Post job

Cyber security analyst jobs in Clarksburg, WV

- 1,039 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Senior Security Engineer
Intrusion Detection Analyst
Information Systems Security Officer
Securities Analyst
Network Security Analyst
Security Systems Specialist
Information Security Engineer
Senior Information Security Analyst
Senior Information Security Engineer
Cyber Security Engineer
  • Computer Security System Specialist

    Govcio LLC

    Cyber security analyst job in Bethesda, MD

    GovCIO is currently hiring for a Computer Security System Specialist for our NIH-CIT proposal. This position will be located in Bethesda, MD and is a remote/hybrid position Responsibilities: Communicate, investigate, triage, monitor, and respond to security incidents, events, alerts, and issues according to standard operating procedures and in collaboration with NS Operations Contribute to alert thresholds refinements and contribute to continuous improvements to the Security Section for the benefit of customer satisfaction Qualifications: Bachelor's with 5 - 8 years of cyber system security experience (or commensurate experience) Clearance Required:Ability to maintain a Public Trust clearance Company Overview: GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? What You Can Expect Interview & Hiring Process If you are selected to move forward through the process, here's what you can expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented during each interview During the Hiring Process Enhanced Biometrics ID verification screening Background check, to include: Criminal history (past 7 years) Verification of your highest level of education Verification of your employment history (past 7 years), based on information provided in your application Employee Perks At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: Employee Assistance Program (EAP) Corporate Discounts Learning & Development platform, to include certification preparation content Training, Education and Certification Assistance* Referral Bonus Program Internal Mobility Program Pet Insurance Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. Posted Pay Range The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. Posted Salary Range: USD $115,000.00 - USD $115,000.00 /Yr.
    $115k yearly Auto-Apply 4d ago
  • Cyber Security Analyst

    Dunhill Professional Search & Government Solutions

    Cyber security analyst job in Germantown, MD

    Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate data and cyber security risks. Develops acceptance criteria for cybersecurity architecture. Investigates computer and information security incidents to determine extent of compromise to national security information and automated information systems. Assists with defining security objectives and system-level performance requirements. Researches and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities. Configures and validates secure systems, tests security products/systems to detect computer and information security weaknesses. Maintains the computer and information security incident, damage and threat assessment programs. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Involved in the periodic conduct of a review of each system's audits and monitors corrective actions until all actions are closed. Supports the development of integrated system solutions ensuring proprietary/confidential data and systems are protected. Involved in the establishment of strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Minimum Qualifications Bachelor's Degree in Computer Science or a related field or equivalent experience. 2-4 years of experience in systems security. Other Job Specific Skills Must be able to communicate effectively and clearly present technical approaches and findings. Exercises a limited degree of latitude in determining technical objectives of assignments. Excellent attention to detail. Must be able to balance multiple tasks simultaneously. #cjpost
    $74k-101k yearly est. 3d ago
  • Cyber Security Engineer (W2 Contract only)

