Computer Security System Specialist
Cyber security analyst job in Bethesda, MD
GovCIO is currently hiring for a Computer Security System Specialist for our NIH-CIT proposal. This position will be located in Bethesda, MD and is a remote/hybrid position
Responsibilities:
Communicate, investigate, triage, monitor, and respond to security incidents, events, alerts, and issues according to standard operating procedures and in collaboration with NS Operations
Contribute to alert thresholds refinements and contribute to continuous improvements to the Security Section for the benefit of customer satisfaction
Qualifications:
Bachelor's with 5 - 8 years of cyber system security experience (or commensurate experience)
Clearance Required:Ability to maintain a Public Trust clearance
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $115,000.00 - USD $115,000.00 /Yr.
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Germantown, MD
Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate data and cyber security risks. Develops acceptance criteria for cybersecurity architecture.
Investigates computer and information security incidents to determine extent of compromise to national security information and automated information systems.
Assists with defining security objectives and system-level performance requirements.
Researches and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities.
Configures and validates secure systems, tests security products/systems to detect computer and information security weaknesses.
Maintains the computer and information security incident, damage and threat assessment programs.
Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
Involved in the periodic conduct of a review of each system's audits and monitors corrective actions until all actions are closed.
Supports the development of integrated system solutions ensuring proprietary/confidential data and systems are protected.
Involved in the establishment of strict program control processes to ensure mitigation of risks and supports obtaining certification and
accreditation of systems.
Minimum Qualifications
Bachelor's Degree in Computer Science or a related field or equivalent experience.
2-4 years of experience in systems security.
Other Job Specific Skills
Must be able to communicate effectively and clearly present technical approaches and findings.
Exercises a limited degree of latitude in determining technical objectives of assignments.
Excellent attention to detail.
Must be able to balance multiple tasks simultaneously.
#cjpost
Cyber Security Engineer (W2 Contract only)
Cyber security analyst job in Silver Spring, MD
Role: Cybersecurity Engineer III
Contract
Job Responsibilities / Typical Day in the Role
Implement design reviews to evaluate security controls
Identify and communicate opportunities to enhance the security posture of Client
Build and / or manage enterprise security platforms effectively
Communicate effectively across all levels of management to articulate Client security goals and vision.
Identify and communicate opportunities to enhance the security posture of Client
Build and / or manage enterprise security platforms effectively (SAAS, on premise or in Cloud)
Communicate effectively across all levels of management to articulate Client security goals and vision.
Have a team player mentality; strive to contribute to team cohesion however can work independently if the need arises
Plan, design, engineer and implement security-related technologies
Understanding technical security issues, their implications within Client business units and able to effectively communicate them to management and other business leaders.
Configure, troubleshoot, and maintain security infrastructure - including software and hardware in cloud environments, as well as on-premises.
Conduct security audits and assessments to regularly determine the effectiveness of security platforms and identify areas of improvement.
Host and operating systems hardening, auditing, monitoring and logging with appropriate security controls and best practices while meeting security best practices and business goals
Research and explore emerging security technologies and determine their appropriate use within the company.
Prepare, document, and create standard operating procedures and protocols.
Crosstrain and mentor other team members as needed
Must Have Skills / Requirements
Implementing advanced cyber security technology in a complex environment
5+ years of experience; Hands-on experience in security engineering, hands-on experience in building, designing, and maintaining enterprise security tools.
Scripting experience (using Python, Go, or other equivalent languages)
5+ years of experience.
Hands-on Experience with automation technologies
3+ Years of experience; Terraform, Ansible, CloudFormation, etc.
Linux Experience.
5+ years of experience; Ability to construct and maintain complex network infrastructures.
Technology requirements:
Engineer and administer security platforms including SIEM/SOAR systems, endpoint detection and response, vulnerability management, anomaly detection, and cloud analysis.
Experience in managing the Brinqa vulnerability management platform and experience with Groovy programming language
Must have 5+ years of scripting experience (using Python or other equivalent languages)
Hands-on Experience in public cloud infrastructures like AWS (Amazon Web Services)
Nice to Have Skills / Preferred Requirements
Security and Cloud certifications are a plus. (CISSP, Splunk Admin, AWS Solution architect).
Media/entertainment or distributed global network experience.
Soft Skills
Hands-on technical experience with networking and computing system architectures, specifically, the security aspects thereof.
