Post job

Cyber security analyst jobs in District of Columbia - 339 jobs

  • Malware Defense Analyst: Threat Hunter & Researcher

    Bank of America 4.7company rating

    Cyber security analyst job in Washington, DC

    A leading financial institution in Washington, DC is seeking a cybersecurity expert to enhance its malware defense team. Responsibilities include analyzing malware, tracking campaigns, and authoring reports. The ideal candidate must possess strong malware analysis skills, experience in creating analytical tools, and a solid understanding of network traffic analysis. This position offers an annual salary between $95,700.00 and $144,900.00 based on experience, alongside robust benefits aimed at ensuring employee wellness. #J-18808-Ljbffr
    $95.7k-144.9k yearly 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Assurance Engineer - Majestic - 26731

    Huntington Ingalls Industries 4.3company rating

    Cyber security analyst job in Washington, DC

    Search by Keyword (use Keyword for Remote Positions) Select how often (in days) to receive an alert: Information Assurance Engineer - Majestic - 26731 Required Travel: 0 - 10% Employment Type:Full Time/Salaried/Exempt Anticipated Salary Range:$75,791.00-$140,000.00 Security Clearance:TS/SCI Level of Experience:Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you. HII's Mission Technologies division is dedicated to delivering cutting‑edge solutions that advance national security and defense objectives. This position is part of our Cyber and Intelligence division, which plays a critical role in supporting Enterprise‑Level Security and Modernization efforts across IT infrastructure, cybersecurity, physical facilities, and personnel operations. The selected candidate will contribute to a high‑impact government program focused on enhancing and securing mission‑critical systems and environments. The program is scheduled to launch in early 2026 and due to the classified nature of the mission and the sensitivity of the operational environment, an active TS/SCI security clearance will be required. Information Assurance Engineer 1: $71,735 - $101,106 Information Assurance Engineer 2: $85,371 - $118,529 Information Assurance Engineer 3: $104,519 - $140,599 Information Assurance Engineer 4: $120,472 - $172,103 Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter‑espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Assesses and mitigates system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis. Implements security designs in hardware, software, data, and procedures. Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Supports secure systems operations and maintenance. Minimum Qualifications Information Assurance Engineer 1: 0 years experience with Bachelors in related field; or High School Diploma or equivalent and 4 years relevant experience. Information Assurance Engineer 2: 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience. Information Assurance Engineer 3: 5 years relevant experience with Bachelors in related field; 3 years relevant experience with Masters in related field; or High School Diploma or equivalent and 9 years relevant experience. Information Assurance Engineer 4: 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; or High School Diploma or equivalent and 13 years relevant experience. Relevant industry certifications (as applicable) Prior experience in defense, aerospace, or government contracting Proficiency with specialized tools or software aligned to the role Demonstrated ability to work collaboratively in multidisciplinary teams Active TS/SCI government security clearance required to start, candidate must willing to obtain and maintain a CI poly Physical Requirements Job performance will normally require only minor lifting and carrying of boxes of records or equipment. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills. Together we are working to ensure a future where everyone can be free and thrive. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law. Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e‑mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies. #J-18808-Ljbffr
    $120.5k-172.1k yearly 2d ago
  • Tanium Security Engineer - Federal Focus

    Medium 4.0company rating

    Cyber security analyst job in Washington, DC

    A cybersecurity solutions provider is seeking a Security Engineer specializing in Tanium to enhance endpoint management and security within federal government environments. Responsibilities include designing and maintaining Tanium infrastructure and collaborating with cybersecurity teams. Candidates must possess 12+ years of IT/Security experience and a relevant Bachelor's degree. This position offers a hybrid work model, a competitive salary between $135,000 and $155,000, and extensive benefits including medical and retirement plans. #J-18808-Ljbffr
    $135k-155k yearly 2d ago
  • Information Assurance Engineer / Security Manager

    C2 Labs, Inc.

    Cyber security analyst job in Washington, DC

    Information Assurance Engineer / Security ManagerC2 Labs, Inc. - ************** C2 Labs partners with clients on their IT transformation journey via our industry-leading capabilities in full stack development, hyper-automation/DevOps, and cybersecurity compliance. We provide specialized products and services that enable clients to innovate with speed and scale while maintaining a robust and effective security posture. As digital transformation partners, we address the most urgent needs holding back our clients, including proactively addressing cultural change, quantifying risk, automating compliance, and closing critical skill gaps We are seeking a highly skilled and experienced Information Security Engineering Manager to spearhead the development, implementation, and management of our organization's security infrastructure. This pivotal role will be responsible for safeguarding our critical assets and ensuring compliance with industry-leading security standards. You will lead a team of security professionals, providing technical guidance and fostering a culture of security awareness. Responsibilities Design, develop, and implement robust security networking architectures, incorporating Intrusion Detection/Prevention Systems (IDS/IPS) and other advanced security technologies. Develop and enforce comprehensive security policies and procedures aligned with industry best practices and regulatory requirements. Lead the monitoring and analysis of security systems, proactively identifying and responding to potential threats and vulnerabilities. Manage and optimize existing security solutions, ensuring their effectiveness and efficiency. Drive compliance initiatives, with a focus on the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls. Effectively manage security projects, ensuring timely completion and adherence to budget. Lead incident response efforts, coordinating investigations and implementing remediation strategies. Mentor and develop a high-performing team of security professionals. Qualifications Bachelor's degree in an IT-related field required. Minimum 15 years of experience in information security, or Certified Information Systems Security Professional (CISSP) certification with a minimum of 10 years of experience. Demonstrated deep understanding of information security principles, including access control, network security, cryptography, and vulnerability management. Proven experience in managing security projects and leading incident response activities. Extensive experience with the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls. Excellent communication, leadership, and problem-solving skills. EOE STATEMENT We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen. #J-18808-Ljbffr
    $72k-96k yearly est. 3d ago
  • Senior Security Engineer - Federal Cybersecurity Lead