    CBTS 4.9company rating

    Cyber security analyst job in Silver Spring, MD

    Role: Cybersecurity Engineer III Contract Job Responsibilities / Typical Day in the Role Implement design reviews to evaluate security controls Identify and communicate opportunities to enhance the security posture of Client Build and / or manage enterprise security platforms effectively Communicate effectively across all levels of management to articulate Client security goals and vision. Identify and communicate opportunities to enhance the security posture of Client Build and / or manage enterprise security platforms effectively (SAAS, on premise or in Cloud) Communicate effectively across all levels of management to articulate Client security goals and vision. Have a team player mentality; strive to contribute to team cohesion however can work independently if the need arises Plan, design, engineer and implement security-related technologies Understanding technical security issues, their implications within Client business units and able to effectively communicate them to management and other business leaders. Configure, troubleshoot, and maintain security infrastructure - including software and hardware in cloud environments, as well as on-premises. Conduct security audits and assessments to regularly determine the effectiveness of security platforms and identify areas of improvement. Host and operating systems hardening, auditing, monitoring and logging with appropriate security controls and best practices while meeting security best practices and business goals Research and explore emerging security technologies and determine their appropriate use within the company. Prepare, document, and create standard operating procedures and protocols. Crosstrain and mentor other team members as needed Must Have Skills / Requirements Implementing advanced cyber security technology in a complex environment 5+ years of experience; Hands-on experience in security engineering, hands-on experience in building, designing, and maintaining enterprise security tools. Scripting experience (using Python, Go, or other equivalent languages) 5+ years of experience. Hands-on Experience with automation technologies 3+ Years of experience; Terraform, Ansible, CloudFormation, etc. Linux Experience. 5+ years of experience; Ability to construct and maintain complex network infrastructures. Technology requirements: Engineer and administer security platforms including SIEM/SOAR systems, endpoint detection and response, vulnerability management, anomaly detection, and cloud analysis. Experience in managing the Brinqa vulnerability management platform and experience with Groovy programming language Must have 5+ years of scripting experience (using Python or other equivalent languages) Hands-on Experience in public cloud infrastructures like AWS (Amazon Web Services) Nice to Have Skills / Preferred Requirements Security and Cloud certifications are a plus. (CISSP, Splunk Admin, AWS Solution architect). Media/entertainment or distributed global network experience. Soft Skills Hands-on technical experience with networking and computing system architectures, specifically, the security aspects thereof. Thorough understanding of information security principles, techniques, principles, policy frameworks, and best practices Hands-on technical experience with compliance and regulatory frameworks and how they affect architecture designs and review
    $73k-102k yearly est. 5d ago
  • AI Security Analyst

    Allied Resources Technical Consultants 4.1company rating

    Cyber security analyst job in Allentown, PA

    IT Security Analyst II - AI & Emerging Technology Security (Contract) We are seeking a Junior to Mid-Level IT Security Analyst with hands-on exposure to AI, Generative AI, and Agentic AI security. This role supports a Product Security organization focused on implementing security guardrails for AI-enabled applications. You will work closely with Data, AI, and Product teams to secure machine learning pipelines, large language models, and agent-based systems in a cloud-native enterprise environment. Key Responsibilities Embed security controls into AI/ML models, LLM-based applications, and agentic workflows across the SDLC Conduct security reviews of Generative AI, traditional ML models, and supporting data pipelines Identify and mitigate AI-specific threats such as prompt injection, data poisoning, model abuse, and insecure agents Support and apply AI security standards aligned with NIST, ISO, and emerging AI governance frameworks Partner with legal, compliance, and privacy teams on AI risk management and regulatory requirements Assist in evaluating and operating AI security and observability tools for model monitoring and data protection Contribute to internal guidance and training on secure AI development practices Required Qualifications Bachelor's degree in Computer Science, Information Security, or related discipline 2+ years of experience in cybersecurity, with exposure to AI/ML environments Experience with cloud-native security concepts and threat modeling Understanding of AI/ML concepts including model training, inference, data labeling, and adversarial attacks Familiarity with core security domains such as authentication, encryption, network security, and IAM Strong communication and collaboration skills within agile or SAFe-based teams Preferred / Nice-to-Have Skills Experience with AI security platforms such as Zenity or HiddenLayer Familiarity with Microsoft security and AI governance tooling, including: Microsoft Defender for Cloud Microsoft Defender for Cloud Apps Azure AI Content Safety Microsoft Purview (data governance / DLP) Exposure to Power Platform, Power BI, or low-code environments, especially implementing DLP or data governance controls Experience with AI model governance or AI security programs Security or cloud certifications (e.g., CCSK, CEH, or AI-focused credentials) Scripting or automation experience for security testing and validation
    $72k-105k yearly est. 3d ago
  • Cloud Security Engineer

