Cyber Security Analyst
Cyber security analyst job in Washington, DC
We are seeking multiple mid-level (5 years minimum) Cyber Defense Incident Responders that are available to work the midnight shift (11pm-7:30am) in a Security Operations Center.
Clearance Requirements: Top Secret w/SCI
Location: Washington, D.C.
Job Description:
Coordinate incident response functions.
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
Perform cyber defense trend analysis and reporting.
Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Track and document cyber defense incidents from initial detection through final resolution.
Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).
Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Coordinate with intelligence analysts to correlate threat assessment data.
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
Basic Qualifications- To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
Bachelor's degree or higher
5+ years' experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling
Must have,one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP).
Strong written and verbal communication skills.
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Demonstrated ability to interact effectively with senior management and leadership.
Ability to design incident response for cloud service models.
Knowledge of incident categories, incident responses, and timelines for responses.
Knowledge of incident response and handling methodologies.
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
Desired Skills
Experience identifying, capturing, containing, and reporting malware.
Skill in preserving evidence integrity according to standard operating procedures or national standards.
Strong securing network communications experience.
Recognizing and categorizing types of vulnerabilities and associated attacks.
Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
Experience performing damage assessments.
Skill in using security event correlation tools and design incident response for cloud service models.
Information Security Analyst IV
Cyber security analyst job in Washington, DC
Senior Security Engineer (Information Security Analyst IV)
Clearance: Public Trust (U.S. Citizen or Green Card Holder; 3+ years U.S. residency required)
Business Unit: Digital Modernization
Role Summary
The Senior Security Engineer supports the Department of Transportation's (DOT) Cybersecurity mission by enhancing and maintaining the security posture of DOT information systems and infrastructure. These systems play a critical role in safeguarding U.S. critical infrastructure, including highways, bridges, and roadways. This position provides advanced security engineering, participates in strategic security design, and delivers technical expertise for integrated security systems and endpoint protection.
The role requires independent decision-making, leadership, and the ability to guide less experienced staff. It also involves complex problem-solving, interaction with senior federal leadership, and contributions that directly impact mission and schedule outcomes.
Key Responsibilities
Implement endpoint protection profile changes to address external threats and enforce security requirements.
Coordinate with application, infrastructure, and engineering teams to troubleshoot endpoint protection software issues.
Integrate endpoint security data with security log aggregation tools, including SIEM platforms.
Participate in cybersecurity incident handling activities as requested.
Stay current on emerging threats, vulnerabilities, and industry best practices related to endpoint security.
Work assigned cybersecurity and security operations ITSM (ServiceNow) tickets through completion.
Participate in Cybersecurity and Security Operations (SecOps) meetings.
Collaborate on cybersecurity solutions that enhance the DOT's security posture.
Configure, validate, and test secure systems and physical controls to detect security weaknesses.
Contribute to strategic security design efforts, translating business and security requirements into technical solutions.
Recommend policy changes and guide others in achieving departmental cybersecurity objectives.
Required Technical Skills
Endpoint protection management solutions (hands-on experience).
Proven understanding of Federal cybersecurity requirements, including FISMA and the NIST 800 series.
Ability to articulate endpoint security concepts to non-technical stakeholders.
Demonstrated experience collaborating across cross-functional cybersecurity teams.
Ability to evaluate complex security problems and apply judgment within established practices and policies.
Experience with integration of endpoint security data into SIEM or log aggregation tools.
Experience working security operations tickets within ServiceNow.
Knowledge of security systems, secure configuration, validation, and testing methodologies.
Preferred / Nice-to-Have Skills
Foundational understanding of:
Application and technology stacks
Cloud-based systems
Operating systems
Databases
Networking
Firewalls
Data Loss Prevention (DLP)
Endpoint security software
Network IDS/IPS
Host-based IDS/IPS
General cybersecurity best practices and industry standards
Qualifications & Experience
9+ years of experience in Cybersecurity or related IT fields.
Bachelor's degree + 9 years OR
Master's degree + 7 years of experience
Technical Certifications (one or more required):
Network+
Security+
SSCP
GISF
ISACA Cybersecurity Fundamentals
Or similar technical cybersecurity certification
Ability to obtain and maintain a Public Trust clearance.
Benefits (employee contribution):
Health insurance
Health savings account
Dental insurance
Vision insurance
Flexible spending accounts
Life insurance
Retirement plan
All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Jr. Information System Security Officer
Cyber security analyst job in Washington, DC
Veteran Owned Firm Seeking a Junior Information Systems Security Officer (ISSO) for an Onsite role in Washington, DC
My name is Stephen Hrutka, and I am the owner of a Veteran Owned management consulting firm in Washington, DC focused on Technical/Cleared Recruiting for the DoD and IC.