    Emergencymd

    Cyber security analyst job in Washington, DC

    A leading IT solutions firm seeks a Senior Security Engineer to ensure the security of federal systems and data. The role involves designing advanced security solutions, conducting risk analysis, and integrating security into federal environments. Candidates should have a Bachelor's degree in a relevant field, CISSP certification, and extensive experience with government contracts. Strong leadership and communication skills are critical for success in this position. #J-18808-Ljbffr
    $98k-136k yearly est. 2d ago
  • Cyber Security Specialist (SNR)

    CSCI Consulting 3.7company rating

    Cyber security analyst job in Washington, DC

    CSCI Consulting is looking for a Cyber Security Specialist (SNR) to design & set up the ingestion of various customer data flows to include pre-processing data into a useable format, ensuring proper parsing and indexing. Collaborate with cross-functional teams and responsible for designing & integrating Elastic with a wide variety of data sources and developing associated knowledge objects such as queries, dashboards, reports, alerts for monitoring and analytics Responsibilities Perform data transformation using Elastic query language Track the health of the Elastic environment and optimize its performance. Troubleshoot and resolve issues related to security, performance, data indexing, and searches Perform watch-officer monitoring duties, including: Monitoring detecting, investigating, and responding to cybersecurity threats and events using Elastic /SIEM Platform Reviewing correlated alerts and logs for compromise scenarios Performing triage of security alerts to prioritize response Identifying false positives Investigating security incidents and determining root cause Collecting and preserving logs for analysis Escalating confirmed incidents to leadership or SOC teams Coordinating with IT or DevOps for containment and remediation Creating after-action reports (AAR) post-incident In addition, the role may include assistance with monitoring Vulnerability Management tools, such as ACAS and ePO Minimum Requirements Have at least three years of working knowledge and hands-on experience with Elastic/Splunk query languages, monitoring SIEM dashboards and real-time alerts, fine-tuning SIEM rules to reduce noise, and NIST 800-53 & DevSecOps frameworks Must have a DoD/DoW Secret Security Clearance US Citizenship is required Required IT Level: ITII Must currently possess a Security+ certificate Creativity and adaptability in problem-solving Ability to work with clients to understand their needs Strong organizational and time-management skills Excellent written and verbal communication skills Professional presence Preferred Skills Ability to work in a team environment, as well as independently Strong customer and vendor relationship skills Demonstrated ability to comply with data standards and policies Motivation to learn new technologies and methodologies that demonstrate value Past experience working with a federal agency Department of Defense/Department of War experience is a plus! About CSCI CSCI is an award-winning information technology and financial management consulting firm founded on one simple philosophy: "Do what is right, always." We apply this philosophy across all elements of our growing business, from delivering world-class services for customers to providing an environment where associates thrive both personally and professionally. At CSCI, work and fun aren't diametrically opposed! At CSCI, our goal is to hire people with proven track records and retain them with an energizing, diverse company culture. We value each associate's natural drive to excel, and we provide them with the freedom to do things their way. CSCI seeks the best and brightest in the industry-those who are ready to move their lives and career forward. Join us today and get excited about Mondays again! Benefits of Working at CSCI Competitive salaries Generous Paid Time Off (PTO) package Paid holidays aligned to the Federal calendar Full health benefits including medical, dental, vision, and life insurance 401(k) retirement plan Team building events Professional development support Legal CSCI complies with all applicable Federal, state, and local employment regulations. Please reach out to with any questions. Equal Employment Opportunity All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. CSCI provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. If you require an accommodation, please contact CSCI Human Resources for further assistance. For questions regarding the qualifications listed above, please contact the CSCI Recruiting Team. E-Verify CSCI participates in E-Verify to confirm the employment eligibility of all newly hired employees. For more information, please visit********************* California Consumer Privacy Act (CCPA) Notice As part of the application and recruitment process, CSCI Consulting, Inc. may collect personal information as described under the California Consumer Privacy Act (CCPA). This information is collected solely for employment-related purposes, including evaluating your qualifications, processing your application, and complying with legal obligations. By applying to this position, you acknowledge that you have read and understand the following notice regarding the collection of your personal information as a job applicant: Categories of Information Collected: Personal identifiers, employment history, educational information, and any other information provided in your application or as part of the interview process. Purposes for Collecting Information: To review your application, assess your qualifications, and manage the hiring process. Retention and Security: Information collected will be retained indefinitely and will be securely stored and handled in accordance with CCPA guidelines and CSCI Consulting, Inc. policies. Rights of Applicants: Under CCPA, California residents have the right to request information about the personal data we collect, delete it, and request restrictions on certain uses. However, some information may be retained as required by law. For further information, or to exercise your rights under the CCPA, please contact CSCI's HR team. Disclaimer The above declarations are not intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be such a listing of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job.
    $91k-121k yearly est. 4d ago
  • Principal Cloud Security Engineer

