Post job

Cyber security analyst jobs in Greenbelt, MD - 1,479 jobs

All
Cyber Security Analyst
Senior Security Engineer
Information Systems Security Officer
Information Security Engineer
Security Engineer
Cyber Security Engineer
Information Assurance Engineer
Senior Information Security Engineer
  • Lead Cyber Fusion Analyst

    Leidos 4.7company rating

    Cyber security analyst job in Odenton, MD

    This position will support GSM-O II Task Number 07 (TN07), which provides support to the DoD Cyber Defense Command (DCDC). DCDC provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support DCDC Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Lead the DCDC Fusion Analyst team including employee engagement, training, performance reviews, and all other Leidos employee needs. Includes mentoring, assigning and reviewing work and planning/scheduling to ensure milestones are completed in accordance with the program work statement. Identify problems, determine accuracy and relevance of a broad range of technical information. Use sound judgment to generate, evaluate, and execute alternative courses of action. Produce timely, effective, decision-quality technical recommendations to support senior leadership. Serve as a lead for planning, coordination, implementation, validation, mitigation, and compliance of cyber operations/intel security tasks. Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity. Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment. Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends. Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements. Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure. Required Qualifications Active DoD TS/SCI Clearance and eligible for polygraph. DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.). Bachelor's degree in related discipline and 12+ years of related experience. Additional experience may be accepted in lieu of degree. Strong communications and interpersonal skills. Proficient in Microsoft Office applications (Word, Excel, Outlook, PowerPoint). Proficient in Windows 7/8/10/11. Ability to work in a virtual environment like Microsoft Teams. Experience working with members of the Intelligence Community (IC) and knowledge and understanding of Intelligence processes. In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies. Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threatindicators, malware analysis results, Wireshark, Arcsight, etc.). Experience with IC repositories (Pulse, TESTFLIGHT, etc.) Experience with various open-source and commercial vendor portals, services and platform that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise. Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs). Preferred Qualifications Experience with the DODIN and other DoD Networks. Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OSINT Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. Experience in intelligence driven defense and/or Cyber Kill Chain methodology. IAT Level III or IAM Level II+III Certifications Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. #J-18808-Ljbffr
    $72k-90k yearly est. 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Lead Cyber Threat Analyst

    Directviz Solutions, LLC 3.6company rating

    Cyber security analyst job in Washington, DC

    DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS offers competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development reimbursement, corporate-funded technology certifications, and employee recognition programs. At DVS, we recognize that our employees are our number one resource. If you are a problem-solving people-person, apply today! Location Washington, DC Position Lead Cyber Threat Analyst Location: Washington, DC Position Summary The Lead Cyber Threat Analyst serves as the technical and operational lead for enterprise cybersecurity operations, overseeing approximately 63 systems and ensuring compliance with all federal security standards. This role drives the organization\'s threat detection, analysis, and response strategy, leads the Computer Security Incident Response Center (CSIRC), and manages enterprise security monitoring tools within the Enterprise Security Operations Center (ESOC). The position requires deep expertise in cybersecurity frameworks, threat intelligence, and vulnerability management, combined with strong leadership, analytical, and communication skills to guide analysts, coordinate incident response, and safeguard sensitive financial and operational systems. Key Responsibilities Lead enterprise-wide cybersecurity operations across ~63 systems, ensuring continuous protection and compliance with federal security standards. Oversee daily security monitoring, analysis, and response activities within the ESOC. Direct 24/7 CSIRC operations, including incident triage, containment, and recovery. Develop and maintain comprehensive security documentation, including System Security Plans (SSPs), Privacy Impact Assessments (PIAs), and RMF artifacts. Conduct annual Security Control Assessments (SCAs) and evaluate new systems and applications. Identify, track, and remediate vulnerabilities and risks across enterprise environments. Develop and maintain a real-time Cyber Threat Dashboard for senior leadership reporting and situational awareness. Lead the Vulnerability Management Program, including prioritization, patching, and remediation oversight. Monitor and analyze network traffic for potential intrusions, unauthorized activity, and anomalous behavior. Manage security tools, threat intelligence feeds, and automation solutions supporting the ESOC mission. Provide training, mentoring, and technical guidance to cybersecurity analysts and SOC staff. Oversee incident handling involving Personally Identifiable Information (PII) and ensure proper documentation and escalation. Collaborate with cross-functional and government stakeholders to align operations with NIST, FISMA, and organizational security policies. Support the protection and compliance of financial systems under the OCFO through proactive risk management. Maintain system and application security posture, ensuring ongoing compliance and operational integrity. Qualifications Bachelor\'s degree in Computer Science, Information Technology, Engineering, or a related field. Minimum of 10 years of progressive IT or technology experience, including at least 5 years within the past decade supporting large-scale federal technical contracts. At least 7 years of cybersecurity experience, with 5 years focused on threat analysis in SOC or CSIRC environments supporting government systems. Required Certification: Certified Information Systems Security Professional (CISSP). Preferred Certifications: GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+). Required: Information Technology Infrastructure Library (ITIL) 4 Foundation certification. Strong understanding of cybersecurity frameworks and principles (NIST 800-53, FISMA, RMF, ISO 27001). Proven experience with enterprise risk management, incident response, and vulnerability remediation. Excellent analytical and problem-solving skills, with strong attention to detail. Effective communication and interpersonal skills to collaborate across technical, executive, and federal teams. Ability to lead multiple projects simultaneously and deliver results under tight deadlines. Physical and Mental Qualifications Be able to maintain awareness during scheduled working hours. Prolonged periods sitting or standing at desk and working on a computer (mouse and keyboard). Able to lift up to 15 pounds. Excellent verbal and written communication; good command of the English language. Execute tasks independently and work as a team. Learns and memories routine tasks. Strong organizational, grammar, business correspondence, and self-management skills. Candidates must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodation will be provided for employees with disabilities. DVS retains the right to change or assign other duties to this position. Equal Opportunity DirectViz Solutions, LLC (DVS) is an equal opportunity employer and prohibits discrimination and harassment against any employee or applicant for employment because of race, color, sex (including pregnancy), age, gender identity, creed, religion, national origin, sexual orientation, marital status, genetic information, disability, political affiliation, protected veteran status, or any other status protected by federal, state or local law. DVS has a zero-tolerance policy for harassment, threats, coercion, discrimination, and intimidation. Employees may file a complaint or exercise any right protected by Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, as amended, Section 4212 of the Vietnam Era Veterans Readjustment Assistance Act of 1974, or the Veterans Employment Opportunities Act of 1998. #J-18808-Ljbffr
    $87k-115k yearly est. 1d ago
  • Lead Cyber Threat Analyst