HRUCKUS helps other Veteran-Owned businesses recruit for positions across the VA, SBA, HHS, DARPA, and other cutting-edge R&D related defense agencies.
We seek to fill a Junior Information Systems Security Officer (ISSO) position in Washington, DC.
The ideal candidate is a DMV resident who holds active TS/SCI clearance with CI-Poly eligibility, a minimum of 3 years of ISSO experience, at least 5 years in a computer science or cybersecurity-related role, hands-on familiarity with tools such as Nessus or NMAP, and a core certification such as CISSP, GISP, or CASP.
If you're interested, I'd be glad to provide more details about the role and further discuss your qualifications.
Thanks,
Stephen M Hrutka
Principal Consultant
HRUCKUS LLC
Executive Summary: HRUCKUS is looking for an experienced Jr. ISSO for an onsite role in Washington, DC. The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract's support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Key Responsibilities:
Services to support IS Security performed by the Information System Security Officer (ISSO) at a minimum, shall consist of the following activities:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
Provide liaison support between the system owner and other IS security personnel
Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs)
Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an agency's IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed, and entity type
Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary
Ensure that new entities are created in the GRC application with the security categorization of agency ISs
Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
Perform an independent review of the System Security Plan (SSP) and make approval decisions
Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official
Schedule security control assessments in coordination with the system owner.
Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
Advise the agency Authorizing Official of IS vulnerabilities and residual risks.
Ensure that all POA&M actions are completed and tested
Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
Ensure the removal and retirement of agency ISs being decommissioned, in coordination with the SO, ISSO, and ISSR.
Required Qualifications:
Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility
At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility
Minimum of 5 years of work experience in a computer science or cybersecurity-related field
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, Network Mapper (NMAP), and/or similar applications.
Hold at least one of the following certifications:
Certified Information Systems Security Professional (CISSP)
Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level I proficiency
Preferred Education:
A bachelor's and/or advanced degree in computer science, business management, or IT-related discipline.
Details:
Job Title: Jr. Information Systems Security Officer (ISSO)
Location: Washington, DC 20535
Clearance Requirement: Active Top-Secret Clearance w/ SCI and a CI-Polygraph eligibility
Assignment Type: Full-time, Onsite
Salary Range: $70,000 - $95,000 per year with benefits:
Competitive salary for well-qualified applicants
Relocation assistance available for highly qualified candidates
401(k) plan
Annual performance bonus
Certification and advanced degree attainment bonuses
Student Loan / Tuition reimbursement
Health Care Insurance (medical, dental, vision)
Up to four weeks of paid vacation
11 Federal Holidays, and 3 Floating Holidays
Team bonding events
Chief Information Security Officer
Cyber security analyst job in Washington, DC
Chief Information Security Officer (CISO)
The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
Cyber Threat Analyst
Cyber security analyst job in Washington, DC
Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Summary
Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Overview
Help
Accepting applications
Open & closing dates
10/01/2025 to 09/30/2026
Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15
Location
Many vacancies in the following location:
Washington, DC
Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted
Promotion potential
None
Job family (Series)
* 0132 Intelligence
Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No
Announcement number 23-11942190-6868/AHD Control number 722102800
This job is open to
Help
The public
U.S. Citizens, Nationals or those who owe allegiance to the U.S.
Federal employees - Competitive service
Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales.
Federal employees - Excepted service
Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria.
Videos
Duties
Help
As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community.
You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings.
Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government.
Requirements
Help
Conditions of employment
* You must be physically in the United States or one of its territories when you submit your resume via MyLINK.
* You must be registered for the Selective Service, if applicable.
* You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible).
* You must be willing to move to the Washington, DC area.
* You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation.
* For further information, please visit: ****************************************
Qualifications
Minimum Qualifications
Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin.