    Zealotech People

    Cyber security analyst job in Washington, DC

    Clearance: Active Secret Employment Type: Full-Time We are seeking a Principal Cloud Security Engineer to lead the design, automation, and enforcement of security across large-scale federal cloud environments. This role focuses on cloud security architecture, DevSecOps automation, and secure platform enablement in a multi-cloud ecosystem. The ideal candidate is highly technical, self-directed, and comfortable operating as the senior security authority for cloud platforms. You will define secure patterns, implement guardrails at scale, and embed security directly into infrastructure and CI/CD pipelines. Key Responsibilities: Cloud Security Architecture: Design and guide secure architectures across AWS, Azure, and GCP, including GovCloud and restricted environments Define and enforce security baselines aligned with NIST 800-53, FedRAMP, and CIS Benchmarks Lead threat modeling, architecture reviews, and secure design guidance for cloud workloads DevSecOps & Automation: Build and maintain Infrastructure as Code using Terraform (preferred) and cloud-native tooling Integrate automated security controls into CI/CD pipelines (SAST, DAST, IaC scanning, container scanning) Implement policy-as-code guardrails using tools such as AWS SCPs, Azure Policy, and cloud-native governance services Develop automated remediation and enforcement workflows to reduce manual security effort Governance, Compliance & Visibility: Embed compliance controls directly into cloud infrastructure and pipelines to support ATO efforts Partner with compliance teams and auditors on evidence collection and continuous monitoring Implement centralized logging, monitoring, and incident response across cloud environments Technical Leadership: Serve as the senior cloud security SME for engineers, architects, and stakeholders Mentor engineers on secure cloud development and DevSecOps practices Translate complex security concepts to both technical and non-technical audiences Required Qualifications: Active Secret clearance 8+ years in cybersecurity or cloud engineering, including 5+ years focused on cloud security Deep hands-on experience securing AWS, Azure, or GCP (experience in at least two preferred) Strong Infrastructure as Code experience (Terraform strongly preferred) Experience integrating security into CI/CD pipelines (GitHub Actions, GitLab, or similar) Proficiency in Python, Go, PowerShell, or Bash Strong understanding of IAM, networking, encryption, key management, and cloud-native security services Ability to operate independently and define security priorities without daily direction Preferred Qualifications: Experience securing GovCloud, DoD IL5/IL6, or other regulated cloud environments Kubernetes and container security experience Zero Trust architecture implementation experience ServiceNow integrations for security workflows Cloud security certifications (AWS Security Specialty, Azure Security Engineer, etc.) What Makes This a True Principal Role: Highly hands-on and deeply technical Owns security outcomes rather than executing predefined tasks Heavy DevSecOps and IaC focus Large-scale, multi-cloud environment Architecture and influence matter as much as implementation
    $84k-117k yearly est. 2d ago
  • Cyber Threat Analyst