    Emergencymd

    Cyber security analyst job in Washington, DC

    Evolver Federal is seeking a Lead Cyber Threat Analyst to fulfil a requirement for a potential government client. The Lead Cyber Threat Analyst is responsible for identifying, analyzing, and mitigating advanced cyber threats targeting federal systems and critical infrastructure. This role focuses on proactive threat hunting, intelligence analysis, and developing strategies to detect and disrupt adversary tactics, techniques, and procedures (TTPs). The Lead Cyber Threat Analyst will lead a team of analysts, collaborate with SOC and incident response teams, and provide actionable intelligence to strengthen the organization's cybersecurity posture. This position requires deep expertise in threat analysis, malware research, and adversary emulation within highly regulated environments. Responsibilities Lead cyber threat analysis and intelligence operations to identify emerging threats and vulnerabilities. Conduct proactive threat hunting across enterprise and cloud environments using advanced analytics. Analyze adversary TTPs and develop detection strategies aligned with MITRE ATT&CK framework. Oversee malware analysis, reverse engineering, and forensic investigations for complex incidents. Integrate threat intelligence feeds into SOC workflows and detection platforms. Leverage AI-driven threat detection techniques to enhance predictive and adaptive security capabilities. Apply Zero Trust principles across detection, response, and access control strategies to strengthen enterprise resilience. Implement cloud-native security solutions to safeguard workloads and data in multi-cloud environments. Prepare and deliver executive-level threat reports, risk assessments, and strategic recommendations. Collaborate with SOC, incident response, and engineering teams to enhance detection and response capabilities. Maintain and update threat intelligence platforms and knowledge bases. Support development of playbooks for threat hunting and incident response automation. Ensure compliance with federal cybersecurity frameworks (NIST 800-series, RMF, TIC 3.0). Mentor and coach junior analysts to develop technical expertise and career growth. Manage cross-functional SOC projects, ensuring alignment between threat analysis, incident response, and engineering teams. Drive process improvements and best practices across SOC operations to enhance efficiency and resilience. Basic Qualifications Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience and 4 years' experience in IT Solutions at senior management Certified Information Systems Security Professional (CISSP) Certified Security Analyst, Certified Ethical Hacker, or similar certifications Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended) Information Technology Infrastructure Library (ITIL) 4 Foundation 10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical BPAs/contracts US Citizen with the ability to pass a comprehensive government background check Preferred Qualifications Experience managing or supporting cybersecurity operations, including SOC functions, in a federal or highly regulated environment Experience leading cybersecurity programs within federal civilian agencies Master's degree in a technical or management-related field GIAC (GCTI, GCFA) or AWS/Azure security certifications Knowledge of RMF, NIST 800-series, OMB A-130, and TIC 3.0 policies Experience with performance-based contracts and cross-functional team leadership Strong communication skills, including experience delivering executive briefings and incident communications Expertise in threat intelligence platforms (TIPs) and SIEM tools (Splunk, Elastic). Familiarity with SOAR platforms and automation for threat detection and response. Experience with malware reverse engineering and memory forensics. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and threat modeling methodologies. Hands-on experience with cloud threat analysis (AWS, Azure, GCP) and container security. Ability to lead advanced threat hunting campaigns and mentor junior analysts. Understanding of nation-state threat actors and advanced persistent threats (APTs). Experience integrating threat intelligence into vulnerability management and risk scoring. Knowledge of scripting languages (Python, PowerShell) for automation and custom detection. Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law. Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. #J-18808-Ljbffr
    $82k-111k yearly est. 1d ago
  • Cloud Security Engineer

    Meta 4.8company rating

    Cyber security analyst job in Washington, DC

    We are seeking a Security Engineer who specializes in designing and implementing new systems and tools to enhance the security of Meta's products and infrastructure. This role is ideal for individuals with deep security domain expertise who are passionate about building solutions and using AI to address evolving security requirements and use cases. Cloud Security Engineer Responsibilities Design, prototype, and implement AI-driven security systems and tools to protect Meta's products and internal infrastructure Develop and maintain security-focused code, libraries, and frameworks for use by Security Engineers, Analysts, and engineering teams Collaborate with cross-functional partners to deliver scalable, security solutions aligned with company objectives Rapidly experiment with and iterate on specialized security technologies, leveraging AI to address emerging threats and requirements Apply deep security expertise to solve complex challenges, mitigate risks, and mentor other engineers in advanced security domains Minimum Qualifications B.S. or M.S. in Computer Science or related field, or equivalent experience 5+ years of experience in designing and implementing security systems, tools, or frameworks Extensive knowledge of attacker tactics, techniques, and procedures Proficiency in coding with experience in languages such as Python, C/C++, Go, or equivalent Experience collaborating with technical and non-technical stakeholders Ability to rapidly prototype and iterate on security solutions Preferred Qualifications Experience on securing cloud deployments, IAC (Infrastructure as Code) deployments for cloud (terraform) Experience addressing security problems by building scalable engineering solutions Experience influencing software engineers building security products Experience creating metrics to measure service and program effectiveness and consistency Experience making contributions to the security or privacy community (public research, OSS, blogging, presentations, etc.) Public Compensation $147,000/year to $208,000/year + bonus + equity + benefits Industry Internet Equal Opportunity Meta is proud to be an Equal Employment Opportunity and Affia... (full statement) Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com. #J-18808-Ljbffr
    $147k-208k yearly 1d ago
  • Lead Security Engineer - Federal Cyber Operations

    Teksynap

    Cyber security analyst job in Washington, DC

    A high-tech company is seeking a Lead Security Engineer to oversee cybersecurity operations within the DC area. The ideal candidate will lead efforts to ensure compliance with federal security standards while managing vulnerabilities and incidents. Qualifications include a Bachelor's in Cybersecurity, 8-10 years of relevant experience, and necessary security clearances. The position offers a competitive benefits package, including health and retirement plans, within an office setting with occasional travel expectations. #J-18808-Ljbffr
    $73k-99k yearly est. 4d ago
  • Cyber Incident Analyst