A mix of international and technical studies, to include a bachelor's or master's degree in the following fields:
* International Relations, Foreign Affairs, or Security Studies
* Cyber Security
* Computer Science
* Digital Forensics
* Telecommunications
* Information Assurances
* Interest in international affairs
* Awareness of U.S. national security interests
* At lease a 3.0 GPA on a 4-point scale is preferred
* Ability to work under tight deadlines
* Excellent analytic abilities and relevant experience
* Strong critical thinking, problem solving skills, and ability to think creatively
* Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation
Desired Qualifications
* Foreign language proficiency
* Strong verbal presentation skills
* Demonstrated ability to write clear, concise text
* Research experience in international affairs
* Ability to work in a team environment
* Interest in a career that requires regular writing assignments
Education
* Bachelor's or master's degree in one of the following fields:
* Computer Science
* Computer Engineering
* Digital Forensics
* Cyber Security
* Telecommunications
* Information Assurances
* Security Studies
* A mix of international and technical studies
* At least a 3.0 GPA on a 4-point scale is preferred
Additional information
Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
How you will be evaluated
You will be evaluated for this job based on how well you meet the qualifications above.
For further information about this position, please visit: *****************************
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
Required documents
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
How to Apply
Help
This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself.
Agency contact information
Central Intelligence Agency
Website ***********************
Next steps
After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information.
Fair and transparent
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
Criminal history inquiries Equal Employment Opportunity (EEO) Policy
Financial suitability New employee probationary period
Privacy Act Reasonable accommodation policy
Selective Service Signature and false statements
Social security number request
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
Cyber Security Analyst - Government Publishing Office (GPO)
Cyber security analyst job in Washington, DC
Requirements
- Bachelor's degree in Cybersecurity, Information Technology, or a related field is preferred. - Relevant certifications (CISSP, CEH, etc.) are a plus. - Previous experience in a cybersecurity role, especially within government or federal organizations, is desired.
Salary Description 100,000 - 120,000
Cyber Security Analyst
Cyber security analyst job in Washington, DC
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Auto-ApplyCyber Analyst - Mid
Cyber security analyst job in Washington, DC
Join the Nalley Consulting team as a Cyber Analyst at DIA HQ. Cyber Analyst LCAT: Mid Clearance requirement: TS/SCI clearance; CI poly or willingness to take a polygraph Required experience/education: 3+ years of experience and a bachelor's degree OR 7+years of equivalent experience without a degree
Position Description
Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments specific to the cyber domain. Provides analytic support to collections, operations, investigations, and other defense intelligence analytic requirements.
Basic Qualifications
Experience in IT, in cybersecurity, or in cyber-focused intelligence analysis
Knowledge of computer and IT infrastructure
Understanding of computer network vulnerabilities and access vectors
Knowledge of the IC and Combatant Command environment
Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings
Additional Qualifications
Experience with CENTCOM AOR
Knowledge of the intelligence cycle
Experience with authoring DoD product lines and utilizing ICD 203 tradecraft standards
Experience with data analytics, analysis, and visualization
ABOUT NALLEY CONSULTING
Nalley Consulting is a Service Disabled Veteran Owned Small Business working with prime partners to staff Department of Defense and Intelligence Community positions. Created by a U.S. Navy intelligence veteran, Nalley Consulting has grown to include multiple IDIQ vehicles in several states.
Nalley Consulting fringe benefits include:
Excellent medical, dental, and vision benefits
PTO
11 paid federal holidays
Tuition assistance
Paid military-reserve leave
Paid parental leave for birth or adoption
401k matching up to 5 percent of the base salary
Flex time
Company-paid short-term disability, long-term disability, and life insurance.
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Washington, DC
Clearance: T5/6C High Risk Public Trust (required)
Summary:Provide continuous monitoring, vulnerability assessment, incident response, and compliance documentation for OIG systems. Ensure compliance with NIST 800-53, FedRAMP, and FISMA standards.
Key Duties:
Monitor network activity with SIEM tools; investigate and report security incidents.
Conduct vulnerability scans; implement patches and remediation.
Support POA&Ms, ATO documentation, and FedRAMP compliance.
Assist with contingency planning and incident response exercises.
Qualifications:
Bachelor's degree in Cybersecurity, IT, or related field.
8+ years of cybersecurity experience.
Certifications: CISSP, CEH, CCSP, or equivalent.
Mid Cyber Analyst
Cyber security analyst job in Washington, DC
Cyberspace Solutions, a Crimson Phoenix company seeks an exceptionally qualified Mid Cyber Analyst with a TS/SCI clearance to support an ongoing government customer.
Crimson Phoenix supports the US national security community and its allies with a wide range of analytic and cyber effect solutions that accelerate informed decision made in the telephony, IP messaging, cyber, and multi-source arenas. Our customers require insight from the endless volume and variety of data to make critical, high integrity decisions at mission speed. We are an innovative solutions company striving to be a global leader in multi-source data collection, predictive analysis and mobile/network surveillance (4G/5G) and assurance, from the Edge of Collection to the Core of Exploitation, Tactical to Strategic, Endpoint to the Enterprise.