Thorough understanding of information security principles, techniques, principles, policy frameworks, and best practices
Hands-on technical experience with compliance and regulatory frameworks and how they affect architecture designs and review
AI Security Analyst
Cyber security analyst job in Allentown, PA
IT Security Analyst II - AI & Emerging Technology Security (Contract)
We are seeking a Junior to Mid-Level IT Security Analyst with hands-on exposure to AI, Generative AI, and Agentic AI security. This role supports a Product Security organization focused on implementing security guardrails for AI-enabled applications. You will work closely with Data, AI, and Product teams to secure machine learning pipelines, large language models, and agent-based systems in a cloud-native enterprise environment.
Key Responsibilities
Embed security controls into AI/ML models, LLM-based applications, and agentic workflows across the SDLC
Conduct security reviews of Generative AI, traditional ML models, and supporting data pipelines
Identify and mitigate AI-specific threats such as prompt injection, data poisoning, model abuse, and insecure agents
Support and apply AI security standards aligned with NIST, ISO, and emerging AI governance frameworks
Partner with legal, compliance, and privacy teams on AI risk management and regulatory requirements
Assist in evaluating and operating AI security and observability tools for model monitoring and data protection
Contribute to internal guidance and training on secure AI development practices
Required Qualifications
Bachelor's degree in Computer Science, Information Security, or related discipline
2+ years of experience in cybersecurity, with exposure to AI/ML environments
Experience with cloud-native security concepts and threat modeling
Understanding of AI/ML concepts including model training, inference, data labeling, and adversarial attacks
Familiarity with core security domains such as authentication, encryption, network security, and IAM
Strong communication and collaboration skills within agile or SAFe-based teams
Preferred / Nice-to-Have Skills
Experience with AI security platforms such as Zenity or HiddenLayer
Familiarity with Microsoft security and AI governance tooling, including:
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Azure AI Content Safety
Microsoft Purview (data governance / DLP)
Exposure to Power Platform, Power BI, or low-code environments, especially implementing DLP or data governance controls
Experience with AI model governance or AI security programs
Security or cloud certifications (e.g., CCSK, CEH, or AI-focused credentials)
Scripting or automation experience for security testing and validation
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Apply now: Cloud Security Engineer (Principal InfoSec Specialist), location is Hybrid (Philadelphia, PA). The start date is 12/22/25 for this contract-to-hire position.
Job Title: Cloud Security Engineer (Principal InfoSec Specialist)
Location-Type: Hybrid (80% remote, 20% onsite - Philadelphia, PA)
Start Date Is: 12/22/25
Duration: 6-month contract-to-hire
Compensation Range: $80-102/hr on W2 ONLY
Job Description:
Serve as a subject matter expert for cloud security architecture and controls, driving risk-based outcomes and optimizing cloud security operations in a hybrid multi-cloud environment.
Day-to-Day Responsibilities:
Design, implement, and optimize cloud security controls and tools
Support cloud migration and secure cloud services delivery
Collaborate across internal teams and vendors on security architecture
Manage security tools like EDR, SIEM, IAM, CSPM
Lead or support incident response, system hardening, and compliance activities
Participate in audits, risk assessments, and governance forums
Mentor junior InfoSec engineers
Ensure alignment with industry standards and compliance frameworks
Requirements:
Must-Haves:
Bachelor's Degree
12+ years of IT experience, with 6+ years in InfoSec and 3+ years in IAM, RBAC, or related areas
Strong experience with cloud/virtualization technologies (Azure preferred)
Experience with multi-cloud security, identity management, and regulatory compliance
Proficiency in tools like Microsoft Defender, Sentinel/Splunk, Wiz, Entra ID, Terraform
CISSP certification
Nice-to-Haves:
Cloud security certifications (e.g., Azure Security Engineer, AWS Certified Security)
Experience working with high-performance matrixed teams
Familiarity with clinical systems (e.g., Epic, Lawson) and SDLC methodologies
Benefits:
This role is eligible to enroll in both Mondo's health insurance plan and retirement plan. Mondo defers to the applicable State or local law for paid sick leave eligibility
Compliance Security and Microsoft Cloud Analyst
Cyber security analyst job in Maryland
Eccalon is seeking a Compliance Security and Microsoft Cloud Analyst position that will play a critical role in both Cyber Compliance Operations and Cloud Security Engineering. This is a long-term career opportunity ideal for individuals who want to grow both their compliance knowledge and hands-on Microsoft Cloud Security engineering expertise.
