledge of Public Key Infrastructure (PKI) configuration and management.
Experience managing VoIP phone systems · Proven project management skills.
Strong analytical and problem-solving abilities. · Strong interpersonal, written, and oral communication skills.
Highly self-motivated and directed, with keen attention to detail and follow-through attitude.
Able to prioritize and execute tasks in a high-pressure environment.
Ability to flourish in a team-oriented, collaborative environment.
Ability to work independently and as part of a project team.
Ability to work extended hours to meet deadlines as necessary.
May provide leadership and/or direction to lower level employees.
Staff must recognize age differences and respond appropriately to their needs.
Requirements:
Minimum two years Security Engineer experience and two years systems or network administration required. Healthcare experience desirable.
Minimum one-year supervising technical staff preferred.
Minimum two-year technical degree preferred. CISSP certification preferred. Relevant work experience or certifications may be substituted for degree requirement.
Work Environment & Physical Demands:
While performing the duties of this position, the employee is exposed to inside environmental conditions, protected from weather conditions but not necessarily from temperature changes. The employee may be exposed to dust, pollens, pollutants, fumes and communicable diseases as related to a health care environment. The noise level in the work environment is usually moderate. While performing the responsibilities of this position, the employee is regularly required to talk, and have hearing sufficient to understand conversations, both in person and on the telephone. The employee is often required to sit for potentially long periods of time throughout the workday. Manual dexterity of hands and fingers, to handle or feel and to manipulate keys on a keyboard. The employee is occasionally required to stand; walk, climb or balance; stoop, kneel, or crouch; lift and/or move up to 25 pounds and use hands to finger, handle, or feel objects, tools, or controls, and reach with hands and arm. Vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus sufficient to operate computer systems. Reasonable accommodation can be made to enable people with disabilities to perform essential functions of this position in relation to the physical demands detailed above.
Join our award-winning team and apply today!
$104.2k-156.2k yearly 60d+ ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Cyber security analyst job in Washington
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cybersecurity and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cybersecurity policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cybersecurity risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
$80k-110k yearly est. Auto-Apply 31d ago
Information Systems Security Officer (ISSO)
Anavation
Cyber security analyst job in Washington
Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
Description of Task to be Performed:AnaVation is seeking a mid-level ISSO for our mission critical customer in Washington, DC. You will work as part of a highly talented team providing security compliance expertise on high priority projects. Daily duties include, but are not limited to:· Developing, maintaining, and assessing Security Assessment & Authorization (SA&A) packages resulting in an authority to operate (ATO) for IT systems.· Creating and maintaining SSPs and supporting documentation in accordance with agency guidelines and directives. This includes writing implementation statements, creating supporting documentation (e.g., contingency Plans, Incident Response Plans, Account Management Plans, etc.), and performing self-assessments, while working with system stakeholders.· Develop, coordinate, test, and train personnel on Incident Response Plans and Contingency Plans.· Ensuring that information systems are accredited, maintain their ATO, and are being continuously monitored.· Performing risk assessments for government systems, to include cloud-based systems.· Performing security control assessments to include collecting supporting artifacts/evidence and interviewing system owner/owner representatives.· Having an in-depth knowledge of the Risk Management Framework (RMF).· Maintaining and tracking system POA&Ms.· Conducting vulnerability management and analysis.· Reviewing and analyzing government policy.· Improving on processes and procedures and making recommendations to improve the security posture of the agency's IT systems and applications.
This position requires a Top-Secret clearance with SCI eligibility and the ability to obtain a CI Poly. This position is on-site in Washington DC with no remote option.Required Qualifications:
Bachelor's in Computer Science, or other related analytical, scientific, or technical discipline
4+ years' experience with NIST, FISMA, and Security Assessment & Authorization.
Knowledgeable on various security-related NIST publications (e.g., SP 800-53r5, SP 800-53A, SP 800-18r1, etc.)
In-depth knowledge of information security principles, methodologies, and best practices.
Experience in conducting risk assessments and implementing security controls.
Proficiency in using security tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability management tools.
Knowledge of incident response procedures.
Obtain a CI Poly.
Can be on-site 5 days a week.
Preferred Qualifications:
Desirable Qualifications (Education/Certificates, Experience, Physical, etc.):
Certifications: CISSP
FedRAMP and Cloud experience (e.g., Azure, AWS, Oracle (OCI))
Hands-on experience using a Governance, Risk, and Compliance tool, such as CSAM or eMASS.