Responsibilities
The contractor shall provide on-site functional and technical intelligence support to the DIA Intelligence Integration Centers including the collection, analysis, and production of all-source intelligence pertaining to foreign national Cyber MILCAP and foreign use of the Cyberspace Domain in compliance with DIA's SOP for the Cyber FPA, DIA ADO, ICD 203 and 206 sourcing, analysis, production, and DIA tradecraft standards.
Qualifications
Clearance: Top Secret//SCI
Polygraph: Counterintelligence (CI) polygraph
HS Diploma or GED and 7+ years of experience with analysis or Bachelor's degree and 3+ years of experience with analysis
Experience with all-source intelligence analysis and production on foreign national cyber military capabilities and foreign use of cyberspace, including but not limited to doctrine, intent, operations, supporting services and infrastructure, and vulnerabilities
Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings
Preferred Qualifications:
Experience with authoring current DoD product lines and utilizing ICD 203 tradecraft standards
Experience with producing vector map products and conducting network analysis using geo enabled processes
Experience with data analytics, analysis, and visualization
Knowledge of the intelligence cycle
Knowledge of one of the following AORs: the Americas, the Asia-Pacific, Eurasia, or the Middle East
Equal employment opportunity employer:
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Crimson Phoenix is committed to providing veteran employment opportunities to our service men and women.
Auto-ApplyIncident Detection Analyst
Cyber security analyst job in Washington, DC
Tyto Athene is searching for a **Incident Detection Analyst** to support our customer in Washington, DC. **Responsibilities:** + Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC needs.
+ Conduct Incident Triage to prioritize newly identified security incidents for follow-on action. Identify all relevant data sources for initial collection to determine prioritization and resource application based on the criticality of the incident. Conduct immediate actions to evaluate and contain threats as necessary in accordance with the Judiciary Security Operations Center Incident Response Plan (JSOCIRP), Incident Response Operations Guide, and any other published SOC operations guides and manuals. Please see SLA SOC3.
+ Perform deep dive analysis (manual and automated) of malicious links and files.
+ Ensure efficient configuration and content tuning of shared SOC security tools to eliminate or significantly reduce false alert events.
+ Provide Executive Summary in accordance to IDT Operations Guide.
+ Provide 5W briefing slides for each event for leadership briefing.
+ Provide on demand time/trend/event based metric reports for SOC management.
+ Provide clear and actionable event notifications to customers. Notifications to customers will be clear and provide sufficient detail for a mid-level system or network administrator to understand what has occurred and what needs to take place to remediate the event.
+ Coordinate and provide direct support to local incident responders at the circuit, local court unit and program office levels. Provide notifications, guidance and end to end incident response support to local incident responders to ensure the appropriate actions are properly taken to detect, contain, eradicate and recover from identified security incidents. Coordinate with various other SOC teams to leverage the appropriate resources to enable local incident responders. Participate in course of action (COA) development and execution as necessary.
+ Document all communications and actions taken in response to assigned incidents in the SOC ticketing system. Ensure tickets are properly updated in a timely manner and all artifacts are included. Escalate any concerns or requests through the Contractor management as necessary.
+ Directly support the Judiciary Special Tactics and Active Response (JSTAR) team and provide incident response support for critical security incidents as they arise.
+ Perform appropriate event escalation for events, notifications, and non-responsiveness from customers. Contractors shall track all notifications in the SOC ticketing system and escalate tickets to Watch Officers or SOC management in cases where the customer is non-responsive or requires clarification that is outside the scope of the normal operations. Contractors will be familiar with the JSOCIRP escalation and reporting procedures.
+ Continuously review and update the Incident Handlers (IH) Guide and provide recommendations to annual updates for the JSOCIRP. All SOPs and Op Guides are federal government property. Contract staff provide recommendations in draft form for federal management review, approval and adoption.
+ Incident Responders must be able to perform the tasks and meet the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework for the role of Cyber Defense Incident Responder
**Qualifications**
**Required:**
+ 6 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and Network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs;
+ Ability to communicate clearly both orally and in writing.
+ Working experience with Splunk SIEM.
+ At least three years of experience working at a senior level, performing analytics examination of logs and console events and creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, in SIEM environments
**Education/Certifications:**
+ Bachelor's degree in information systems, Computer Science or related field is preferred. // Splunk Fundamentals I & II certification.