The selected candidate will help drive cybersecurity compliance initiatives aligned with Department of Defense (DoD) frameworks (NIST 800-53, NIST 800-171/172, FedRAMP and CMMC L1/L2/L3), while also designing, configuring, and implementing Microsoft Azure Government and M365 GCC High security controls across client environments.
This position offers the ability to advance technical engineering skills, earn high-level security certifications, and grow into a leadership track in cloud security and compliance operations.
Responsibilities
Cloud Security Engineering (Azure Gov and M365 GCC High)
Assist in designing, configuring, and implementing Microsoft Azure Government and M365 GCC High security controls.
Support Azure Gov resource hardening, including Virtual Machines, Key Vaults, Storage Accounts, Defender for Cloud, Sentinel, Azure Policies, and Conditional Access.
Assist with Microsoft 365 GCC High Security & Compliance Center configurations, including DLP, Sensitivity Labels, Insider Risk, and Compliance Manager setup for CMMC and NIST alignment.
Configure and monitor Azure Sentinel Workbooks, Cloud Security Posture Management (CSPM), Defender for Endpoint (Gov), and Defender for Identity integrations.
Conduct Microsoft Secure Score reviews and remediation within GCC High and Azure Gov environments.
Assist in developing automated security monitoring dashboards and reporting using Azure Monitor, Microsoft Sentinel GCC High.
Support Azure network security hardening, including NSGs, ASGs, Private Endpoints, and Firewall rules.
Help develop and document Zero Trust Architecture alignment using Microsoft Cloud-native tools.
Cyber Compliance Operations
Research, identify, and map NIST and DoD cybersecurity controls (NIST 800-53, 800-171/172, FedRAMP (M) and CMMC) to Microsoft Cloud implementations and On-premises environments.
Assist with System Security Plan (SSP), Policies, Procedures, and Plan of Action & Milestones (POA&M) documentation for client environments.
Support control gap analysis, evidence collection, and audit preparation for DoD contractor compliance.
Conduct security control validation testing (manual and automated), for both on-premises and cloud based systems.
Document and report on control effectiveness, remediation plans, and risk mitigation actions.
Assist with preparing security architecture diagrams showing how Microsoft Cloud services map to compliance controls.
Support client teams during external CMMC, NIST, or DFARS audits and assessments.
Help draft and revise Policies, Standards, and Procedures (PSPs) to align with DoD cybersecurity requirements.
Required Qualifications
Bachelor's in Cybersecurity, Cyber Defense or equivalencies.
Strong understanding of Microsoft Azure Government (IaaS/PaaS/SaaS) security configurations.
Hands-on experience with Microsoft 365 GCC High security and compliance solutions.
Familiar with Microsoft Defender XDR stack (Defender for Endpoint, Identity, Office 365, Cloud Apps) for GCC High.
Working knowledge of Azure AD/Entra ID security policies, Role-Based Access Control (RBAC), and Privileged Identity Management (PIM).
Experience with Azure Sentinel deployment and use case creation.
Familiarity with Azure Policy, Blueprints, and Resource Locks for governance and compliance.
Experience in NIST 800-53, 800-171, 800-172, FedRAMP (M) and CMMC L1/L2/L3 control frameworks.
Proficient in security documentation writing for Policies, Standards, System Security Plans, and POA&Ms.
Proficient in network security concepts, firewall rule sets, and enterprise network topology diagrams.
Critical Thinking and Problem Solving
Strong Verbal and Written Communication
Professional and Technical Writing
Collaboration and Teamwork
Multitasking and Task Prioritization
Adaptability and Initiative
Knowledge of Assessment and Audit Management Processes
Preferred Qualifications
Master's degree in information assurance and cyber security.
Strong knowledge of Microsoft Security Best Practices for Cloud (Azure Gov, M365 GCC High).
Ability to interpret DoD contract security clauses (DFARS, CMMC, NIST requirements) and apply them to cloud environments.
Familiarity with Microsoft Compliance Manager and Secure Score tools in GCC High.
Exposure to Defender for Cloud recommendations, regulatory compliance dashboards, and Microsoft Sentinel analytics rules.
Proficient in evaluating data protection (at rest, in transit, and in use) in both cloud and on-premises environments.
Ability to conduct technical research and compliance gap analysis, followed by Microsoft technology specific security remediation steps.