    Lafayette Group Inc. 4.1company rating

    Cyber security analyst job in Arlington, VA

    Lafayette Group is seeking experienced professionals to provide advanced consulting support for federal cybersecurity programs. The Cyber Incident Analyst provides deep technical analysis during active cyber incidents, including insights into vulnerabilities, adversarial tactics, and mitigation strategies across diverse environments like IT, OT/ICS, cloud, and AI systems. This role requires demonstrated expertise in incident monitoring and response coordination, combined with strong consulting skills. This position engages with partners across government, industry, and critical infrastructure to provide guidance and analysis on active cyber threats. This position requires the ability to coordinate among diverse stakeholder groups, evaluate cyber intelligence for impact, conduct in-depth technical research, and translate technical data into guidance that informs decision-making. The ideal candidate for this role is an experienced, collaborative team member with deep expertise in cybersecurity operations with an innate curiosity to learn, and the drive to excel with a team of like-minded colleagues in a dynamic environment. This position will: Job Responsibilities Perform analysis on active cyber incidents, events and vulnerabilities to provide guidance and targeted recommendations for mitigation. Support the development of written guidance and recommendations to assist client's partners with solutions for active and ongoing cyber vulnerabilities. Remain current with emerging technologies and trends in cybersecurity and apply this knowledge to improve threat detection and mitigation efforts. Through hands-on analysis provide insights into vulnerabilities, adversarial tactics, and mitigation strategies across diverse environments like IT, OT/ICS, cloud, and AI systems. Assist with mapping technical insights on cyber threats to frameworks like MITRE ATT&CK and other cyber frameworks. Support the translation of strategic products into clear, practical formats that are tailored to the specific needs and operational constraints of different stakeholder groups, including large and small jurisdictions and critical infrastructure (CI) partners. Assist in the tailoring of vulnerability mitigation recommendations and contextualized examples to stakeholders to address implementation challenges and encourage rapid adoption. Required Skills Bachelor's or Master's degree in cybersecurity, information technology, political science, or a related field. 6+ years of professional experience in cyber analysis, threat intelligence, cyber security, incident response, or similar role. Demonstrated expertise in cyber incident response coordination, incident monitoring, and operational reporting. Strong understanding of current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source. Strong understanding of computer and network fundamentals; working understanding of computer architecture, operating systems, vulnerabilities, encryption, etc. Experience defining data sources and writing detection rules for discovering malicious behavior. Possession of excellent analytical and critical thinking skills with the ability to remain open-minded, flexible and curious in problem-solving approach. Possession of excellent oral and written communication skills. Ability to manage time effectively to meet deadlines, adhere to project plans, and work on several projects simultaneously; strong organizational skills and attention to detail. Proficient with Microsoft Office Suite. Active TS security clearance and SCI eligibility; US citizenship with the ability to obtain and maintain DHS Suitability (EOD). Desired Skills Familiarity with the .gov Cyber Mission space and legal constraints applicable to civilian Government Agencies (e.g., FISMA). Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports. Familiarity with at least one scripting language such as Python, and capable of manipulating data, interfacing with APIs, automating repetitive tasks, etc. Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (e.g., Executives, SOC). Field-related certifications such as (CTIA, CEH, GREM, GCIH, GCFA). Experience with tools in both Linux and Windows environments. Experience applying AI/ML to identify anomalous behavior in security data, esp. using Elasticsearch. Familiarity with MITRE ATT&CK and/or similar frameworks. Location: Arlington, VA; on-site 3-5 per week Salary Range: $80,000-$130,000 LGI carefully considers various factors when determining salary, including but not limited to education and training, professional experience, knowledge, skills and competencies, licensure and certifications, contract-specific affordability, and organizational requirements. New employees are not usually hired at the top of the estimated salary range and salary decisions depend on the circumstances and factors for each case. Salary is only one aspect of LGI's generous total compensation package. Federal Contracts: This position involves working on federal contracts that require all workers on the contract to be U.S. Citizens. Additionally, some contracts may require the ability to obtain a security clearance. Contingent Hire: This position will be hired contingent upon winning the Federal contract work. LGI is committed to the full inclusion of all qualified individuals. As part of this commitment, we will ensure that persons with disabilities are provided reasonable accommodations for the hiring process. If reasonable accommodation is needed, please contact . This email address is for accommodation requests only. Non-related messages will be disregarded.
    $80k-130k yearly 4d ago
  • Junior Information System Security Officer

    Mantech 4.5company rating

    Cyber security analyst job in Washington, DC

    MANTECH seeks a motivated, career and customer-oriented Junior Information System Security Officer (ISSO) to join our team in Washington, D.C. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS. Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Provide liaison support between the system owner and other IS security personnel. Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM). Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Minimum Qualifications: At least 3 years' experience performing duties of an Information Systems Security Officer (ISSO) at a cleared facility At least 5 years of work experience in a computer science or cybersecurity related field Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or Information Assurance Management (IAM) Level II proficiency Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
    $60k-81k yearly est. 1d ago
  • Information Security Engineer