**Clearance:**
+ Public Trust
**Hours of Operation/Shift:**
+ Monday-Friday 3PM EST - 1130PM EST
**About Tyto Athene**
**Compensation:**
+ Compensation is unique to each candidate and relative to the skills and experience they bring to the position. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range.
**Benefits:**
+ Highlights of our benefits include Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave.
Tyto Athene is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success. Our expertise spans four core technology domains-Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT-empowering our clients with cutting-edge solutions tailored to their evolving needs. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National Security, Civilian, Health, and Public Safety clients across the United States and worldwide.
At Tyto Athene, we believe that success starts with our people. We foster a collaborative, innovative, and mission-driven environment where every team member plays a critical role in shaping the future of technology. Are you ready to join #TeamTyto?
Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, [sexual orientation, gender identity,] national origin, disability, status as a protected veteran, or any characteristic protected by applicable law.
Submit a Referral (*******************************************************************************************************************************
**Location** _US-DC-Washington_
**ID** _2025-1522_
**Category** _Cybersecurity_
**Position Type** _Full-Time_
Cyber Network Defense Analyst (CNDA) - Cloud Forensics
Cyber security analyst job in Washington, DC
Job DescriptionWhy Argo Cyber Systems
At Argo, you'll be part of a mission-driven, veteran-founded cybersecurity team protecting America's most critical systems. We combine hands-on technical excellence with operational precision to outpace the threat. Join us to defend, detect, and innovate at the cyber edge.
Argo Cyber is supporting a U.S. Government customer on a mission-critical cyber operations program. We are seeking a ServiceNow SecOps Business Process / Technical Consultant to design, develop, and implement ServiceNow Security Operations (SecOps) solutions that enhance the customer's ability to detect, respond, and remediate security threats.
This hybrid role combines ServiceNow SecOps development, integration engineering, and process consulting. The ideal candidate will work directly with security stakeholders, translate mission requirements into technical designs, and deliver scalable, secure, and automated SecOps capabilities within the ServiceNow platform.
Responsibilities Include:
• Designing, prototyping, and implementing ServiceNow SecOps applications, including:
o Security Incident Response (SIR): enrichment, correlation rules, and automated playbooks.
o Vulnerability Response (VR): scanner integrations, remediation workflows, patch group automation.
o Configuration Compliance (CC): policy exception handling, remediation tasks, compliance dashboards.
o Threat Intelligence (TI): ingestion of IOCs, sightings search, enrichment workflows.
• Supporting the customer's roadmap for Splunk integrations to enable alert ingestion, bi-directional incident synchronization, and SIEM dashboards.
• Developing custom integrations with SIEM, scanner, and intel tools (e.g., Splunk, Tenable, VirusTotal, Hybrid Analysis) using IntegrationHub, REST/SOAP APIs, and MID Server.
• Building and maintaining orchestration playbooks, Flow Designer workflows, Business Rules, and Script Includes to automate enrichment and response actions.
• Documenting and maintaining policies, procedures, and technical designs aligned with Agile development practices and secure coding standards.
• Leading workshops with SOC, IR, and VR teams to capture mission needs, define business requirements, and translate them into technical solutions.
• Creating and maintaining Performance Analytics dashboards and KPIs to provide real-time visibility into security posture.
• Supporting incident resolution, troubleshooting, and sustainment of the ServiceNow SecOps environment.
• Providing mentorship and knowledge transfer to client staff on best practices and solution sustainment.
Required Skills:
• U.S. Citizenship required.
• Must be able to obtain DHS program suitability and a TS/SCI clearance.
• 8+ years of software development, IT security, or IT systems engineering experience.
• Minimum 4+ years of ServiceNow experience, with at least 2+ years focused on SecOps applications (SIR, VR, CC, or TI).
• Strong knowledge of ServiceNow administration, advanced configuration, and custom application development.
• Experience integrating ServiceNow with SIEM, vulnerability scanners, and threat intelligence platforms.
• Hands-on experience with Flow Designer, Orchestration, IntegrationHub, and MID Server.
• Strong technical skills in web technologies (JavaScript, HTML, XML, Angular, CSS) and integration technologies (REST, SOAP, LDAP, SSO).
• Familiarity with federal cybersecurity frameworks (NIST 800-53, FedRAMP, CISA KEV, MITRE ATT&CK).
• Strong communication, presentation, and documentation skills for technical and business stakeholders.
Desired Skills:
• Experience supporting DHS, DoD, or Intelligence Community customers.
• Experience deploying future-state SecOps processes including incident triage, vulnerability management, compliance automation, and threat intel workflows.