Certifications (Preferred or obtainable within the first 12 months):
Microsoft Certified: Azure Security Engineer Associate - AZ 500
Microsoft Certified: Cybersecurity Architect Expert - SC 100
Microsoft Certified: Information Protection and Compliance Administrator Associate - SC 401
Microsoft Cloud Administration (others): - SC 900 or SC 200 or SC 300
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Behavioral Skills:
Servant Leadership Mindset: Proactively supports the team and organizational mission
Detail-Oriented: Consistently delivers thorough and accurate work
Team-Oriented: Works collaboratively across departments and client teams
Self-Motivated: Able to work independently and seek guidance when needed
Organized and Decisive: Able to manage multiple priorities with efficiency
Interpersonal Effectiveness: Builds strong, positive, and professional relationships
Growth Opportunity
This position offers a dual career track (Cloud Security Engineering + Compliance Operations).
You will gain hands-on Microsoft Cloud Security Engineering expertise, DoD cyber compliance expertise, and management experience, with the opportunity to grow into an Enterprise Compliance & Cloud Security Team Lead role.
Senior Security Engineer
Cyber security analyst job in Columbus, OH
We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below.
Responsibilities:
Design, implement, and maintain security solutions to protect enterprise systems and data
Conduct vulnerability assessments, penetration testing, and risk analysis
Develop and enforce security policies, standards, and best practices
Collaborate with IT and development teams to integrate security into system architecture
Monitor and respond to security incidents, ensuring timely resolution
Qualifications:
5+ years of experience in cybersecurity engineering or related roles
Strong knowledge of network security, application security, and cloud security principles
Experience with security tools such as SIEM, IDS/IPS, and endpoint protection
Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA)
Excellent problem-solving and communication skills
What Our Client Offers:
A critical role in safeguarding enterprise systems and sensitive data
Opportunities to work with cutting-edge security technologies and methodologies
A collaborative environment focused on innovation and resilience
Competitive compensation and comprehensive benefits
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
OT Security Engineer
Cyber security analyst job in Collegeville, PA
Must have an OT background with life sciences experience
Deliver OT security firewall policy design and document
Investigate and deliver appropriate OT architectures for RD systems
Troubleshoot connectivity issues experienced during migration activities
Must be proficient in Palo Alto
Must have an OT background with life sciences experience
Knowledge of supporting technologies, Zscaler, Cisco network infrastructure, Azure, and Google cloud
Good to have
Experience using ServiceNow Preferred RD lab experience, knowledge of lab systems, such as LIMS. HPLC etc
Experience with project software (ADO) Generic US or UK based (US preferred)
Good communicator, role requires frequent conversations with the business
Note : If you are interested please share me your resumes to ********************* or else reach me at **********.
Information Security Specialist
Cyber security analyst job in Horsham, PA
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer - SRE
Cyber security analyst job in Columbus, OH
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Product Security Engineer
Cyber security analyst job in Cleveland, OH
We are looking for a Contract Product Security Engineer to support vulnerability management initiatives within a product security organization. This role is ideal for a security professional who enjoys hands-on analysis, structured problem-solving, and improving security processes through automation and collaboration. You will work closely with engineering and security teams to help identify, assess, and prioritize security risks across software components.
The focus of this project is vulnerability management through Software Bill of Materials (SBOM) analysis. The engineer will review and triage vulnerabilities identified by SBOM scanning tools, assess risk and severity, and support remediation efforts in partnership with cross-functional teams. The role also includes enhancing vulnerability management workflows through scripting and automation, as well as maintaining clear documentation to ensure traceability and compliance within a structured development environment.
What we offer you in USA
We honor the contract terms you prefer.
20 paid vacation days per year
40 working hours per week
Retirement Plan 401(K)
Medical, Dental, Vision Insurance Plan for you and your Family
100% On-Site position in Newton
Responsibilities
Review, analyze, and triage vulnerabilities from SBOM scanning tools
Assess severity and support risk-based prioritization of remediation
Collaborate with engineering, security, and product teams to drive resolution
Track vulnerability status for timely closure
Develop or use scripts/automation to improve vulnerability management
Maintain clear documentation of findings and actions
Requirements
Experience in product security
Proficiency in Python or other scripting languages
Strong analytical skills and attention to detail
Effective collaboration with cross-functional teams
Nice to Have
Experience with vulnerability management programs
Exposure to regulated industries
Familiarity with SBOM management tools (e.g., Dependency Track)
Information Security Engineer - Infrastructure & Compliance(Only w2)
Cyber security analyst job in King of Prussia, PA
Minimum Experience: 10+ Years
Key Responsibilities
Security & Compliance
Serve as divisional lead for NIST 800-171 control alignment, tracking, and remediation.