Ability to conduct gap analysis on non-federated vendor audit results, such as SOC Type 2, HIPAA comparison review and analyst against NIST SP 800-53 Revision 5 security controls.
Ability to accurately manage complex workstreams, comprehend the application of the RMF, and understand the application of security controls across the interface, application, operating system, network, and database layers of modern information systems. Understand the applicable artifacts used as evidence to assess compliance.
Experience with multiple tools providing security functions such as vulnerability management (e.g., Nessus), configuration management (e.g., BigFix, SCCM, ePO), endpoint protection (e.g., antivirus, ATP), data loss prevention, and intrusion detection software and hardware.
Ability to evaluate data flows, network diagrams, and logical security boundaries.
Familiarity with the use of data analysis tools, including the use of Microsoft Excel or PowerBI to combine data from multiple sources.
Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance
About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team.
If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you!
AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
$80k-110k yearly est. Auto-Apply 60d+ ago
Information System Security Officer
Nalley Consulting
Cyber security analyst job in Washington
Nalley Consulting is seeking Information System Security Officers in metro Washington, D.C.
Information System Security Officer (ISSO) LCAT: Mid and Senior Required clearance: TS/SCI with willingness to take CI poly
Required experience: At least 10 years for Senior; at least 6 years for Mid.
Required education: Bachelor's degree or master's degree
Description:
The ISSO ensures system, network, and security appliance auditing, virus scanning, and hardware and software configuration management requirements are executed as defined in client-approved system assessment documentation and policy. Additionally, the ISSO monitors the activities of program system administrators to ensure all relevant security procedures are followed.
Requirements:
Experience applying security systems concepts, requirements, design development, implementation, and integration to information systems
Knowledge of the Risk Management Framework (RMF), performing system assessment and authorization through a Governance, Risk, and Compliance (GRC) tool
Knowledge of risk mitigation and selecting and designing appropriate security controls for implementation
Knowledge of incident response and data loss prevention, detection, and response
Knowledge of the NIST and Federal Information Security Management Act (FISMA) requirements for monitoring and reporting
Other desired areas:
Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tools
Experience with cyber related tools such as Ansible, Terraform, Splunk, or STIG Viewer
Bachelor's degree in IT, Cybersecurity, Data Science, Information Systems, or CS
DoD 8570 IAT or IAM Level III Certification such as CISSP Certification
AWS Solutions Architect or Certified Security - Specialty Certification
ABOUT NALLEY CONSULTING
Nalley Consulting is a Service Disabled Veteran Owned Small Business working with prime partners to staff Department of Defense and Intelligence Community positions. Created by a U.S. Navy intelligence veteran, Nalley Consulting has grown to include multiple IDIQ vehicles in several states.
Nalley Consulting fringe benefits include:
Excellent medical, dental, and vision benefits
PTO
11 paid federal holidays
Tuition assistance
Paid military-reserve leave
Paid parental leave for birth or adoption
401k matching up to 5 percent of the base salary
Flex time
Company-paid short-term disability, long-term disability, and life insurance.
$80k-110k yearly est. Auto-Apply 60d+ ago
FSR Information Systems Security Officer (ISSO)
PVM, Inc.
Cyber security analyst job in Washington
FSR ISSO
On-Site: Washington, DC
TS Clearance with SCI eligibility required
PVM, Inc. is looking for a dedicated and motivated Information System Security Officer (ISSO) to join our team. In this role, you will collaborate with engineers and key stakeholders to ensure security policies and settings are properly implemented, build standardized security documentation, and generate compliance evidence. As an ISSO, you will play a critical role in deploying software solutions that support our customers' most mission-critical needs.
Responsibilities
Secure Authorization to Operate (ATO) approvals for software across multiple customer projects with minimal oversight.
Collaborate with engineers to assess software, interpret security requirements, and implement effective security controls.
Deliver exceptional customer service, provide policy guidance, and produce high-quality security documentation.
Act as the primary on-site cybersecurity and compliance point of contact for one or more customers, addressing security-related inquiries and requirements.
Independently analyze vulnerability scan results from tools such as ACAS (Tenable Nessus) and SCAP (STIG benchmark) and manage the Plan of Actions and Milestones (POA&M) to track and remediate security findings.
Requirements
Active U.S. DoD Top Secret clearance with SCI eligibility.
Active DOD 8140 or 8570 Certification (e.g. CISSP or Security+).
Active IAT II certification.