• Familiarity with Splunk use cases for security operations and event correlation.
• Experience with collaboration tools (MS Teams, Outlook, SharePoint, Atlassian Jira/Confluence).
• Strong problem-solving, analytical, and consulting skills in complex security environments.
• Information Systems Security Engineering Professional (ISSEP) or Information System Security Architect Professional (ISSAP) certification desired.
Desired Certifications:
• ServiceNow Certified System Administrator (CSA).
• ServiceNow Certified Application Developer.
• ServiceNow Certified Implementation Specialist - SecOps (SIR, VR, or CC).
• ITIL v4 Foundation certification (or willingness to complete within one year).
• DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification highly desired
Argo Cyber systems is an Equal Opportunity Employer!
Background & Drug Screening Disclaimer
© Argo Cyber Systems, LLC - All Rights Reserved
Argo Cyber Systems, LLC is committed to maintaining a safe, secure, and trusted workplace for all employees and our federal clients. Employment with Argo Cyber Systems is contingent upon successful completion of all required background investigations and pre-employment screenings, which may include, but are not limited to:
Criminal background checks (federal, state, and local)
Employment and education verification
Reference checks
Drug screening (in compliance with federal and state law)
Security clearance verification (as applicable for classified positions)
Candidates selected for employment in positions requiring access to sensitive or classified information may also be subject to additional U.S. Government background investigations and security adjudication processes, including DHS Entry on Duty (EOD) suitability or equivalent federal clearance requirements.
Argo Cyber Systems reserves the right to disqualify or rescind an offer of employment based on the results of any background or screening process that, in the company's judgment, may impact an individual's ability to perform essential job functions or meet contractual obligations.
All background investigations and screenings are conducted in accordance with applicable federal, state, and local laws, including the Fair Credit Reporting Act (FCRA). Candidates will be notified of their rights and provided an opportunity to review and dispute any adverse findings before final employment determinations are made.
Job Posted by ApplicantPro
T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Cyber security analyst job in Washington, DC
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Cyber Defense Analyst (Mid-Level)
Cyber security analyst job in Washington, DC
Full-time Description
NetCentrics is seeking a highly motivated and technically skilled Mid-Level Cyber Defense Analyst to join our cybersecurity operations team. This role is responsible for supporting enterprise-wide cyber incident response and defense initiatives. The ideal candidate will have a strong background in threat analysis, intrusion detection, and real-time incident handling, and will be capable of correlating data from multiple sources to identify vulnerabilities and recommend effective remediation strategies.
About Us:
At NetCentrics, we proudly hold a distinguished position as a leader in cybersecurity, cloud, digital transformation, and mission support. With an esteemed clientele that includes the DoD, DHS, Federal Civilian Agencies, and the Intelligence Community, our impact on national security is undeniable. We are a diverse group of intellectually curious people, solving hard problems, and living by our core values while bonded by the shared vision to secure our nation - join us!
Key Responsibilities:
Coordinate and execute incident response functions across enterprise systems.
Provide expert technical support to cyber defense technicians to analyze, resolve, and document incidents.
Perform log analysis from a wide range of sources including host, firewall, IDS, and network traffic logs to detect potential threats.
Conduct cyber incident triage, determine scope and urgency, identify vulnerabilities, and recommend immediate remediation.
Execute real-time incident handling activities such as forensic collection, intrusion correlation and tracking, and threat analysis.
Support deployable Incident Response Teams (IRTs) with technical tasks during active investigations.
Perform initial forensic image collection and inspection to support mitigation and remediation efforts.
Conduct cyber defense trend analysis and reporting to identify recurring patterns and emerging threats.
Receive, review, and analyze network alerts from internal monitoring tools and threat intelligence sources.
Track and document incidents from initial detection through final resolution, ensuring completeness and accuracy of case records.
Apply defense-in-depth principles and best practices, including layered security and redundancy.
Collect and analyze intrusion artifacts (e.g., malware, trojans, source code) to enhance incident mitigation strategies.
Collaborate with intelligence analysts to correlate cyber threat data and improve situational awareness.
Monitor external threat intelligence feeds (e.g., vendor advisories, CERT alerts, vulnerability databases) to stay informed of current threats and assess enterprise impact.
Desired Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent work experience).
3-5 years of experience in cybersecurity operations, with a focus on incident detection, response, or analysis.
Experience with log analysis tools (e.g., Splunk, ELK, QRadar), SIEM platforms, and forensic tools.
Familiarity with IDS/IPS, firewall technologies, and network protocols.