    Us Government Other Agencies and Independent Organizations 4.2company rating

    Cyber security analyst job in Washington, DC

    Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Summary Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Overview Help Accepting applications Open & closing dates 10/01/2025 to 09/30/2026 Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15 Location Many vacancies in the following location: Washington, DC Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted Promotion potential None Job family (Series) * 0132 Intelligence Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No Announcement number 23-11942190-6868/AHD Control number 722102800 This job is open to Help The public U.S. Citizens, Nationals or those who owe allegiance to the U.S. Federal employees - Competitive service Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales. Federal employees - Excepted service Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria. Videos Duties Help As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community. You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings. Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government. Requirements Help Conditions of employment * You must be physically in the United States or one of its territories when you submit your resume via MyLINK. * You must be registered for the Selective Service, if applicable. * You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible). * You must be willing to move to the Washington, DC area. * You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation. * For further information, please visit: **************************************** Qualifications Minimum Qualifications Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin. A mix of international and technical studies, to include a bachelor's or master's degree in the following fields: * International Relations, Foreign Affairs, or Security Studies * Cyber Security * Computer Science * Digital Forensics * Telecommunications * Information Assurances * Interest in international affairs * Awareness of U.S. national security interests * At lease a 3.0 GPA on a 4-point scale is preferred * Ability to work under tight deadlines * Excellent analytic abilities and relevant experience * Strong critical thinking, problem solving skills, and ability to think creatively * Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation Desired Qualifications * Foreign language proficiency * Strong verbal presentation skills * Demonstrated ability to write clear, concise text * Research experience in international affairs * Ability to work in a team environment * Interest in a career that requires regular writing assignments Education * Bachelor's or master's degree in one of the following fields: * Computer Science * Computer Engineering * Digital Forensics * Cyber Security * Telecommunications * Information Assurances * Security Studies * A mix of international and technical studies * At least a 3.0 GPA on a 4-point scale is preferred Additional information Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution. Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. How you will be evaluated You will be evaluated for this job based on how well you meet the qualifications above. For further information about this position, please visit: ***************************** Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. Required documents Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating. How to Apply Help This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself. Agency contact information Central Intelligence Agency Website *********************** Next steps After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information. Fair and transparent The Federal hiring process is set up to be fair and transparent. Please read the following guidance. Criminal history inquiries Equal Employment Opportunity (EEO) Policy Financial suitability New employee probationary period Privacy Act Reasonable accommodation policy Selective Service Signature and false statements Social security number request Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
    $63.3k-156.8k yearly 32d ago
  • Cyber Security Analyst - Government Publishing Office (GPO)

    Tln Worldwide Enterprises, Inc.

    Cyber security analyst job in Washington, DC

    Requirements - Bachelor's degree in Cybersecurity, Information Technology, or a related field is preferred. - Relevant certifications (CISSP, CEH, etc.) are a plus. - Previous experience in a cybersecurity role, especially within government or federal organizations, is desired. Salary Description 100,000 - 120,000
    $82k-111k yearly est. 60d+ ago
  • Cyber Security Analyst

    Csv-Taurean

    Cyber security analyst job in Washington, DC

    Clearance: T5/6C High Risk Public Trust (required) Summary:Provide continuous monitoring, vulnerability assessment, incident response, and compliance documentation for OIG systems. Ensure compliance with NIST 800-53, FedRAMP, and FISMA standards. Key Duties: Monitor network activity with SIEM tools; investigate and report security incidents. Conduct vulnerability scans; implement patches and remediation. Support POA&Ms, ATO documentation, and FedRAMP compliance. Assist with contingency planning and incident response exercises. Qualifications: Bachelor's degree in Cybersecurity, IT, or related field. 8+ years of cybersecurity experience. Certifications: CISSP, CEH, CCSP, or equivalent.
    $82k-111k yearly est. 60d+ ago
  • Cyber Security Analyst

    Zone It Solutions

    Cyber security analyst job in Washington, DC

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $82k-111k yearly est. Easy Apply 4d ago
  • Intrusion Detection Analyst - 2nd Shift

    Govcio LLC

    Cyber security analyst job in Washington, DC

    GovCIO is currently hiring for a 2nd shift (3pm - 11:30pm) Intrusion Detection Analyst onsite in Washington, DC. Responsibilities: Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client Provides timely and actionable sanitized intelligence to cyber incident response professionals Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership Qualifications: Bachelor's with 8+ years of cyber security experience (or commensurate experience) 7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs Working experience of Splunk SIEM. Contractor will have at least two years as a cyber security or security operations shift team leader At least five years' experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment Company Overview: GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? What You Can Expect Interview & Hiring Process If you are selected to move forward through the process, here's what you can expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented during each interview During the Hiring Process Enhanced Biometrics ID verification screening Background check, to include: Criminal history (past 7 years) Verification of your highest level of education Verification of your employment history (past 7 years), based on information provided in your application Employee Perks At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: Employee Assistance Program (EAP) Corporate Discounts Learning & Development platform, to include certification preparation content Training, Education and Certification Assistance* Referral Bonus Program Internal Mobility Program Pet Insurance Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. Posted Pay Range The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. Posted Salary Range: USD $108,310.00 - USD $150,000.00 /Yr.
    $108.3k-150k yearly Auto-Apply 2d ago
  • Intrusion Detection Analyst - 2nd Shift

    Govcio

    Cyber security analyst job in Washington, DC

    GovCIO is currently hiring for a **2nd shift (3pm - 11:30pm)** Intrusion Detection Analyst onsite in Washington, DC. **Responsibilities** + Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client + Provides timely and actionable sanitized intelligence to cyber incident response professionals + Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture + Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks + Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership **Qualifications** + Bachelor's with 8+ years of cyber security experience (or commensurate experience) + 7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs + Working experience of Splunk SIEM. Contractor will have at least two years as a cyber security or security operations shift team leader + At least five years' experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment **Company Overview** GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? **What You Can Expect** **Interview & Hiring Process** If you are selected to move forward through the process, here's what you can expect: + During the Interview Process + Virtual video interview conducted via video with the hiring manager and/or team + Camera must be on + A valid photo ID must be presented during each interview + During the Hiring Process + Enhanced Biometrics ID verification screening + Background check, to include: + Criminal history (past 7 years) + Verification of your highest level of education + Verification of your employment history (past 7 years), based on information provided in your application **Employee Perks** At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: + Employee Assistance Program (EAP) + Corporate Discounts + Learning & Development platform, to include certification preparation content + Training, Education and Certification Assistance* + Referral Bonus Program + Internal Mobility Program + Pet Insurance + Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. **We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. **Posted Pay Range** The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an "at-will position" and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. **Posted Salary Range** USD $108,310.00 - USD $150,000.00 /Yr. Submit a referral to this job (******************************************************************************************************************************************** **Location** _US-DC-Washington, D.C._ **ID** _2026-7338_ **Category** _Information Technology_ **Position Type** _Full-Time_
    $108.3k-150k yearly 13d ago
  • Cyber Network Defense Analyst (CNDA) - Cloud Forensics