    Mondo 4.2company rating

    Cyber security analyst job in Philadelphia, PA

    Apply now: Cloud Security Engineer (Principal InfoSec Specialist), location is Hybrid (Philadelphia, PA). The start date is 12/22/25 for this contract-to-hire position. Job Title: Cloud Security Engineer (Principal InfoSec Specialist) Location-Type: Hybrid (80% remote, 20% onsite - Philadelphia, PA) Start Date Is: 12/22/25 Duration: 6-month contract-to-hire Compensation Range: $80-102/hr on W2 ONLY Job Description: Serve as a subject matter expert for cloud security architecture and controls, driving risk-based outcomes and optimizing cloud security operations in a hybrid multi-cloud environment. Day-to-Day Responsibilities: Design, implement, and optimize cloud security controls and tools Support cloud migration and secure cloud services delivery Collaborate across internal teams and vendors on security architecture Manage security tools like EDR, SIEM, IAM, CSPM Lead or support incident response, system hardening, and compliance activities Participate in audits, risk assessments, and governance forums Mentor junior InfoSec engineers Ensure alignment with industry standards and compliance frameworks Requirements: Must-Haves: Bachelor's Degree 12+ years of IT experience, with 6+ years in InfoSec and 3+ years in IAM, RBAC, or related areas Strong experience with cloud/virtualization technologies (Azure preferred) Experience with multi-cloud security, identity management, and regulatory compliance Proficiency in tools like Microsoft Defender, Sentinel/Splunk, Wiz, Entra ID, Terraform CISSP certification Nice-to-Haves: Cloud security certifications (e.g., Azure Security Engineer, AWS Certified Security) Experience working with high-performance matrixed teams Familiarity with clinical systems (e.g., Epic, Lawson) and SDLC methodologies Benefits: This role is eligible to enroll in both Mondo's health insurance plan and retirement plan. Mondo defers to the applicable State or local law for paid sick leave eligibility
    $80-102 hourly 3d ago
  • Compliance Security and Microsoft Cloud Analyst