Partner with Internal Audit and Enterprise Security to review non-compliance findings and drive resolution.
Maintain and improve Defender for Cloud posture management across Azure infrastructure.
Identify, prioritize, and remediate vulnerabilities across infrastructure, networks, and systems.
Develop and implement Linux patch management strategy and compliance reporting.
Contribute to policy documentation and control evidence collection for SOX and NIST readiness.
Infrastructure & Cloud Security Operations
Work closely with Infrastructure, Cloud Ops, and Application teams to assess risk and prevent operational disruption.
Integrate security best practices into Azure, network, and datacenter operations.
Utilize Defender, Azure Security Center, and related tools to monitor and report on environment health.
Coordinate with Cloud and Systems Engineers to validate patch success, compliance metrics, and configuration baselines.
Automate recurring security validation and compliance tasks using scripting (PowerShell, Python, Bash).
Governance, Reporting, and Training
Maintain centralized tracking for security initiatives, audit remediations, and policy adherence.
Partner with PMs to ensure remediation workstreams are integrated into project schedules.
Support KnowBe4 phishing campaign analysis and contribute to security awareness reinforcement.
Report key risk indicators (KRIs) and compliance metrics to leadership.
Required Qualifications
8 years of experience in Information Security, Infrastructure Engineering, or Cloud Operations.
Proven experience with Defender for Cloud, Azure Security Center, or equivalent platforms (e.g., Tanium, Nessus, Qualys).
Working knowledge of NIST 800-171, NIST CSF, or ISO 27001 frameworks.
Experience managing patching and vulnerability remediation across Windows and Linux environments.
Proficiency with scripting or automation tools (PowerShell, Python, Bash).
Familiarity with Active Directory, Azure AD, and network security principles.
Preferred Qualifications
Experience with Fortify or similar static code analysis tools.
Familiarity with KnowBe4, VRX, or patch compliance tracking systems.
Exposure to Azure DevOps, IaC, and configuration-as-code methodologies.
Security or cloud certifications (e.g., AZ-500, Security+, CISSP, or equivalent).
Success Measures
Reduction in open audit findings and non-compliant controls.
Establishment of measurable Linux and infrastructure patch compliance reporting.
Defender for Cloud secure score improvement over baseline.
Defined and repeatable NIST alignment process for divisional systems.
Improved coordination between Infrastructure, Cloud, and Security teams during vulnerability remediation.
If I missed your call ! Please drop me a mail.
Thank you,
Harish
Accounts Manager/Talent Acquisition
Astir IT Solutions, Inc - An E-Verified Company
Email:*******************
Direct : ***********788
50 Cragwood Rd. Suite # 219, South Plainfield, NJ 07080
***************
Security Incident Response Engineer III
Cyber security analyst job in Philadelphia, PA
Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet.
Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization?
About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations.
This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise.
Responsibilities:
Assisting in scoping security incidents and identifying indicators of attack and compromise.
Analyzing incident data from threat analytics tools.
Communicating recommendations and guidance based on security incident analysis.
Coordinating responses to security incidents with other security and consulting teams.
Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response.
Performing security triage and analysis on endpoint, server, and network infrastructure.
Conducting activities necessary for immediate containment and short-term resolution of incidents.
Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities.
Investigating the root cause of complex security incidents.
Maintaining a high level of confidentiality.
Requirements
Possess experience in cybersecurity incident response or related fields.
Proven ability to analyze, triage, scope, contain, and remediate security incidents.
Have current and extensive knowledge of security technologies, tools, and processes.
Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments.
Have current skills in automation using PowerShell, Python, Java, or similar languages.
Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration.
Experience supporting large, complex, and geographically distributed enterprise environments.
Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment.
Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
Senior Information Security Analyst
Cyber security analyst job in Westerville, OH
Salary: 105K-125K w/ 5-10% bonus
Must Haves :
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (Master's degree preferred).
- Minimum of 5-7 years of experience in cybersecurity or information security roles, preferably in a manufacturing or construction environment.
- Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable.
- Strong knowledge of network protocols, firewalls, intrusion detection/prevention systems, and encryption technologies.