    Argo Cyber Systems

    Cyber security analyst job in Washington, DC

    Job DescriptionWhy Argo Cyber Systems At Argo, you'll be part of a mission-driven, veteran-founded cybersecurity team protecting America's most critical systems. We combine hands-on technical excellence with operational precision to outpace the threat. Join us to defend, detect, and innovate at the cyber edge. Argo Cyber is supporting a U.S. Government customer on a mission-critical cyber operations program. We are seeking a ServiceNow SecOps Business Process / Technical Consultant to design, develop, and implement ServiceNow Security Operations (SecOps) solutions that enhance the customer's ability to detect, respond, and remediate security threats. This hybrid role combines ServiceNow SecOps development, integration engineering, and process consulting. The ideal candidate will work directly with security stakeholders, translate mission requirements into technical designs, and deliver scalable, secure, and automated SecOps capabilities within the ServiceNow platform. Responsibilities Include: • Designing, prototyping, and implementing ServiceNow SecOps applications, including: o Security Incident Response (SIR): enrichment, correlation rules, and automated playbooks. o Vulnerability Response (VR): scanner integrations, remediation workflows, patch group automation. o Configuration Compliance (CC): policy exception handling, remediation tasks, compliance dashboards. o Threat Intelligence (TI): ingestion of IOCs, sightings search, enrichment workflows. • Supporting the customer's roadmap for Splunk integrations to enable alert ingestion, bi-directional incident synchronization, and SIEM dashboards. • Developing custom integrations with SIEM, scanner, and intel tools (e.g., Splunk, Tenable, VirusTotal, Hybrid Analysis) using IntegrationHub, REST/SOAP APIs, and MID Server. • Building and maintaining orchestration playbooks, Flow Designer workflows, Business Rules, and Script Includes to automate enrichment and response actions. • Documenting and maintaining policies, procedures, and technical designs aligned with Agile development practices and secure coding standards. • Leading workshops with SOC, IR, and VR teams to capture mission needs, define business requirements, and translate them into technical solutions. • Creating and maintaining Performance Analytics dashboards and KPIs to provide real-time visibility into security posture. • Supporting incident resolution, troubleshooting, and sustainment of the ServiceNow SecOps environment. • Providing mentorship and knowledge transfer to client staff on best practices and solution sustainment. Required Skills: • U.S. Citizenship required. • Must be able to obtain DHS program suitability and a TS/SCI clearance. • 8+ years of software development, IT security, or IT systems engineering experience. • Minimum 4+ years of ServiceNow experience, with at least 2+ years focused on SecOps applications (SIR, VR, CC, or TI). • Strong knowledge of ServiceNow administration, advanced configuration, and custom application development. • Experience integrating ServiceNow with SIEM, vulnerability scanners, and threat intelligence platforms. • Hands-on experience with Flow Designer, Orchestration, IntegrationHub, and MID Server. • Strong technical skills in web technologies (JavaScript, HTML, XML, Angular, CSS) and integration technologies (REST, SOAP, LDAP, SSO). • Familiarity with federal cybersecurity frameworks (NIST 800-53, FedRAMP, CISA KEV, MITRE ATT&CK). • Strong communication, presentation, and documentation skills for technical and business stakeholders. Desired Skills: • Experience supporting DHS, DoD, or Intelligence Community customers. • Experience deploying future-state SecOps processes including incident triage, vulnerability management, compliance automation, and threat intel workflows. • Familiarity with Splunk use cases for security operations and event correlation. • Experience with collaboration tools (MS Teams, Outlook, SharePoint, Atlassian Jira/Confluence). • Strong problem-solving, analytical, and consulting skills in complex security environments. • Information Systems Security Engineering Professional (ISSEP) or Information System Security Architect Professional (ISSAP) certification desired. Desired Certifications: • ServiceNow Certified System Administrator (CSA). • ServiceNow Certified Application Developer. • ServiceNow Certified Implementation Specialist - SecOps (SIR, VR, or CC). • ITIL v4 Foundation certification (or willingness to complete within one year). • DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification highly desired Argo Cyber systems is an Equal Opportunity Employer! Background & Drug Screening Disclaimer © Argo Cyber Systems, LLC - All Rights Reserved Argo Cyber Systems, LLC is committed to maintaining a safe, secure, and trusted workplace for all employees and our federal clients. Employment with Argo Cyber Systems is contingent upon successful completion of all required background investigations and pre-employment screenings, which may include, but are not limited to: Criminal background checks (federal, state, and local) Employment and education verification Reference checks Drug screening (in compliance with federal and state law) Security clearance verification (as applicable for classified positions) Candidates selected for employment in positions requiring access to sensitive or classified information may also be subject to additional U.S. Government background investigations and security adjudication processes, including DHS Entry on Duty (EOD) suitability or equivalent federal clearance requirements. Argo Cyber Systems reserves the right to disqualify or rescind an offer of employment based on the results of any background or screening process that, in the company's judgment, may impact an individual's ability to perform essential job functions or meet contractual obligations. All background investigations and screenings are conducted in accordance with applicable federal, state, and local laws, including the Fair Credit Reporting Act (FCRA). Candidates will be notified of their rights and provided an opportunity to review and dispute any adverse findings before final employment determinations are made. Job Posted by ApplicantPro
    $65k-91k yearly est. 1d ago
  • T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)