    Isaca 4.5company rating

    Cyber security analyst job in Washington, DC

    The Information Technology Department of Arnold & Porter has an opening for an Information Security Engineer in the Washington, DC office or may work 100% virtual/remote in a firm-approved U.S. state as part of the “Gideon” office. The Information Security Engineer is a technical security expert responsible for supporting security operations, engineering, and architecture functions and efforts for Arnold & Porter. Under the direction of the Manager of Information Security, the Information Security Engineer helps to ensure the overall security posture of the firm, and is expected to be involved in day-to-day security operations and contribute to ensuring the integrity and availability of the firm's IT and application infrastructure and the confidentiality, integrity, and availability of the firm's data in support of enterprise IT objectives and client service delivery needs. Qualifications: Responsibilities Security Operations Performing security log and event analysis taking appropriate action as directed or required to address security risk issues or events / incidents using EDR, SIEM and log aggregation systems. Monitoring and proactively executing the vulnerability management program to prevent or reduce IT hygiene risk issues from impacting production systems. Maintaining and managing security toolsets as assigned, that help to mitigate or respond to security events and incidents including, but not limited to: Application control systems EDR/AV Email Security platform Attack simulation platform Threat intelligence/hunting Security related artificial intelligence tools Supporting security incident response and investigation efforts as directed. Helping validate and track IT operational activities to ensure compliance with policy, standards, and other applicable requirements, or as directed by organizational needs. Researching and identifying security vulnerabilities and relevant industry / cybersecurity trends for follow-up and action. Regularly reporting and tracking IT security events and metrics along with remediation activities. Helping support third-party risk management efforts as assigned. Helping support the firm security awareness training program as assigned. Helping support the firm's IT Compliance efforts as assigned. Participating in IT Security on-call rotation. Security Engineering & Architecture Advising and assisting with planning of security systems and standards by evaluating network and security technologies, developing security requirements for the enterprise infrastructure, and maintaining overall user access and data protection control in support of enterprise objectives and client service delivery. Reviewing newly requested applications and SaaS and application changes for security impacts and possible remediation to address security risk. Actively participating in the enterprise Change Advisory Board (CAB). Conducting research and providing recommendations on methods, software, and technologies to mitigate risk exposures. Helping to develop and contribute to security policies, standards and procedures to maintain an appropriate security posture and/or compliance with applicable requirements. Technical Skills & Experience Education/Experience Four year college degree preferred; equivalent experience will be considered. Minimum of three (3) years of experience in Information Security, or equivalent experience in IT-related fields with secondary security responsibilities. Technical Skills Experience and understanding of Windows, Unix/Linux, and Active Directory. Solid understanding of core networking protocols, including TCP/IP, UDP, DNS, DHCP, HTTP/HTTPS, routing protocols. Experience and technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, application security, and cloud security. Proficient in Windows operating systems, Microsoft Office Suite, and related software. Skilled in leveraging artificial intelligence tools for daily work. Strong remote collaboration capabilities. Communication & Writing Communicate complex technical information clearly to non-technical audiences. Excellent oral and written communication, including reports, business correspondence, and procedure manuals. Effective presenter to diverse groups, including managers, clients, and the public. Ability to identify and apply the appropriate method of communication. Professionalism & Judgment Strong personal initiative, judgment, and professionalism. High level of confidentiality and discretion. Exceptional client service for both internal and external stakeholders. Problem-Solving & Strategic Focus Strong problem-solving skills and strategic thinking. Ability to define goals, prioritize tasks, and follow through to achieve results. Detail-oriented with excellent organizational and time management skills. Capable of handling multiple tasks in fast-paced environments. Flexibility & Commitment Reliable, dependable, and motivated. Flexible to work additional hours as needed. Willingness to travel (1-4 weeks per year, or more if required). The anticipated base salary for this position is $122,000 to $160,000. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location in which the applicant lives and/or from which they will be performing the job. For benefits information, please note the firm's benefits details are available upon request. The firm may provide a discretionary bonus annually. Arnold & Porter is an equal opportunity employer that does not discriminate on the basis of race, color, creed, religion, national origin, sex, pregnancy and childbirth (including breastfeeding and related medical conditions), age, marital or partnership status, familial status, sexual orientation, gender, gender identity, gender expression, transgender, physical or mental disability, medical condition, family leave status, citizenship status, immigration status, ancestry, genetic information, military or veteran status, or any other characteristic protected by local, state or federal laws, rules or regulations. Our Firm\'s equal opportunity policy applies to all employment practices and terms and conditions, including, without limitation, recruitment, employment, assignment, training, compensation, benefits, promotions, disciplinary action and terminations. For purposes of the firm\'s Anti-discrimination and Anti-harassment Policies, the term "race" includes, without limitation, traits historically associated with race, including, but not limited to, hair texture and protective hairstyles, such as braids, locks, and twists. Arnold & Porter Kaye Scholer LLP endeavours to make information accessible to any and all users. If you would like to contact us regarding accessibility of our website or need assistance completing the application process, please contact Director of Support Staff at ***************. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. For our EEO Policy Statement, please contact us for details. If you would like more information about your EEO rights as an applicant under the law, please inquire about Know Your Rights. Arnold & Porter Kaye Scholer LLP uses E-Verify, which is a web-based system, to confirm the eligibility of our employees to work in the United States. As an E-Verify employer, we verify the identity and employment eligibility of newly hired employees by electronically matching information provided by employees on the Form I-9, Employment Eligibility Verification, against records available to the Social Security Administration (SSA) and the Department of Homeland Security (DHS). We use E-Verify because we are a federal contractor containing the Federal Acquisition Regulation (FAR) E-Verify clause. Please see the posters for details regarding E-Verify or contact Arnold & Porter Kaye Scholer LLP's Human Resources Department for more information. E-Verify Participation Poster and Right-to-work Poster. #J-18808-Ljbffr
    $122k-160k yearly 3d ago
  • Information Assurance Engineer / Security Manager

    C2 Labs, Inc.

    Cyber security analyst job in Washington, DC

    Information Assurance Engineer / Security ManagerC2 Labs, Inc. - ************** C2 Labs partners with clients on their IT transformation journey via our industry-leading capabilities in full stack development, hyper-automation/DevOps, and cybersecurity compliance. We provide specialized products and services that enable clients to innovate with speed and scale while maintaining a robust and effective security posture. As digital transformation partners, we address the most urgent needs holding back our clients, including proactively addressing cultural change, quantifying risk, automating compliance, and closing critical skill gaps We are seeking a highly skilled and experienced Information Security Engineering Manager to spearhead the development, implementation, and management of our organization's security infrastructure. This pivotal role will be responsible for safeguarding our critical assets and ensuring compliance with industry-leading security standards. You will lead a team of security professionals, providing technical guidance and fostering a culture of security awareness. Responsibilities Design, develop, and implement robust security networking architectures, incorporating Intrusion Detection/Prevention Systems (IDS/IPS) and other advanced security technologies. Develop and enforce comprehensive security policies and procedures aligned with industry best practices and regulatory requirements. Lead the monitoring and analysis of security systems, proactively identifying and responding to potential threats and vulnerabilities. Manage and optimize existing security solutions, ensuring their effectiveness and efficiency. Drive compliance initiatives, with a focus on the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls. Effectively manage security projects, ensuring timely completion and adherence to budget. Lead incident response efforts, coordinating investigations and implementing remediation strategies. Mentor and develop a high-performing team of security professionals. Qualifications Bachelor's degree in an IT-related field required. Minimum 15 years of experience in information security, or Certified Information Systems Security Professional (CISSP) certification with a minimum of 10 years of experience. Demonstrated deep understanding of information security principles, including access control, network security, cryptography, and vulnerability management. Proven experience in managing security projects and leading incident response activities. Extensive experience with the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls. Excellent communication, leadership, and problem-solving skills. EOE STATEMENT We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen. #J-18808-Ljbffr
    $72k-96k yearly est. 2d ago
  • Information Security Engineer