Solid understanding of cybersecurity frameworks (e.g., NIST 800-61, MITRE ATT&CK).
Strong analytical and troubleshooting skills.
Excellent verbal and written communication skills.
Preferred Qualifications:
Experience supporting federal government cybersecurity programs.
Familiarity with threat hunting, endpoint detection and response (EDR) tools, and malware analysis.
Experience documenting and reporting to internal leadership or external regulatory bodies.
Relevant industry certifications such as:
GIAC Certified Incident Handler (GCIH)
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)
CompTIA Cybersecurity Analyst (CySA+)
Where You Belong
At the heart of our organization lies a set of five core values that guide every facet of our work. "Mission First" epitomizes our unwavering commitment to our goals. "People Always" underscores the significance we place on our team's well-being and development. We continually strive to "Be Eminent" by consistently pushing the boundaries of excellence. "Embrace the Team" reflects our unwavering belief in the power of collaboration, recognizing that together, we attain greatness. With every action, we "Act with a Purpose," ensuring that our efforts contribute meaningfully to a larger mission. These values serve as the bedrock of our company culture, propelling us forward as a united and purpose-driven team.
Why Join NetCentrics
Join us not just to be a part of safeguarding our nation, but to be at the forefront of innovation, where your ideas and expertise play a pivotal role in shaping the future of cybersecurity and IT. Together, we're not just protecting systems; we're pioneering them. Come be a part of our team and redefine the possibilities in our industry!
Commitment to Diversity
This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status or on the basis of disability.
Equal Opportunity Employer/Veterans/Disabled
Malware Defense Malware Analyst
Cyber security analyst job in Washington, DC
Washington, District of Columbia;Chicago, Illinois; Denver, Colorado **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a friend **To proceed with your application, you must be at least 18 years of age.** Acknowledge (******************************************************************************************************
**Job Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world.
Responsibilities include, but are not limited to:
- In-depth analysis of malware, including authoring analysis reports.
- Tracking malware campaigns, malicious actors, and related infrastructure.
- Creation of tools and scripts to assist in the analysis of malware analysis.
- Field escalations of potentially malicious files and websites from teams within Malware Defense.
Required Qualifications:
- Strong direct experience of analyzing malware.
- Intermediate to advanced malware analysis skills.
- Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors.
- Experience creating tools and scripts to accelerate malware and threat analysis.
- Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc.
- Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc.
- Experience authoring YARA, Suricata, and EKFiddle detection rules.
- Experience with penetration testing and/or adversary emulation is a plus.
- Able to work independently on tasks, but also work well within a team environment
Desired Qualifications:
- Experience analyzing malware targeting Linux, Android, and IOT platforms.
Skills:
+ Cyber Security
+ Data Privacy and Protection
+ Problem Solving
+ Process Management
+ Threat Analysis
+ Business Acumen
+ Data and Trend Analysis
+ Interpret Relevant Laws, Rules, and Regulations
+ Risk Analytics
+ Stakeholder Management
+ Access and Identity Management
+ Data Governance
+ Encryption
+ Information Systems Management
+ Technology System Assessment
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Information Security Analyst
Cyber security analyst job in Washington, DC
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
************
Cyber Systems SSO
Cyber security analyst job in Washington, DC
is Subject to Contract Award JANUS Research Group is currently seeking a Cyber Systems SSO for a contract to support the Deputy Chief of Staff (DCS, G8. The DCS G-8 is the principal military advisor to the Chief of Staff, Army (CSA) and the Assistant Secretary of the Army, Financial Management and Comptroller (ASA(FMC)) for the Programming phase of the Planning, Programming, Budgeting, and Execution (PPBE) process. The DCS, G-8 coordinates with the Assistant Secretary of the Army, Acquisition, Logistics, and Technology (ASA(ALT)) on all proposed programming and process recommendations related to ongoing and future acquisition programs and science and technology initiatives. The DCS, G-8 coordinates with Army Futures Command (AFC) for program funding for all elements of the future force materiel modernization enterprise.
Position Description: Manages Army cyber capability development within the Intelligence Division. Provides analytical and technical expertise on cyber defense, network operations, and offensive cyber modernization. Develops information papers, briefings, and SPAR/POM inputs addressing capability gaps, performance, and operational integration. Coordinates with ASA(ALT), T2COM, ARCYBER, INSCOM, and ARSTAF to align cyber initiatives with Army and Joint modernization strategies.