Minimum 2 years experience directly supporting a customer's ATO/RMF process.
Proven experience using the eMASS or XACTA accreditation management software systems.
Be at customer site 5 days per week.
Tools
Proficiency in interpreting and communicating government policy to a diverse audience.
Specific experience working in both traditional on premises environments and cloud environments such as Amazon Web Services (AWS).
Experience accrediting IT systems against U.S. Government standards including NIST SP 800-53, CNSSI 1253, and the DISA STIGs, using frameworks like DOD RMF, ICD 503, or DIACAP.
Skills
Strong communication skills with the ability to break down, explain, and demonstrate complex concepts in an easy-to-understand manner
Ability to multitask under pressure, using time management and organizational skills.
Initiative in proactively identifying problems before they arise and creativity in proposing solutions.
Ability to travel up to10% of the time if needed
Ability to work independently and as part of a team.
Why PVM?
At PVM, we mean it when we say we value diversity. As a PVM team member, you will work with people from all different backgrounds that are passionate about the problems we solve for our customers and are focused on delivering value for our clients. Our culture encourages problem solving, leadership, and innovation, and creates an environment that will support your professional and personal growth. Here are a few highlights of the advantages of being a part of the PVM community:
Opportunities for growth and advancement
Tuition/Training reimbursement
Peer bonus program
Remote and on-site positions available
Unlimited PTO
Flexible work schedule
PVM delivers digital services that help government agencies unlock the power of their data for good and maximize the value of their technology investments. We design, develop, and deploy solutions to solve mission-critical problems. PVM is a black- and service-disabled veteran-owned small business and was founded by a retired Naval officer out of frustration with the status quo with one goal in mind: to help his fellow Shipmates solve the problems they were facing every day. Today, we continue to be driven by that same goal, and are focused on taking on our clients' missions as our own to make a difference in the communities we serve.
PVM believes in equal opportunity employment. We won't discriminate against any employee or applicant based on race, gender, nationality, age, religion, disability, military status, or sexual orientation. As a company and as individuals, we're committed to providing an inclusive and welcoming environment for our team, our family members, and our clients.
$80k-110k yearly est. Auto-Apply 15d ago
Information System Security Officer (ISSO)
Spry Methods 4.3
Cyber security analyst job in Washington
Who We're Looking For (Position Overview):This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.What Your Day-To-Day Looks Like (Position Responsibilities):
Serve as the principal cybersecurity advisor to system owners and stakeholders.
Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions.
Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities.
Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability.
Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments.
Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO).
Responsible for ensuring operational security is maintained for assigned information systems.
Ensure systems are operated, maintained, disposed of in accordance with security policies and practices.
Perform Security Incident Reporting and Response.
Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process.
Ensure audits and reviews are responded to with accurate information.
Perform system access control responsibilities.
Participate in the change management process for assigned applications.
Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle.
Perform continuous system security monitoring.
Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management.
Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented.
Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures.
Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan.
Responsible for ensuring the implementation and maintenance of annual security controls assessments.
Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations.
Working directly with development, platform, and infrastructure teams on security problems.
What You Need to Succeed (Minimum Requirements):
Top Secret (TS) Clearance with SCI eligibility.
3 - 5 years of experience required.
Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA.
Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure.
Analyze logs using Splunk and AWS tools.
Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk.
Work with GRC tools such as Xacta/JCAM
Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP
Experience using Atlassian suite tools such as JIRA/CONFLUENCE
Experience with Agile Methodologies/SAFe
Expertise on Information Security Principles, processes and guidelines
Able to obtain and maintain an Authority to Operate (ATO) for Information Systems.
Experience with scanning tools such as Tenable Nessus
Ability to work on multiple projects with various timelines, at times very short deadlines.
Ideally, You Also Have (Preferred Qualifications):
Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security - Specialty, or other relevant certifications.
Experience in a high-side or multi-enclave (U/S/TS) environment.
Experience working with Agile development teams and CI/CD pipelines.
Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible).
Familiarity with NIST 800-53 Rev. 5
$80k-108k yearly est. Auto-Apply 60d+ ago
Security Engineer, Operating Systems
Anthropic
Cyber security analyst job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The annual compensation range for this role is listed below.