    Critical Solutions 3.5company rating

    Cyber security analyst job in Washington, DC

    Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS) Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET JOB DESCRIPTION Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC. The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs). PRIMARY ROLES AND RESPONSIBILITIES: Utilize a SIEM for enterprise monitoring and detection Create Security Event Notifications to document investigation findings Perform critical thinking and analysis to investigate cyber security alerts Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc) Collaborate with team members to analyze an alert or a threat Stay up to date with latest threats Monitor shared email box for notifications and requests Utilize OSINT to aid in their investigation Contribute to content tuning requests BASIC QUALIFICATIONS: Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance must have the ability to work non-core hours, if necessary. Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below: Network Administration Unix/Linux Administration Software engineering Software development Systems administration Help desk/IT support The ideal candidate is a self-motivated individual in pursuit of a career in cyber security. Familiarity with a SOC's purpose and role within an organization General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). Familiarity with packet analysis tools such as Wireshark Able to perform critical thinking and analysis to investigate cyber security alerts Familiarity with common malware and attack vectors Familiarity with Windows operating systems and standard OS logging Familiarity with Antivirus, DLP, and host based firewalls Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+ PREFERRED QUALIFICATIONS: Familiar with SOC methodologies and processes Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc) SHIFT SCHEDULE: Shift schedule will be determine at the time of the start date Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift) Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift) Must have the ability to work non-core hours, if necessary. LOCATION: This is a hybrid role with expectations of being on the client site most days. Must be willing and able to commute to Washington, DC ADDITIONAL INFORMATION: CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED CRITICAL SOLUTIONS PAY AND BENEFITS: Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements. BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more Job Posted by ApplicantPro
    $58k-74k yearly 16d ago
  • Lead Cyber Defense Forensics Analyst