Relevant Competencies / Skill Levels:
A Bachelor's Degree in Engineering and/or Business
A minimum of four (4) years of experience and expertise in Force Development duties
Demonstrates expert analytical and technical skills in cyber systems architecture, network defense, and offensive cyber capabilities. Proficient in evaluating system performance, security posture, and modernization impacts to ensure resilient and adaptive cyber operations. Possesses advanced analytical and communication abilities to deliver clear, data-driven assessments that enhance Army cyber capability development and operational readiness
Benefits: 401(k), Paid Time Off (PTO), Paid Holidays, Medical and Dental Plans, Life and Disability insurance, Education Assistance (and more).
JANUS strives to provide opportunities for career growth through training and development. We also offer an attractive comprehensive benefit package to include health and welfare plans and financial products. As part of a total rewards program, employees can benefit from our referral bonus program, and other various employee awards. JANUS Research Group takes pride in our benefit package and rewards program which has earned us the certification of a Great Place to Work
JANUS Research Group provides reasonable accommodation so that qualified applicants with a disability may participate in the selection process. Please advise us of any accommodations you request to express interest in a position by e-mailing: Judy Pagac, Chief Human Resources Officer at **************************** or calling **************. Please state your request for assistance in your message. Only reasonable accommodation requests related to applying for a specific position within JANUS Research Group will be reviewed at the e-mail address and phone number supplied. Thank you for considering a career with JANUS Research Group.
JANUS Research Group participates in the Electronic Employment Verification Program. Please click the E-Verify link below for more information.
E-Verify
JANUS Research Group is an equal opportunity/ affirmative action employer. It is company policy to provide equal opportunity in all areas of employment practice without regard to race, color, religion, sex, sexual orientation, national origin, age, marital status, veteran status, citizenship, or disability.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment qualified individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability.
IAM and Security Systems Analyst
Cyber security analyst job in Washington, DC
About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection.
This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response.
Key Responsibilities
Identity & Access Management (IAM)
Manage and support identity platforms including Active Directory, Azure AD, and Okta.
Implement RBAC, least privilege principles, and automated provisioning/deprovisioning.
Conduct periodic access reviews and support access certification processes.
Integrate IAM controls into application and cloud environments.
Security Engineering & Tooling
Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools.
Manage SIEM tools including rule tuning, log ingestion, and correlation.
Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST).
Perform application security testing and contribute to threat modeling and risk evaluations.
Lead cloud control monitoring, data protection measures, and compliance reporting.
Threat Detection & Incident Response
Conduct analysis of security alerts and lead incident response efforts.
Leverage threat intelligence to update detection mechanisms and enhance response playbooks.
Perform root cause analysis and evidence handling following incidents.
Support red team/blue team exercises and penetration testing activities.
Architecture, Process & SDLC Integration
Review and evaluate system and application security architectures.
Support integration of security controls across the SDLC and DevSecOps pipelines.
Design and continuously improve security processes and documentation.
Participate in security metrics and reporting efforts to track control effectiveness.
Support SOC design discussions and contribute to its operational maturity.
Collaboration & Compliance
Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives.
Assist with internal and external audits, control documentation, and evidence collection.
Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001.
Help run awareness training, phishing simulations, and risk assessments.
This is a hybrid
role
that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC.
Salary Range: $90,000-$110,000/annually
Required Qualifications
3-5 years of experience in a security engineering or analyst role
Strong experience with IAM platforms (Active Directory, Azure AD, Okta)
Proficient in SIEM platforms, incident response, and Microsoft security tools
Experience with automated security testing tools (SAST, DAST)
Familiarity with cloud security (Microsoft 365, Azure) and application security principles
Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus)
Strong understanding of network protocols, system hardening, and endpoint defense
Excellent problem-solving and communication skills
Preferred Qualifications
Familiarity with red teaming, penetration testing, and threat modeling
Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001
Participation in SOC design or operations
Experience with security metrics/reporting and risk assessments
Why Join Us:
You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains.
#LI-HybridCOMPENSATION & BENEFITS:
Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process.
Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants.
Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year.
Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year)
** This is an exempt role (paid on a salaried basis). **
ORGANIZATION DESCRIPTION:
Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington.
Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission.
COMMITMENT TO DIVERSITY:
Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: ***************************************************************
Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially.
TO APPLY:
Please submit a thoughtful cover letter and resume through our website.
Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
Auto-ApplyT1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Cyber security analyst job in Washington, DC
Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS)
Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET
JOB DESCRIPTION
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Job Posted by ApplicantPro
Information Security Analyst
Cyber security analyst job in Washington, DC
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
************