    Eccalon, LLC

    Cyber security analyst job in Maryland

    Eccalon is seeking a Compliance Security and Microsoft Cloud Analyst position that will play a critical role in both Cyber Compliance Operations and Cloud Security Engineering. This is a long-term career opportunity ideal for individuals who want to grow both their compliance knowledge and hands-on Microsoft Cloud Security engineering expertise. The selected candidate will help drive cybersecurity compliance initiatives aligned with Department of Defense (DoD) frameworks (NIST 800-53, NIST 800-171/172, FedRAMP and CMMC L1/L2/L3), while also designing, configuring, and implementing Microsoft Azure Government and M365 GCC High security controls across client environments. This position offers the ability to advance technical engineering skills, earn high-level security certifications, and grow into a leadership track in cloud security and compliance operations. Responsibilities Cloud Security Engineering (Azure Gov and M365 GCC High) Assist in designing, configuring, and implementing Microsoft Azure Government and M365 GCC High security controls. Support Azure Gov resource hardening, including Virtual Machines, Key Vaults, Storage Accounts, Defender for Cloud, Sentinel, Azure Policies, and Conditional Access. Assist with Microsoft 365 GCC High Security & Compliance Center configurations, including DLP, Sensitivity Labels, Insider Risk, and Compliance Manager setup for CMMC and NIST alignment. Configure and monitor Azure Sentinel Workbooks, Cloud Security Posture Management (CSPM), Defender for Endpoint (Gov), and Defender for Identity integrations. Conduct Microsoft Secure Score reviews and remediation within GCC High and Azure Gov environments. Assist in developing automated security monitoring dashboards and reporting using Azure Monitor, Microsoft Sentinel GCC High. Support Azure network security hardening, including NSGs, ASGs, Private Endpoints, and Firewall rules. Help develop and document Zero Trust Architecture alignment using Microsoft Cloud-native tools. Cyber Compliance Operations Research, identify, and map NIST and DoD cybersecurity controls (NIST 800-53, 800-171/172, FedRAMP (M) and CMMC) to Microsoft Cloud implementations and On-premises environments. Assist with System Security Plan (SSP), Policies, Procedures, and Plan of Action & Milestones (POA&M) documentation for client environments. Support control gap analysis, evidence collection, and audit preparation for DoD contractor compliance. Conduct security control validation testing (manual and automated), for both on-premises and cloud based systems. Document and report on control effectiveness, remediation plans, and risk mitigation actions. Assist with preparing security architecture diagrams showing how Microsoft Cloud services map to compliance controls. Support client teams during external CMMC, NIST, or DFARS audits and assessments. Help draft and revise Policies, Standards, and Procedures (PSPs) to align with DoD cybersecurity requirements. Required Qualifications Bachelor's in Cybersecurity, Cyber Defense or equivalencies. Strong understanding of Microsoft Azure Government (IaaS/PaaS/SaaS) security configurations. Hands-on experience with Microsoft 365 GCC High security and compliance solutions. Familiar with Microsoft Defender XDR stack (Defender for Endpoint, Identity, Office 365, Cloud Apps) for GCC High. Working knowledge of Azure AD/Entra ID security policies, Role-Based Access Control (RBAC), and Privileged Identity Management (PIM). Experience with Azure Sentinel deployment and use case creation. Familiarity with Azure Policy, Blueprints, and Resource Locks for governance and compliance. Experience in NIST 800-53, 800-171, 800-172, FedRAMP (M) and CMMC L1/L2/L3 control frameworks. Proficient in security documentation writing for Policies, Standards, System Security Plans, and POA&Ms. Proficient in network security concepts, firewall rule sets, and enterprise network topology diagrams. Critical Thinking and Problem Solving Strong Verbal and Written Communication Professional and Technical Writing Collaboration and Teamwork Multitasking and Task Prioritization Adaptability and Initiative Knowledge of Assessment and Audit Management Processes Preferred Qualifications Master's degree in information assurance and cyber security. Strong knowledge of Microsoft Security Best Practices for Cloud (Azure Gov, M365 GCC High). Ability to interpret DoD contract security clauses (DFARS, CMMC, NIST requirements) and apply them to cloud environments. Familiarity with Microsoft Compliance Manager and Secure Score tools in GCC High. Exposure to Defender for Cloud recommendations, regulatory compliance dashboards, and Microsoft Sentinel analytics rules. Proficient in evaluating data protection (at rest, in transit, and in use) in both cloud and on-premises environments. Ability to conduct technical research and compliance gap analysis, followed by Microsoft technology specific security remediation steps. Certifications (Preferred or obtainable within the first 12 months): Microsoft Certified: Azure Security Engineer Associate - AZ 500 Microsoft Certified: Cybersecurity Architect Expert - SC 100 Microsoft Certified: Information Protection and Compliance Administrator Associate - SC 401 Microsoft Cloud Administration (others): - SC 900 or SC 200 or SC 300 Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Behavioral Skills: Servant Leadership Mindset: Proactively supports the team and organizational mission Detail-Oriented: Consistently delivers thorough and accurate work Team-Oriented: Works collaboratively across departments and client teams Self-Motivated: Able to work independently and seek guidance when needed Organized and Decisive: Able to manage multiple priorities with efficiency Interpersonal Effectiveness: Builds strong, positive, and professional relationships Growth Opportunity This position offers a dual career track (Cloud Security Engineering + Compliance Operations). You will gain hands-on Microsoft Cloud Security Engineering expertise, DoD cyber compliance expertise, and management experience, with the opportunity to grow into an Enterprise Compliance & Cloud Security Team Lead role.
    $69k-98k yearly est. 1d ago
  • Senior Security Engineer

    Ringside Talent

    Cyber security analyst job in Columbus, OH

    We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below. Responsibilities: Design, implement, and maintain security solutions to protect enterprise systems and data Conduct vulnerability assessments, penetration testing, and risk analysis Develop and enforce security policies, standards, and best practices Collaborate with IT and development teams to integrate security into system architecture Monitor and respond to security incidents, ensuring timely resolution Qualifications: 5+ years of experience in cybersecurity engineering or related roles Strong knowledge of network security, application security, and cloud security principles Experience with security tools such as SIEM, IDS/IPS, and endpoint protection Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA) Excellent problem-solving and communication skills What Our Client Offers: A critical role in safeguarding enterprise systems and sensitive data Opportunities to work with cutting-edge security technologies and methodologies A collaborative environment focused on innovation and resilience Competitive compensation and comprehensive benefits
    $92k-127k yearly est. 2d ago
  • Cloud Security Engineer

    GHR Healthcare 3.7company rating

    Cyber security analyst job in Philadelphia, PA

    The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes. Proven experience in securing a multi-cloud environment. Proven experience with Identity and access management in the cloud Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful. Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure. Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities. Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides. Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies. Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders. Mentor and support junior InfoSec engineers through documentation, training, and peer reviews. Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred). Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols. Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms. What you will do A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also: Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals. Skills: Duties (cont'd): Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. Skills: Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
    $100k-144k yearly est. 1d ago
  • OT Security Engineer

    VMC Soft Technologies, Inc.