    Arnold & Porter LLP 4.9company rating

    Cyber security analyst job in Washington, DC

    The Information Technology Department of Arnold & Porter has an opening for an Information Security Engineer in the Washington, DC office or may work 100% virtual/remote in a firm-approved U.S. state as part of the “Gideon” office. The Information Security Engineer is a technical security expert responsible for supporting security operations, engineering, and architecture functions and efforts for Arnold & Porter. Under the direction of the Manager of Information Security, the Information Security Engineer helps to ensure the overall security posture of the firm, and is expected to be involved in day-to-day security operations and contribute to ensuring the integrity and availability of the firm's IT and application infrastructure and the confidentiality, integrity, and availability of the firm's data in support of enterprise IT objectives and client service delivery needs. Responsibilities Security Operations Performing security log and event analysis using EDR, SIEM and log aggregation systems. Monitoring and proactively executing the vulnerability management program to prevent or reduce IT hygiene risk issues from impacting production systems. Maintaining and managing security toolsets such as Application control systems, EDR/AV, Email Security platform, Attack simulation platform, Threat intelligence/hunting, and Security related artificial intelligence tools. Supporting security incident response and investigation efforts as directed. Helping validate and track IT operational activities to ensure compliance with policy, standards, and other applicable requirements. Researching and identifying security vulnerabilities and relevant industry/cybersecurity trends for follow-up and action. Regularly reporting and tracking IT security events and metrics along with remediation activities. Helping support third‑party risk management efforts as assigned. Helping support the firm security awareness training program as assigned. Helping support the firm's IT Compliance efforts as assigned. Participating in IT Security on‑call rotation. Security Engineering & Architecture Advising and assisting with planning of security systems and standards by evaluating network and security technologies, developing security requirements for the enterprise infrastructure, and maintaining overall user access and data protection control. Reviewing newly requested applications and SaaS and application changes for security impacts and possible remediation to address security risk. Actively participating in the enterprise Change Advisory Board (CAB). Conducting research and providing recommendations on methods, software, and technologies to mitigate risk exposures. Helping to develop and contribute to security policies, standards and procedures. Qualifications Education/Experience Four‑year college degree preferred; equivalent experience will be considered. Minimum of three (3) years of experience in Information Security, or equivalent experience in IT-related fields with secondary security responsibilities. Technical Skills Experience and understanding of Windows, Unix/Linux, and Active Directory. Solid understanding of core networking protocols, including TCP/IP, UDP, DNS, DHCP, HTTP/HTTPS, and routing protocols. Experience and technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, application security, and cloud security. Proficient in Windows operating systems, Microsoft Office Suite, and related software. Skilled in leveraging artificial intelligence tools for daily work. Strong remote collaboration capabilities. Communication & Writing Communicate complex technical information clearly to non-technical audiences. Excellent oral and written communication, including reports, business correspondence, and procedure manuals. Effective presenter to diverse groups, including managers, clients, and the public. Ability to identify and apply the appropriate method of communication. Professionalism & Judgment Strong personal initiative, judgment, and professionalism. High level of confidentiality and discretion. Exceptional client service for both internal and external stakeholders. Problem‑Solving & Strategic Focus Strong problem‑solving skills and strategic thinking. Ability to define goals, prioritize tasks, and follow through to achieve results. Detail‑oriented with excellent organizational and time‑management skills. Capable of handling multiple tasks in fast‑paced environments. Flexibility & Commitment Reliable, dependable, and motivated. Flexible to work additional hours as needed. Willingness to travel (1-4 weeks per year, or more if required). The anticipated base salary for this position is $122,000 to $160,000. The actual base salary offered will depend on a variety of factors, including, without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location in which the applicant lives and/or from which they will be performing the job. The firm may provide a discretionary bonus annually. Arnold & Porter is an equal opportunity employer that does not discriminate on the basis of race, color, creed, religion, national origin, sex, pregnancy and childbirth (including breastfeeding and related medical conditions), age, marital or partnership status, familial status, sexual orientation, gender, gender identity, gender expression, transgender, physical or mental disability, medical condition, family leave status, citizenship status, immigration status, ancestry, genetic information, military or veteran status, or any other characteristic protected by local, state or federal laws, rules or regulations. Our Firm's equal opportunity policy applies to all employment practices and terms and conditions, including, without limitation, recruitment, employment, assignment, training, compensation, benefits, promotions, disciplinary action and terminations. For purposes of the firm's Anti-discrimination and Anti-harassment Policies, the term "race" includes, without limitation, traits historically associated with race, including, but not limited to, hair texture and protective hairstyles, such as braids, locks, and twists. #J-18808-Ljbffr
    $122k-160k yearly 19h ago
  • Firewall Security Engineer

    Novacoast 3.9company rating

    Cyber security analyst job in Washington, DC

    Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check. Qualifications To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments. Responsibilities In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls. Requirements 5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs US Citizenship is required due to the position being with a Federal Client If this role is aligned with your next career move, submit your resume today for immediate consideration! Job Type: Contract Pay: $60.00 - $68.00 per hour #J-18808-Ljbffr
    $60-68 hourly 19h ago
  • Information Security Engineer (ISSE) | RMF, Cloud, Govt