For sales roles, the range provided is the role's On Target Earnings ("OTE") range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
Your safety matters to us. To protect yourself from potential scams, remember that Anthropic recruiters only contact you ******************* email addresses. Be cautious of emails from other domains. Legitimate Anthropic recruiters will never ask for money, fees, or banking information before your first day. If you're ever unsure about a communication, don't click any links-visit anthropic.com/careers directly for confirmed position openings.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
$79k-113k yearly est. Auto-Apply 2d ago
Electronic Security Systems Project Engineer
USA Thornton Tomasetti
Cyber security analyst job in Washington
Thornton Tomasetti applies engineering and scientific principles to solve the world's challenges. An independent organization of creative thinkers and innovative doers collaborating from offices worldwide, our mission is to bring our clients' ideas to life and, in the process, lay the groundwork for a better, more resilient future. We provide support and opportunities to our employees to achieve their full potential and cultivate a rewarding career.
The Role
The Electronic Security Systems Project Engineer is responsible for all security technology design on a wide range of commercial, educational, sports, entertainment, government, and infrastructure project types. This position will integrate with a dynamic, diverse and growing Thornton Tomasetti security team conducting Threat, Vulnerability, Risk Assessments, as well as physical security design and consulting, and will include advising our clients through planning, design, and construction. The engineer will be responsible for providing innovative security technology solutions through design and consulting in addition to supporting RFP/RFQ responses for obtaining new project work. This role will require some travel to project sites to attend meetings with clients. The success of this position will be delivered through innovative solutions, communications, and teamwork, as well as a proactive attitude and a strong drive for excellence.
Responsibilities
Responsible for Electronic Security System design and consulting.
Integration of technical and system security requirements, including, but not limited to Access Control, intrusion detection systems (IDS), video surveillance systems (VSS), and duress systems, into the overall security design drawings/models.
Maintain familiarity with current and emerging electronic security vendors and solutions such as access control, video surveillance, intrusion detection, biometrics, barriers, etc.
Conduct large scale security audits and assessments.
Work closely with vendors to develop solutions that exceed our clients' expectations.
Write technical reports summarizing results, recommended security solutions, risk mitigation measures, and transition to technology implementation.
Create and maintain product specifications.
Coordinate directly with clients and other project team members.
Requirements
Bachelor's Degree in technical/STEM discipline
5+ years of relevant work in security technology and integration preferred
Experience supporting DoD , Federal Government IT infrastructure, and/or Data Centers including IT infrastructure for Electronic Security Systems (ACS / IDS / VSS / Biometrics), is strongly preferred
Revit Modeling Experience (navigating models and developing drawings)
PSP certification preferred
Excellent verbal and technical writing skills
Self-motivated and team-oriented with a passion to innovate
Capable of attaining a United States Security Clearance
Compensation
The rate for this position generally is $90,000 - $115,000 annually. Actual pay rates may vary from the range, as permitted by District of Columbia Equal Pay Transparency Law. Compensation offers will be based on various factors, including operational needs, individual education, qualifications and experience, work location and comparison to employee already in the role, as well as other considerations permitted by law. A potential new employee's pay history will not be used in compensation decisions.
Benefits
Depending on your employment status, benefits may include:
Medical, Dental, Vision, Life, AD&D, Disability and other voluntary benefits
Flexible Spending Accounts for Medical and Childcare
Paid Time Off, Family Leave for New Parents, Volunteer Time
Tuition Reimbursement
Commuter Transit (where available)
401k retirement savings with Company matching on employee contributions and/or qualified student loan repayments
Fitness Reimbursement
And other various wellness, diversity/inclusion and employee resource programs and initiatives
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Thornton Tomasetti is proud to be an equal employment workplace. Individuals seeking employment at Thornton Tomasetti are considered without regards to age, ancestry, color, gender (including pregnancy, childbirth, or related medical conditions), gender identity or expression, genetic information, marital status, medical condition, mental or physical disability, national origin, protected family care or medical leave status, race, religion (including beliefs and practices or the absence thereof), sexual orientation, military or veteran status, or any other characteristic protected by federal, state, or local laws.
Thornton Tomasetti Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at Thornton Tomasetti are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application you will be asked to confirm your agreement with the terms.
Beware Of Recruitment Fraud: Scammers may attempt to impersonate Thornton Tomasetti. Messages from our firm come only from the ThorntonTomasetti.com domain, Thornton Tomasetti does not use any third-party recruiters. When in doubt, please contact us through our web form here and see how you can protect yourself online here.
How much does a cyber security analyst earn in Bellingham, WA?
The average cyber security analyst in Bellingham, WA earns between $69,000 and $128,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Bellingham, WA