    Cyber security analyst job in Collegeville, PA

    Must have an OT background with life sciences experience Deliver OT security firewall policy design and document Investigate and deliver appropriate OT architectures for RD systems Troubleshoot connectivity issues experienced during migration activities Must be proficient in Palo Alto Must have an OT background with life sciences experience Knowledge of supporting technologies, Zscaler, Cisco network infrastructure, Azure, and Google cloud Good to have Experience using ServiceNow Preferred RD lab experience, knowledge of lab systems, such as LIMS. HPLC etc Experience with project software (ADO) Generic US or UK based (US preferred) Good communicator, role requires frequent conversations with the business Note : If you are interested please share me your resumes to ********************* or else reach me at **********.
    $80k-111k yearly est. 5d ago
  • Information Security Specialist

    Delta Information Systems, Inc. 3.8company rating

    Cyber security analyst job in Horsham, PA

    Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment. This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission. This is a fully onsite position located in Horsham, PA. Key Responsibilities Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms. Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks. Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks. Champion the company's certification to CMMC Level 2. Develop, document, and enforce cybersecurity policies, procedures, and incident response plans. Support Government and customer security audits, preparing evidence and remediation plans as required. Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions. Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development. Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data. Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense. Qualifications Required: Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). 5+ years of experience in information security, IT security operations, or cybersecurity. Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements. Experience developing, implementing and achieving CMMC compliance. Experience supporting DoD or government contracts with cybersecurity compliance needs. Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools. Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint). Excellent analytical, documentation, and communication skills. U.S. Citizenship (required due to defense industry regulations). Preferred: Active security clearance (Secret or higher), or ability to obtain one. Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC. Experience with RMF (Risk Management Framework) and STIG compliance. Familiarity with secure software development, DevSecOps practices, or classified system security. Compensation Competitive salary Outstanding benefits package 100% Paid Coverage for Medical, Dental, and Vision 401(k) Employer Match Employee Stock Ownership Program (company funded) Life Insurance (company funded) Short-Term Disability (company funded) Long-Term Disability (company funded) Vacation & Sick Holidays: 11 days HealthCare FSA Dependent Care FSA What We Offer Opportunities for training, certifications, and career growth. A mission-driven culture where your work contributes to national security. Exposure to advanced technologies and programs critical to the aerospace and defense sector. About Delta Information Systems, Inc. Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities. In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
    $74k-106k yearly est. 1d ago
  • Cloud Security Engineer

    Motion Recruitment 4.5company rating

    Cyber security analyst job in Philadelphia, PA

    Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis. Contract Duration: 6 Month Contract (Potential for extension or conversion) Required Skills & Experience At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment. CISSP Certification At least six (6) years experience with information security, regulatory compliance and risk management concepts. At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training. Experience with Cloud and/or Virtualization technologies. Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information. Daily Responsibilities Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. You will receive the following benefits: Medical Insurance - Four medical plans to choose from for you and your family Dental & Orthodontia Benefits Vision Benefits Health Savings Account (HSA) Health and Dependent Care Flexible Spending Accounts Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance Hospital Indemnity Insurance 401(k) including match with pre and post-tax options Paid Sick Time Leave Legal and Identity Protection Plans Pre-tax Commuter Benefit 529 College Saver Plan Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
    $98k-137k yearly est. 2d ago
  • Cloud Security Engineer - SRE