    Method, Inc. 4.6company rating

    Cyber security analyst job in Washington, DC

    A leading cybersecurity firm is seeking an Information Systems Security Engineer (ISSE) to support secure, mission-focused information systems in a high-impact government environment. The ISSE will work on cybersecurity controls design, implementation, and maintenance, ensuring systems meet federal requirements. The ideal candidate will have 3-5 years in cybersecurity, TS Clearance, and practical experience with NIST RMF as well as familiarity with various security tools. This role offers the opportunity to contribute significantly to the security of government missions. #J-18808-Ljbffr
    $80k-108k yearly est. 19h ago
  • Senior Cloud & Security Software Engineer

    Tla LLC

    Cyber security analyst job in Washington, DC

    A technology firm is seeking a Software Engineer to design, develop, and integrate secure computing environments supporting critical mission objectives. The role requires experience in full-stack development, AWS services, and Infrastructure-as-Code tools. Ideal candidates will collaborate with cross-functional teams and possess strong scripting skills. Preferred certifications include AWS Certified Solutions Architect. This position is based in Washington, D.C. #J-18808-Ljbffr
    $98k-136k yearly est. 1d ago
  • Information System Security Officer

    Conviso Inc.

    Cyber security analyst job in Germantown, MD

    Conviso Inc is looking for ISSO Officer for onsite Job. This role comes with benefits, 401K & some accrued PTO. The Ideal must have hands-on technical and analytical experience supporting the RMF lifecycle, cybersecurity monitoring, continuous authorization, and security control assessments. Are you open to new opportunities & could this be of interest? On Site Job at 3 locations - Albuquerque NM, Las Vegas NV, Germantown MD Active Top-Secret Clearance Required Title: Information System Security Officer (ISSO) Minimum 3 years as an ISSO Required Skills: ISSO personnel must understand and interpret data from security tools and apply NIST frameworks with precision. Capabilities include: Proficiency in NIST SP 800-37, 800-53, 800-60, FIPS 199, CNSSI 1253. Ability to perform risk assessments, system categorization, and control selection. Experience with eGRC tools (e.g., Archer) for documentation, continuous monitoring, and POA&M management. Responsibilities: Prepare: Support enterprise, mission, and system-level RMF readiness, establish tailored baselines, identify assets, assess risks, and determine system placement in the enterprise architecture. Categorize Information Systems: Perform FIPS 199 categorization, develop SSP subsections, register systems, and ensure early engagement with developers to integrate cybersecurity impact analysis. Select Security Controls: Document, implement, and validate selected controls, incorporating security architecture, privacy requirements, and common control inheritance. Assessment: Develop assessment plans, test controls, produce SARs, document findings, and support POA&M development. Data Calls: Provide timely and accurate evidence and responses using approved tools. Internal & External Assessments: Support audits, collaborate with internal and external partners, and perform self-assessments. Program-Level Documentation Support: Maintain program policies, adjudicate comments, and assess the impact of federal directives and legislation.
    $65k-88k yearly est. 4d ago
  • Principal Cloud Security Engineer

    Zealotech People

    Cyber security analyst job in Washington, DC

    Clearance: Active Secret Employment Type: Full-Time We are seeking a Principal Cloud Security Engineer to lead the design, automation, and enforcement of security across large-scale federal cloud environments. This role focuses on cloud security architecture, DevSecOps automation, and secure platform enablement in a multi-cloud ecosystem. The ideal candidate is highly technical, self-directed, and comfortable operating as the senior security authority for cloud platforms. You will define secure patterns, implement guardrails at scale, and embed security directly into infrastructure and CI/CD pipelines. Key Responsibilities: Cloud Security Architecture: Design and guide secure architectures across AWS, Azure, and GCP, including GovCloud and restricted environments Define and enforce security baselines aligned with NIST 800-53, FedRAMP, and CIS Benchmarks Lead threat modeling, architecture reviews, and secure design guidance for cloud workloads DevSecOps & Automation: Build and maintain Infrastructure as Code using Terraform (preferred) and cloud-native tooling Integrate automated security controls into CI/CD pipelines (SAST, DAST, IaC scanning, container scanning) Implement policy-as-code guardrails using tools such as AWS SCPs, Azure Policy, and cloud-native governance services Develop automated remediation and enforcement workflows to reduce manual security effort Governance, Compliance & Visibility: Embed compliance controls directly into cloud infrastructure and pipelines to support ATO efforts Partner with compliance teams and auditors on evidence collection and continuous monitoring Implement centralized logging, monitoring, and incident response across cloud environments Technical Leadership: Serve as the senior cloud security SME for engineers, architects, and stakeholders Mentor engineers on secure cloud development and DevSecOps practices Translate complex security concepts to both technical and non-technical audiences Required Qualifications: Active Secret clearance 8+ years in cybersecurity or cloud engineering, including 5+ years focused on cloud security Deep hands-on experience securing AWS, Azure, or GCP (experience in at least two preferred) Strong Infrastructure as Code experience (Terraform strongly preferred) Experience integrating security into CI/CD pipelines (GitHub Actions, GitLab, or similar) Proficiency in Python, Go, PowerShell, or Bash Strong understanding of IAM, networking, encryption, key management, and cloud-native security services Ability to operate independently and define security priorities without daily direction Preferred Qualifications: Experience securing GovCloud, DoD IL5/IL6, or other regulated cloud environments Kubernetes and container security experience Zero Trust architecture implementation experience ServiceNow integrations for security workflows Cloud security certifications (AWS Security Specialty, Azure Security Engineer, etc.) What Makes This a True Principal Role: Highly hands-on and deeply technical Owns security outcomes rather than executing predefined tasks Heavy DevSecOps and IaC focus Large-scale, multi-cloud environment Architecture and influence matter as much as implementation
    $84k-117k yearly est. 1d ago
  • Deputy Information Systems Security Officer (Deputy ISSO) - Secret clearance