    Harmonia Holdings Group, LLC 4.3company rating

    Cyber security analyst job in Washington, DC

    Job Description Harmonia Holdings Group, LLC is an award-winning, rapidly growing federal government contractor committed to providing innovative, high-performing solutions to our government clients and focused on fostering a workplace that encourages growth, initiative, creativity, and employee satisfaction. Description Title: Lead Cyber Defense Forensics Analyst Location: Washington D.C. Terms: Full-time Clearance: Ability to obtain a MBI Public Trust Travel: 0% Position Description The Lead Cyber Defense Forensics Analyst supports leading digital forensic investigations and incident response efforts across enterprise IT environment. This role is responsible for overseeing the collection, preservation, analysis, and reporting of digital evidence related to cyber incidents, insider threats, and compliance requirements. The lead analyst provides technical expertise, mentors team members, and ensures forensic capabilities meet federal standards and best practices. Responsibilities: Lead and coordinate digital forensic investigations involving systems, networks, endpoints, and cloud environments. Oversee the collection, preservation, and analysis of electronic evidence in support of incident response, legal, HR, and compliance activities. Perform in-depth forensic analysis of compromised systems, malware, and artifacts to determine root cause, impact, and remediation strategies. Develop and maintain forensic methodologies, standard operating procedures, and chain-of-custody documentation in accordance with federal guidelines. Collaborate with SOC, threat intelligence, and incident response teams to support rapid detection, containment, and recovery from cyber incidents. Prepare detailed forensic reports, executive summaries, and presentations for technical and non-technical audiences, including leadership and external stakeholders. Support e-discovery, litigation, and regulatory investigations as required. Mentor and train junior analysts, and contribute to the continuous improvement of forensic and incident response capabilities. Stay current with emerging threats, forensic tools, and investigative techniques relevant to the federal sector. Requirements Bachelor's degree in Information Security, Computer Science, Digital Forensics, or related field. 5+ years of experience in digital forensics, incident response, or cybersecurity operations. Advanced expertise with forensic tools and platforms (e.g., EnCase, FTK, X-Ways, Volatility, Cellebrite). Strong knowledge of evidence handling, chain-of-custody, and federal investigative standards. Experience with malware analysis, memory forensics, and cloud forensics. Excellent analytical, communication, and report writing skills. Proven leadership and mentoring abilities. Ability to pass an MBI (Minimum Background Investigation) clearance. Desired Professional certifications such as GCFA, GCFE, CCE, EnCE, or CISSP. Experience supporting federal or public sector environments. Familiarity with e-discovery processes and legal/regulatory requirements. Exposure to cloud and hybrid infrastructure forensics. #LI #DICE ___________________________________________________________________________________________________________ Here at Harmonia we are pleased to have been repeatedly recognized for our outstanding work culture, the innovative work we do, and the employees on our team who make a difference each day. Some of these recognitions include: Recognized as a Top 20 "Best Place to Work in Virginia" Recipient of Department of Labor's HireVets Gold Medallion Great Place to Work Certification for five years running A Virginia Chamber of Commerce Fantastic 50 company A Northern Virginia Technology Council Tech 100 company Inc. 5000 list of fastest growing companies for eleven years Two-time SBA SBIR Tibbett's Award winner Virginia Values Veterans (V3) Certification We recognize that every bit of our success is the result of our teams of hard-working, motivated, and innovative professionals who are proud to call themselves part of the Harmonia family! In addition to competitive compensation, a family-focused culture, and a dynamic, productive work environment, we offer all full-time employees a variety of benefits including, but not limited to Traditional and HSA- eligible medical insurance plans 100% employer-paid dental and vision insurance options 100% employer-sponsored STD, LTD, and life insurance 5% 401(k) company matching Flexible-schedules and teleworking options Paid holidays and PTO Accrual Plans Paid Parental Leave Professional development and career growth opportunities Team and company-wide events, recognition, and appreciation-- and so much more! Check out our LinkedIn, Facebook, and Instagram to find out a little more about who we are and if we are the right next step for your career! Harmonia is an Equal Opportunity Employer providing equal employment opportunity to all employees and applicants for employment without regard to race, color, religion, national origin, age, gender, gender identity, sexual orientation, disability, or genetics. Harmonia does and will take affirmative action to employ and advance in employment individuals with disabilities and protected veterans. To perform the above job successfully, an individual must possess the knowledge, skills, and abilities listed; meet the education and work experience required; and must be able to perform each essential duty and responsibility satisfactorily. Other duties in addition to those listed may be assigned as necessary to meet business needs. Reasonable accommodation will be made to enable an applicant with a disability to successfully apply for and/or perform the essential duties of the job. If you are in need of an accommodation, please contact ***************.
    $63k-86k yearly est. 17d ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Cyber security analyst job in Washington, DC

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 2d ago
  • Senior Security Engineer - Tanium

    Medium 4.0company rating

    Cyber security analyst job in Washington, DC

    Make a difference here. UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams. By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. We are seeking a Security Engineer with Tanium expertise to support endpoint management, security, and compliance operations within federal government environments. This role will implement and manage Tanium solutions to enhance visibility, control, and security across the enterprise endpoint infrastructure. What You'll Do: Design, deploy, and maintain Tanium infrastructure including servers, modules, and connectors. Implement and optimize Tanium modules, providing O&M support of Tenable and ForeScout Create and maintain Tanium content including sensors, packages, and saved questions Configure and optimize Tanium solutions such as Patch, Comply, Discover, Threat Response, Monitor, and Enforce. Manage package deployment, module updates, and client health across the enterprise. Develop automation workflows for security and compliance monitoring using Tanium Support vulnerability management processes using Tanium and Tenable Configure and maintain Tanium Connect integrations with other security tools Assist with incident response activities using Tanium Threat Response Generate compliance reports to support federal requirements (FISMA, RMF, NIST) Troubleshoot Tanium, Tenable, and ForeScout Document configurations, procedures, and architecture Collaborate with cybersecurity teams to implement security controls across supporting productions What You Have: US Citizenship Required, with ability to pass DHS background check & clearance Bachelor's degree in Cybersecurity, Information Technology, or related field 12+ years of experience in IT/Security + Bachelors Degree Experience and knowledge using Tanium, Tenable, and ForeScout Understanding of endpoint security principles and technologies Experience with Windows and Linux operating systems Familiarity with federal security frameworks and compliance requirements Basic scripting abilities (PowerShell, Python, or Shell) Strong problem-solving and analytical skills Preferred Qualifications: Tanium Certified Operator or Administrator certification Experience in federal agency IT or security operations Additional security certifications (Security+, CISSP Associate, CySA+) Experience with other endpoint management or security tools Knowledge of vulnerability management practices Familiarity with CISA directives and CDM program requirements Experience with configuration management and compliance automation Work Environment: Hybrid work model with 2 day/week on-site presence near National Harbor, Maryland May require occasional after-hours support during security events Opportunities for professional development and certification Must be able to pass a Federal background investigation - US Citizenship required What We Offer: 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment) Group Term Life, Short-Term Disability, Long-Term Disability Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness Participation in the Discretionary Time Off (DTO) Program 11 Paid Holidays Annually $135,000 - $155,000 a year UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors. We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable. UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. If you want to make an impact, UltraViolet Cyber is the place for you! #J-18808-Ljbffr
    $135k-155k yearly 2d ago
  • Senior InfoSec Engineer & RMF/NIST Security Leader

    C2 Labs, Inc.