    Intelliswift-An LTTS Company

    Cyber security analyst job in Columbus, OH

    Job Posting Title: Cloud Security Engineer - SRE We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation. Technical Skills • Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling. • Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations. • Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure. • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions. • Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift). • Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs. • Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs. • Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI. • A strong understanding of HashiCorp Vault and Terraform will make you stand out. 2. Problem-Solving and Troubleshooting • Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews. • Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error. • Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications. 3. Collaboration and Communication • Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams. • Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports. • Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences. 4. Reliability and Scalability • Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability. • Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands. • Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime. 5. Security and Compliance • Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices. • Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry. Minimum Job Qualifications: • Bachelor degree in business or equivalent work experience • 10 years of previous program leadership and/or relevant consulting experience • Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle • 5+ years' experience in driving large scale data center consolidation efforts • Minimum 5 years' experience with matrix management of cross-functional processes and teams • Proficient with Project Management tools
    $75k-104k yearly est. 3d ago
  • Product Security Engineer

    Intellias

    Cyber security analyst job in Cleveland, OH

    We are looking for a Contract Product Security Engineer to support vulnerability management initiatives within a product security organization. This role is ideal for a security professional who enjoys hands-on analysis, structured problem-solving, and improving security processes through automation and collaboration. You will work closely with engineering and security teams to help identify, assess, and prioritize security risks across software components. The focus of this project is vulnerability management through Software Bill of Materials (SBOM) analysis. The engineer will review and triage vulnerabilities identified by SBOM scanning tools, assess risk and severity, and support remediation efforts in partnership with cross-functional teams. The role also includes enhancing vulnerability management workflows through scripting and automation, as well as maintaining clear documentation to ensure traceability and compliance within a structured development environment. What we offer you in USA We honor the contract terms you prefer. 20 paid vacation days per year 40 working hours per week Retirement Plan 401(K) Medical, Dental, Vision Insurance Plan for you and your Family 100% On-Site position in Newton Responsibilities Review, analyze, and triage vulnerabilities from SBOM scanning tools Assess severity and support risk-based prioritization of remediation Collaborate with engineering, security, and product teams to drive resolution Track vulnerability status for timely closure Develop or use scripts/automation to improve vulnerability management Maintain clear documentation of findings and actions Requirements Experience in product security Proficiency in Python or other scripting languages Strong analytical skills and attention to detail Effective collaboration with cross-functional teams Nice to Have Experience with vulnerability management programs Exposure to regulated industries Familiarity with SBOM management tools (e.g., Dependency Track)
    $76k-105k yearly est. 5d ago
  • Information Security Engineer - Infrastructure & Compliance(Only w2)

    Astir It Solutions, Inc. 3.6company rating

    Cyber security analyst job in King of Prussia, PA

    Minimum Experience: 10+ Years Key Responsibilities Security & Compliance Serve as divisional lead for NIST 800-171 control alignment, tracking, and remediation. Partner with Internal Audit and Enterprise Security to review non-compliance findings and drive resolution. Maintain and improve Defender for Cloud posture management across Azure infrastructure. Identify, prioritize, and remediate vulnerabilities across infrastructure, networks, and systems. Develop and implement Linux patch management strategy and compliance reporting. Contribute to policy documentation and control evidence collection for SOX and NIST readiness. Infrastructure & Cloud Security Operations Work closely with Infrastructure, Cloud Ops, and Application teams to assess risk and prevent operational disruption. Integrate security best practices into Azure, network, and datacenter operations. Utilize Defender, Azure Security Center, and related tools to monitor and report on environment health. Coordinate with Cloud and Systems Engineers to validate patch success, compliance metrics, and configuration baselines. Automate recurring security validation and compliance tasks using scripting (PowerShell, Python, Bash). Governance, Reporting, and Training Maintain centralized tracking for security initiatives, audit remediations, and policy adherence. Partner with PMs to ensure remediation workstreams are integrated into project schedules. Support KnowBe4 phishing campaign analysis and contribute to security awareness reinforcement. Report key risk indicators (KRIs) and compliance metrics to leadership. Required Qualifications 8 years of experience in Information Security, Infrastructure Engineering, or Cloud Operations. Proven experience with Defender for Cloud, Azure Security Center, or equivalent platforms (e.g., Tanium, Nessus, Qualys). Working knowledge of NIST 800-171, NIST CSF, or ISO 27001 frameworks. Experience managing patching and vulnerability remediation across Windows and Linux environments. Proficiency with scripting or automation tools (PowerShell, Python, Bash). Familiarity with Active Directory, Azure AD, and network security principles. Preferred Qualifications Experience with Fortify or similar static code analysis tools. Familiarity with KnowBe4, VRX, or patch compliance tracking systems. Exposure to Azure DevOps, IaC, and configuration-as-code methodologies. Security or cloud certifications (e.g., AZ-500, Security+, CISSP, or equivalent). Success Measures Reduction in open audit findings and non-compliant controls. Establishment of measurable Linux and infrastructure patch compliance reporting. Defender for Cloud secure score improvement over baseline. Defined and repeatable NIST alignment process for divisional systems. Improved coordination between Infrastructure, Cloud, and Security teams during vulnerability remediation. If I missed your call ! Please drop me a mail. Thank you, Harish Accounts Manager/Talent Acquisition Astir IT Solutions, Inc - An E-Verified Company Email:******************* Direct : ***********788 50 Cragwood Rd. Suite # 219, South Plainfield, NJ 07080 ***************
    $84k-109k yearly est. 3d ago
  • Security Incident Response Engineer III