    RCG, Inc. 4.3company rating

    Cyber security analyst job in Suitland, MD

    ** DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECRET CLEARANCE AND A CISSP** Location: Suitland, MD - Full-Time, On-Site Salary Range: $130,000 - $140,000 annually . Who We Are RCG is a fast-growing federal contracting firm proudly Certified as a Great Place to Work. We are committed to fostering a culture of innovation, inclusion, and excellence. At RCG, we deliver technology and mission support services that help government agencies succeed. We are currently seeking a Deputy Information Assurance Engineer / Deputy Information Systems Security Officer (Deputy ISSO) to support our federal government customer in Suitland, MD. This position is fully on-site and supports mission-critical systems within the JPSS/LCCS program. Please note: Due to the secure nature of this government agency, all candidates must be U.S. Citizens and able to successfully pass the required background investigation. The Opportunity This role is ideal for a senior Information Assurance professional who will serve as a Deputy ISSO and team lead, supporting authorization, compliance, and continuous monitoring activities for NOAA JPSS/LCCS systems. The Deputy ISSO will provide leadership to junior ISSOs, maintain system ATOs, and collaborate closely with multiple technical and operational teams to ensure a strong and compliant security posture. The successful candidate will play a key leadership role across A&A, POA&M management, Continuous Monitoring, change control, and incident response activities. What You'll Do Deputy ISSO / Team Lead Responsibilities Serve as Deputy ISSO Team Lead, advising, mentoring, and training junior ISSOs on security and compliance activities. Provide guidance on RMF, FISMA, and program-level security processes. JPSS/LCCS A-ISSO Responsibilities Maintain and support ATO packages for NOAA 5042 and NOAA 5065-1 systems. Lead Assessment & Authorization (A&A) documentation reviews, updates, and Security Control Assessment (SCA) activities. Work closely with OMS, LGSS, FVTS, MSC, and GP Security teams to maintain and improve overall program security posture. Lead weekly cross-contract POA&M and security operations management meetings. Participate in and vote during Mission Change Control Boards (CCBs) for system modifications. Lead JPSS/LCCS Continuous Monitoring working group meetings. Serve as Chair of the program SSID documentation review board. Assist in incident response activities, working directly with operational and cybersecurity teams. Maintain strong working relationships with Federal clients, including System Owners, ISSOs, Flight, and Operations personnel. Required Qualifications Active Secret clearance (REQUIRED). Bachelor's degree in a relevant technical field. Minimum 8 years of experience in Information Assurance, Information Security, or ISSO-related roles. Demonstrated experience supporting RMF, FISMA, ATO, and Continuous Monitoring activities. Proven leadership experience mentoring or leading junior security staff. Strong ability to collaborate across multiple technical, operational, and security teams. Excellent written and verbal communication skills. Certifications (Required) CISSP Physical Demands The physical demands described here are representative of those required to successfully perform the essential functions of this role. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions. EEO Statement RCG, Inc. does not discriminate against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibits discrimination against all individuals based on race, color, religion, sex, sexual orientation/gender identity, or national origin.
    $130k-140k yearly 2d ago
  • Lead Cyber Fusion Analyst

    Leidos 4.7company rating

    Cyber security analyst job in Bethesda, MD

    This position will support GSM-O II Task Number 07 (TN07), which provides support to the DoD Cyber Defense Command (DCDC). DCDC provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support DCDC Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Lead the DCDC Fusion Analyst team including employee engagement, training, performance reviews, and all other Leidos employee needs. Includes mentoring, assigning and reviewing work and planning/scheduling to ensure milestones are completed in accordance with the program work statement. Identify problems, determine accuracy and relevance of a broad range of technical information. Use sound judgment to generate, evaluate, and execute alternative courses of action. Produce timely, effective, decision-quality technical recommendations to support senior leadership. Serve as a lead for planning, coordination, implementation, validation, mitigation, and compliance of cyber operations/intel security tasks. Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity. Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment. Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends. Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements. Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure. Required Qualifications Active DoD TS/SCI Clearance and eligible for polygraph. DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.). Bachelor's degree in related discipline and 12+ years of related experience. Additional experience may be accepted in lieu of degree. Strong communications and interpersonal skills. Proficient in Microsoft Office applications (Word, Excel, Outlook, PowerPoint). Proficient in Windows 7/8/10/11. Ability to work in a virtual environment like Microsoft Teams. Experience working with members of the Intelligence Community (IC) and knowledge and understanding of Intelligence processes. In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies. Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threatindicators, malware analysis results, Wireshark, Arcsight, etc.). Experience with IC repositories (Pulse, TESTFLIGHT, etc.) Experience with various open-source and commercial vendor portals, services and platform that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise. Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs). Preferred Qualifications Experience with the DODIN and other DoD Networks. Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OSINT Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. Experience in intelligence driven defense and/or Cyber Kill Chain methodology. IAT Level III or IAM Level II+III Certifications Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. #J-18808-Ljbffr
    $71k-90k yearly est. 2d ago
  • Senior Security Engineer