- Experience with security tools such as Splunk, CrowdStrike, Cisco Umbrella, Artic Wolf, or similar platforms.
- Proficiency in cloud security (e.g., AWS, Azure) and securing industrial control systems (ICS) is a plus.
- Familiarity with scripting languages (e.g., Power BI, Python, PowerShell) for automation and analysis.
Job Summary
The Senior Cybersecurity/Information Security Analyst will be responsible for overseeing all aspects of information security within the organization. This role involves designing, implementing, and monitoring security measures to protect systems, networks, and data from cyber threats. The ideal candidate will have extensive experience in cybersecurity, working with security SaaS providers, a proactive approach to identifying vulnerabilities, and the ability to collaborate across departments to ensure a secure enterprise environment.
Key Responsibilities
- Develop, implement, and maintain comprehensive information security policies, standards, and procedures.
- Ensure alignment with industry standards such as NIST, CIS, and other relevant frameworks.
- Work with SaaS providers in conducting regular risk assessments and audits to identify vulnerabilities and ensure compliance with regulatory requirements.
- Oversee SaaS provider monitor of networks and systems for security breaches, intrusions, and unusual activity using advanced security tools (e.g., SIEM, IDS/IPS).
- Lead incident response efforts, including investigation, containment, remediation, and documentation of security incidents.
- Perform root cause analysis and implement corrective actions to prevent recurrence.
- Review and contribute to the configuration and maintenance of firewalls, VPNs, endpoint protection, and other security technologies.
- participate in regular vulnerability scans and penetration testing to identify and mitigate risks.
- Ensure secure configuration of cloud, on-premises, and hybrid environments.
- review and recommend cybersecurity training programs to educate employees on best practices and emerging threats.
- Promote a culture of security awareness across the organization.
- Ensure compliance with applicable laws, regulations, and industry standards (e.g., CMMC, NIST, CIS, PCI-DSS).
- Prepare and present reports on security posture, incidents, and compliance to the Manager of Cyber/Information Security and senior leadership.
- Collaborate with IT, operations, and other departments to integrate security into business processes and systems.
- Provide guidance and mentorship to junior members of the cybersecurity team.
- Stay current on emerging threats, technologies, and best practices to recommend improvements to the security program.
Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)
Cyber security analyst job in Annapolis, MD
A day in the life:
As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to):
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity
Document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
What you bring to the table:
Level 1:
A Bachelor's degree in a technical discipline and 2+ years of relevant experience
Experience in malware analysis
Programming experience in C, C#, Java, Perl or Python is preferred
An active TS/SCI with Polygraph
Level 2:
A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active TS/SCI with Polygraph
Level 3:
A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active US Government TS/SCI security clearance with Polygraph
Bonus Skills:
Level 1:
CISSP, GIAC GREM or CREA Certification is preferred
The total package:
Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves
and
their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information.
Salary Range:
Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself.
Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are:
Level 1: $80,000 - $125,000
Level 2: $120,000 - $160,000
Level 3: $140,000 - $180,000
Level 4: $165,000 - $215,000
Some of our additional perks and benefits include:
Retire sooner than planned:
Get closer to retirement with up to 10% in 401k contributions, immediately vested.
Have a career AND a life:
Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays.
Stay at your best:
As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym!
Keep current on new technologies and technological advancements
: $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships.
Dress in style:
Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc.
Enjoy the culture:
Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more!
Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we
bring digital transformation to the fight!
Auto-ApplyIntrusion Analyst
Cyber security analyst job in Columbia, MD
Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security.
In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our Employees, to our Customers and by Improving Performance (ECP).
It's what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results - showing we're ready to meet our customers' evolving demands.
Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services.
Synergy ECP is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected class.
Requirements
A Bachelor's degree and 5 years of relevant experience or a Master's degree plus 3 years of relevant experience or a Doctoral degree and 2 years of relevant experience. An Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
CISSP, CEH, Sec+, Net+, GIAC, GREM, or CREA Certification is required.
Relevant experience must be in malware analysis. Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources.
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis.
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs).
Develop and implement mitigation strategies.
Have a network and/or host-based focus.
Visual Imagery Intrusion Detection System (VIIDS)
Cyber security analyst job in Andrews Air Force Base, MD
Job Description
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
Visual Imagery Intrusion Detection System (VIIDS)
Cyber security analyst job in Andrews Air Force Base, MD
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.