    Elsevier 4.2company rating

    Cyber security analyst job in Philadelphia, PA

    Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet. Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization? About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations. This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise. Responsibilities: Assisting in scoping security incidents and identifying indicators of attack and compromise. Analyzing incident data from threat analytics tools. Communicating recommendations and guidance based on security incident analysis. Coordinating responses to security incidents with other security and consulting teams. Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response. Performing security triage and analysis on endpoint, server, and network infrastructure. Conducting activities necessary for immediate containment and short-term resolution of incidents. Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities. Investigating the root cause of complex security incidents. Maintaining a high level of confidentiality. Requirements Possess experience in cybersecurity incident response or related fields. Proven ability to analyze, triage, scope, contain, and remediate security incidents. Have current and extensive knowledge of security technologies, tools, and processes. Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments. Have current skills in automation using PowerShell, Python, Java, or similar languages. Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration. Experience supporting large, complex, and geographically distributed enterprise environments. Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment. Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
    $82k-108k yearly est. 4d ago
  • Senior Information Security Analyst

    Insight Global

    Cyber security analyst job in Westerville, OH

    Salary: 105K-125K w/ 5-10% bonus Must Haves : - Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (Master's degree preferred). - Minimum of 5-7 years of experience in cybersecurity or information security roles, preferably in a manufacturing or construction environment. - Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable. - Strong knowledge of network protocols, firewalls, intrusion detection/prevention systems, and encryption technologies. - Experience with security tools such as Splunk, CrowdStrike, Cisco Umbrella, Artic Wolf, or similar platforms. - Proficiency in cloud security (e.g., AWS, Azure) and securing industrial control systems (ICS) is a plus. - Familiarity with scripting languages (e.g., Power BI, Python, PowerShell) for automation and analysis. Job Summary The Senior Cybersecurity/Information Security Analyst will be responsible for overseeing all aspects of information security within the organization. This role involves designing, implementing, and monitoring security measures to protect systems, networks, and data from cyber threats. The ideal candidate will have extensive experience in cybersecurity, working with security SaaS providers, a proactive approach to identifying vulnerabilities, and the ability to collaborate across departments to ensure a secure enterprise environment. Key Responsibilities - Develop, implement, and maintain comprehensive information security policies, standards, and procedures. - Ensure alignment with industry standards such as NIST, CIS, and other relevant frameworks. - Work with SaaS providers in conducting regular risk assessments and audits to identify vulnerabilities and ensure compliance with regulatory requirements. - Oversee SaaS provider monitor of networks and systems for security breaches, intrusions, and unusual activity using advanced security tools (e.g., SIEM, IDS/IPS). - Lead incident response efforts, including investigation, containment, remediation, and documentation of security incidents. - Perform root cause analysis and implement corrective actions to prevent recurrence. - Review and contribute to the configuration and maintenance of firewalls, VPNs, endpoint protection, and other security technologies. - participate in regular vulnerability scans and penetration testing to identify and mitigate risks. - Ensure secure configuration of cloud, on-premises, and hybrid environments. - review and recommend cybersecurity training programs to educate employees on best practices and emerging threats. - Promote a culture of security awareness across the organization. - Ensure compliance with applicable laws, regulations, and industry standards (e.g., CMMC, NIST, CIS, PCI-DSS). - Prepare and present reports on security posture, incidents, and compliance to the Manager of Cyber/Information Security and senior leadership. - Collaborate with IT, operations, and other departments to integrate security into business processes and systems. - Provide guidance and mentorship to junior members of the cybersecurity team. - Stay current on emerging threats, technologies, and best practices to recommend improvements to the security program.
    $71k-98k yearly est. 1d ago
  • Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)