    Emergencymd

    Cyber security analyst job in Washington, DC

    Evolver Federal is seeking a Senior Security Engineer to fulfill a requirement for a potential government client. The Senior Security Engineer is responsible for designing, implementing, and maintaining advanced security solutions to protect federal systems and data. This role prioritizes continuous monitoring, FISMA compliance, and OIG audit readiness while engineering secure architectures, integrating cybersecurity technologies, and ensuring adherence to federal standards such as NIST 800-series, RMF, and TIC 3.0. The Senior Security Engineer will work closely with SOC teams, architects, and program managers to deliver robust security capabilities across cloud (AWS GovCloud, Azure Government), on-premises, and hybrid environments. This position requires deep technical expertise, hands-on experience with security tools, and the ability to lead engineering efforts for mission‑critical systems in highly regulated environments. Responsibilities Design and implement security solutions for enterprise and federal environments, ensuring compliance with RMF and NIST guidelines. Engineer secure configurations for SIEM, SOAR, EDR, and vulnerability management platforms. Support Tier 2/3 SOC analysts by developing advanced correlation rules for Splunk and optimizing detection workflows. Support SOC operations by integrating advanced detection and response capabilities. Conduct security assessments, penetration testing, and risk analysis for critical systems. Implement continuous monitoring and automated compliance reporting to meet Department of Labor and federal requirements. Develop and maintain security engineering documentation, including system security plans and architecture diagrams. Collaborate with architects and program managers to align security engineering with strategic objectives. Lead efforts to integrate security into DevSecOps pipelines and CI/CD workflows. Provide technical expertise during incident response and forensic investigations. Evaluate emerging technologies and recommend enhancements to improve security posture. Define and track measurable outcomes such as MTTR reduction, SLA adherence, compliance score improvements, and false positive reduction to meet performance‑based contract KPIs. Coordinate with federal stakeholders (CISO, ISSOs, AO) and provide audit support for ATO processes. Ensure adherence to performance‑based contract requirements and federal cybersecurity mandates. Basic Qualifications Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience, or 4 years' experience in IT Solutions at senior management Certified Information Systems Security Professional (CISSP) mandatory with Information Systems Security Engineering Professional (ISSEP) concentration Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended) Information Technology Infrastructure Library (ITIL) 4 Foundation 10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical contract/BPAs US Citizen with the ability to pass a comprehensive government background check Preferred Qualifications Master's degree in cybersecurity, IT, or a related technical field Experience supporting SOC operations in federal or regulated environments Familiarity with RMF, NIST 800-series, OMB A-130, and TIC 3.0 Proven leadership in cross‑functional teams and performance‑based contracts Strong communication skills, including executive briefings and incident reporting Hands‑on experience with SIEM (Splunk, Elastic), SOAR (Cortex XSOAR), and EDR (CrowdStrike, Microsoft Defender). Expertise in cloud security engineering (AWS, Azure, GCP) and container security (Kubernetes, Docker). Familiarity with Zero Trust Architecture principles and implementation strategies. Familiarity Continuous Diagnostics and Mitigation (CDM). Experience with PKI, encryption standards, and secure network design. Knowledge of automation tools for security orchestration and compliance reporting. Ability to lead technical teams and mentor junior engineers in cybersecurity best practices. Experience integrating security controls into large-scale federal systems and mission‑critical applications. Understanding of advanced threat detection techniques and AI‑driven security solutions. Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law. Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. #J-18808-Ljbffr
    $98k-136k yearly est. 1d ago
  • Senior InfoSec Engineer & RMF/NIST Security Leader

    C2 Labs, Inc.

    Cyber security analyst job in Washington, DC

    A tech solutions provider based in Washington is seeking an experienced Information Assurance Engineer / Security Manager to lead the development and management of security infrastructure. The ideal candidate will have 15+ years in information security, overseeing security projects, and enhancing compliance. Strong leadership and communication skills are essential for mentoring a high-performing team. This role offers an opportunity to impact the security strategy and operations significantly. #J-18808-Ljbffr
    $98k-136k yearly est. 2d ago
  • Information Systems Security Officer (ISSO) - SECRET CLEARANCE (On Site)

    RCG, Inc. 4.3company rating

    Cyber security analyst job in Suitland, MD

    *** DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECRET CLEARANCE *** Information Systems Security Officer (ISSO) SECURITY REQUIREMENT: . Location: Suitland, MD - Full-Time, FULLY ON-SITE 5 days a week Salary Range: $120,000 - $125,000 annually Who We Are RCG is a fast-growing federal contracting firm proudly Certified as a Great Place to Work. We are committed to fostering a culture of innovation, inclusion, and excellence. At RCG, we deliver technology and mission support services that help government agencies succeed. We are currently seeking an Information Assurance Engineer / Information Systems Security Officer (ISSO) to support our federal government customer in Suitland, MD. (Updated) This role follows an ON-SITE schedule, requiring on-site 5 days a week. **Due to the secure nature of this government agency, all candidates must be U.S. Citizens and able to successfully pass the required background investigation.** The Opportunity This role is ideal for a seasoned Information Assurance professional with strong experience supporting FISMA systems in a cloud-based environment. The ISSO will serve as a subject matter expert (SME), advising system development teams on security best practices, regulatory requirements, and compliance standards while supporting Security Assessment & Authorization (SA&A) activities for new and existing systems. The successful candidate will help maintain an appropriate security posture, manage security-related change requests, and support system authorization efforts across evolving threat landscapes. What You'll Do Serve as an Information Assurance SME for systems development projects in a cloud-based environment. Review proposed systems, networks, and software for potential security risks and advise on secure product selection and implementation. Define system scope and required level of detail for security plans and documentation. Manage and analyze Change Requests (CRs), assessing security impact and required updates to system posture. Provide Security Assessment & Authorization (SA&A) support for new and existing systems. Identify, develop, and maintain required security artifacts for authorization packages. Prepare and review System Security Plans (SSPs), including FIPS 199, FIPS 200, and E-Authentication documentation. Coordinate and participate in Security Test & Evaluation (ST&E) activities and review ST&E reports. Perform vulnerability assessment reviews and generate reports for System Owners and key stakeholders. Validate system hardening, patching, and compliance with applicable security requirements and checklists. Report status, findings, and risk posture to the Program Manager and Deputy Program Manager. Required Qualifications Active Secret clearance (REQUIRED). U.S. Citizenship required. Bachelor's degree in a technical field (e.g., Engineering, Computer Science) or 10 years of experience in IT systems engineering or IT security architecture. 6+ years of hands-on experience in information assurance or information security. Demonstrated ISSO experience supporting FISMA systems. Strong expertise in cloud architecture, cloud engineering, and cloud compliance. Ability to work on-site 5 days a week. Excellent interpersonal skills with demonstrated ability to collaborate across teams and organizations. Strong verbal and written communication skills in English. Certifications (Required) CISSP or equivalent security certification Desired (Not Required) Qualifications Experience supporting cloud systems in AWS environments. AWS Cloud Practitioner or Essential certification. Certificate of Cloud Knowledge (CCAK) Plus. Certified Cloud Security Professional (CCSP). Physical Demands The physical demands described here are representative of those required to successfully perform the essential functions of this role. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions. EEO Statement RCG, Inc. does not discriminate against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibits discrimination against all individuals based on race, color, religion, sex, sexual orientation/gender identity, or national origin.
    $120k-125k yearly 2d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Greenbelt, MD?

The average cyber security analyst in Greenbelt, MD earns between $65,000 and $117,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Greenbelt, MD

$87,000

What are the biggest employers of Cyber Security Analysts in Greenbelt, MD?

The biggest employers of Cyber Security Analysts in Greenbelt, MD are:
  1. Agr International
  2. General Dynamics
  3. Peraton
  4. Leidos
Job type you want
Full Time
Part Time
Internship
Temporary