    Cyber security analyst job in Washington, DC

    A tech solutions provider based in Washington is seeking an experienced Information Assurance Engineer / Security Manager to lead the development and management of security infrastructure. The ideal candidate will have 15+ years in information security, overseeing security projects, and enhancing compliance. Strong leadership and communication skills are essential for mentoring a high-performing team. This role offers an opportunity to impact the security strategy and operations significantly. #J-18808-Ljbffr
    $98k-136k yearly est. 3d ago
  • Senior Security Engineer

    Emergencymd

    Cyber security analyst job in Washington, DC

    Evolver Federal is seeking a Senior Security Engineer to fulfill a requirement for a potential government client. The Senior Security Engineer is responsible for designing, implementing, and maintaining advanced security solutions to protect federal systems and data. This role prioritizes continuous monitoring, FISMA compliance, and OIG audit readiness while engineering secure architectures, integrating cybersecurity technologies, and ensuring adherence to federal standards such as NIST 800-series, RMF, and TIC 3.0. The Senior Security Engineer will work closely with SOC teams, architects, and program managers to deliver robust security capabilities across cloud (AWS GovCloud, Azure Government), on-premises, and hybrid environments. This position requires deep technical expertise, hands-on experience with security tools, and the ability to lead engineering efforts for mission‑critical systems in highly regulated environments. Responsibilities Design and implement security solutions for enterprise and federal environments, ensuring compliance with RMF and NIST guidelines. Engineer secure configurations for SIEM, SOAR, EDR, and vulnerability management platforms. Support Tier 2/3 SOC analysts by developing advanced correlation rules for Splunk and optimizing detection workflows. Support SOC operations by integrating advanced detection and response capabilities. Conduct security assessments, penetration testing, and risk analysis for critical systems. Implement continuous monitoring and automated compliance reporting to meet Department of Labor and federal requirements. Develop and maintain security engineering documentation, including system security plans and architecture diagrams. Collaborate with architects and program managers to align security engineering with strategic objectives. Lead efforts to integrate security into DevSecOps pipelines and CI/CD workflows. Provide technical expertise during incident response and forensic investigations. Evaluate emerging technologies and recommend enhancements to improve security posture. Define and track measurable outcomes such as MTTR reduction, SLA adherence, compliance score improvements, and false positive reduction to meet performance‑based contract KPIs. Coordinate with federal stakeholders (CISO, ISSOs, AO) and provide audit support for ATO processes. Ensure adherence to performance‑based contract requirements and federal cybersecurity mandates. Basic Qualifications Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience, or 4 years' experience in IT Solutions at senior management Certified Information Systems Security Professional (CISSP) mandatory with Information Systems Security Engineering Professional (ISSEP) concentration Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended) Information Technology Infrastructure Library (ITIL) 4 Foundation 10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical contract/BPAs US Citizen with the ability to pass a comprehensive government background check Preferred Qualifications Master's degree in cybersecurity, IT, or a related technical field Experience supporting SOC operations in federal or regulated environments Familiarity with RMF, NIST 800-series, OMB A-130, and TIC 3.0 Proven leadership in cross‑functional teams and performance‑based contracts Strong communication skills, including executive briefings and incident reporting Hands‑on experience with SIEM (Splunk, Elastic), SOAR (Cortex XSOAR), and EDR (CrowdStrike, Microsoft Defender). Expertise in cloud security engineering (AWS, Azure, GCP) and container security (Kubernetes, Docker). Familiarity with Zero Trust Architecture principles and implementation strategies. Familiarity Continuous Diagnostics and Mitigation (CDM). Experience with PKI, encryption standards, and secure network design. Knowledge of automation tools for security orchestration and compliance reporting. Ability to lead technical teams and mentor junior engineers in cybersecurity best practices. Experience integrating security controls into large-scale federal systems and mission‑critical applications. Understanding of advanced threat detection techniques and AI‑driven security solutions. Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law. Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. #J-18808-Ljbffr
    $98k-136k yearly est. 2d ago

Learn more about cyber security analyst jobs

Do you work as a cyber security analyst?

What are the top employers for cyber security analyst in DC?

Top 10 Cyber Security Analyst companies in DC

  1. DirectViz Solutions

  2. BAE Systems

  3. Google

  4. General Dynamics

  5. Zone It Solutions

  6. U.s.government

  7. Comtech

  8. Lt Security Inc.

  9. Evolver

  10. Csv-Taurean

Job type you want
Full Time
Part Time
Internship
Temporary

Browse cyber security analyst jobs in district of columbia by city

All cyber security analyst jobs

Jobs in District of Columbia