    Red Alpha

    Cyber security analyst job in Annapolis, MD

    A day in the life: As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to): Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis Categorize traffic as benign, suspicious, or malicious activity Document malicious tactics, techniques, and procedures (TTPs) Develop and implement mitigation strategies What you bring to the table: Level 1: A Bachelor's degree in a technical discipline and 2+ years of relevant experience Experience in malware analysis Programming experience in C, C#, Java, Perl or Python is preferred An active TS/SCI with Polygraph Level 2: A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification Experience in malware analysis An active TS/SCI with Polygraph Level 3: A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification Experience in malware analysis An active US Government TS/SCI security clearance with Polygraph Bonus Skills: Level 1: CISSP, GIAC GREM or CREA Certification is preferred The total package: Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves and their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information. Salary Range: Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself. Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are: Level 1: $80,000 - $125,000 Level 2: $120,000 - $160,000 Level 3: $140,000 - $180,000 Level 4: $165,000 - $215,000 Some of our additional perks and benefits include: Retire sooner than planned: Get closer to retirement with up to 10% in 401k contributions, immediately vested. Have a career AND a life: Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays. Stay at your best: As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym! Keep current on new technologies and technological advancements : $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships. Dress in style: Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc. Enjoy the culture: Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more! Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we bring digital transformation to the fight!
    $165k-215k yearly Auto-Apply 60d+ ago
  • Intrusion Analyst

    Synergy ECP

    Cyber security analyst job in Columbia, MD

    Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security. In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our Employees, to our Customers and by Improving Performance (ECP). It's what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results - showing we're ready to meet our customers' evolving demands. Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services. Synergy ECP is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected class. Requirements A Bachelor's degree and 5 years of relevant experience or a Master's degree plus 3 years of relevant experience or a Doctoral degree and 2 years of relevant experience. An Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. CISSP, CEH, Sec+, Net+, GIAC, GREM, or CREA Certification is required. Relevant experience must be in malware analysis. Programming experience in C, C#, C++, Java, Perl, or Python is preferred. Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). Develop and implement mitigation strategies. Have a network and/or host-based focus.
    $80k-112k yearly est. 60d+ ago
  • Visual Imagery Intrusion Detection System (VIIDS)

    Siertek Ltd.

    Cyber security analyst job in Andrews Air Force Base, MD

    Job Description SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity. SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD. PLEASE APPLY DIRECTLY ON OUR WEBSITE: *********************** POSITION OVERVIEW SECTION The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS. Essential Job Functions Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis. Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format. Qualifications Minimum Position Requirements 3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation. Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order. Top Secret with capability of being upgraded to Yankee White SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training. If you need assistance or accommodation due to a disability, you may contact us at 1+************.
    $80k-112k yearly est. 30d ago
  • Visual Imagery Intrusion Detection System (VIIDS)

    Siertek

    Cyber security analyst job in Andrews Air Force Base, MD

    SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity. SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD. PLEASE APPLY DIRECTLY ON OUR WEBSITE: *********************** POSITION OVERVIEW SECTION The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS. Essential Job Functions Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis. Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format. Qualifications Minimum Position Requirements 3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation. Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order. Top Secret with capability of being upgraded to Yankee White SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training. If you need assistance or accommodation due to a disability, you may contact us at 1+************.
    $80k-112k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Clarksburg, WV?

The average cyber security analyst in Clarksburg, WV earns between $58,000 and $105,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Clarksburg, WV

$78,000

What are the biggest employers of Cyber Security Analysts in Clarksburg, WV?

The biggest employers of Cyber Security Analysts in Clarksburg, WV are:
  1. E-Infosol LLC
Job type you want
Full Time
Part Time
Internship
Temporary