Cyber security analyst jobs in Maryland - 583 jobs
Lead Cyber Fusion Analyst
Leidos 4.7
Cyber security analyst job in Odenton, MD
This position will support GSM-O II Task Number 07 (TN07), which provides support to the DoD Cyber Defense Command (DCDC). DCDC provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support DCDC Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies.
Primary Responsibilities
Lead the DCDC Fusion Analyst team including employee engagement, training, performance reviews, and all other Leidos employee needs.
Includes mentoring, assigning and reviewing work and planning/scheduling to ensure milestones are completed in accordance with the program work statement.
Identify problems, determine accuracy and relevance of a broad range of technical information. Use sound judgment to generate, evaluate, and execute alternative courses of action. Produce timely, effective, decision-quality technical recommendations to support senior leadership.
Serve as a lead for planning, coordination, implementation, validation, mitigation, and compliance of cyber operations/intel security tasks.
Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity.
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy.
Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface.
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed.
Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment.
Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data.
Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting.
Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations.
Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities.
Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN.
Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends.
Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements.
Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure.
Required Qualifications
Active DoD TS/SCI Clearance and eligible for polygraph.
DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.).
Bachelor's degree in related discipline and 12+ years of related experience. Additional experience may be accepted in lieu of degree.
Strong communications and interpersonal skills.
Proficient in Microsoft Office applications (Word, Excel, Outlook, PowerPoint).
Proficient in Windows 7/8/10/11.
Ability to work in a virtual environment like Microsoft Teams.
Experience working with members of the Intelligence Community (IC) and knowledge and understanding of Intelligence processes.
In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies.
Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threatindicators, malware analysis results, Wireshark, Arcsight, etc.).
Experience with IC repositories (Pulse, TESTFLIGHT, etc.)
Experience with various open-source and commercial vendor portals, services and platform that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise.
Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs).
Preferred Qualifications
Experience with the DODIN and other DoD Networks.
Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.)
Experience with proprietary OSINT Sources (Mandiant, Recorded Future, Shodan, etc.)
Skilled in building extended cybersecurity analytics (Trends, Dashboards, etc.).
Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
Experience in intelligence driven defense and/or Cyber Kill Chain methodology.
IAT Level III or IAM Level II+III Certifications
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.
#J-18808-Ljbffr
$72k-90k yearly est. 2d ago
Looking for a job?
Let Zippia find it for you.
Senior Cloud Security Engineer: Incident Response & IAM
Aledade 4.1
Cyber security analyst job in Bethesda, MD
A healthcare technology firm located in Maryland is seeking a Senior Security Engineer I to enhance security capabilities within cloud-native environments. The candidate will design and implement security solutions, lead incident response efforts, and collaborate with various teams to strengthen security posture. Applicants should have a degree in Computer Science or related field, extensive experience in security engineering, and proficiency in scripting languages like Python and Bash. This role offers a supportive workplace that values diversity and innovation.
#J-18808-Ljbffr
NetImpact Strategies seeks a skilled Security Engineer to implement advanced IT security enhancements in Bethesda, MD. The role focuses on managing configurations, deploying diverse infrastructures, and ensuring compliance with federal standards. If you have a strong background in information security and a passion for innovative IT solutions, we invite you to apply and help us drive digital transformation for the Federal Government.
#J-18808-Ljbffr
$91k-121k yearly est. 3d ago
Information Security Analyst, Advanced (Info. Systems & Cyber Security,Associate)
The Mil Corporation 4.5
Cyber security analyst job in Lexington Park, MD
Clearance Required: Top Secret Education Required: BA/BS or HS/GED and Equivalent Work Experience US Citizenship: Required
The MIL Corporation is seeking an Information SecurityAnalyst, Advanced (Info. Systems & CyberSecurity, Associate). The successful candidate will serve at Patuxent River Naval Air Station, MD.
This position currently requires an on-site schedule with 5 days on-site and is eligible for Compressed Work Schedule (CWS). Schedule is subject to change based on company/contract requirements.
Responsibilities
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
May perform cyber forensic analysis in responses to cyber threats in hardware and software environments.
Work on high-visibility or mission critical aspects of a given program and perform all functional duties independently.
May oversee the efforts of less senior staff and/or be responsible for the efforts of all staff assigned to a specific job.
Travel
15% - 20% to other sites, as needed
Required Qualifications
Have at least 7 years of experience performing work related to the responsibilities identified above.
Must obtain qualifications aligned with one or more DoD Cyber Workforce Framework (DCWF) roles-111, 211, 212, 221, 461, 511, 531, 541, 612, or 622 -within 30 days of contract performance start. A list of acceptable certifications can be found on the Navy Credentialing Opportunities On-Line website (?CWFModel).
Must be qualified for system(s) "Privileged Access" prior to performance start by having one of the following certifications:
CCNA Security, CySA+, GICSP, GSEC, Security+ CE, or SSCP in addition to the OS/CE Certification/Qualification(s).
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of the Risk Management Framework (RMF) process.
Knowledge of incident categories, incident responses, and timelines for responses.
Knowledge of cyber threats and vulnerabilities.
Knowledge of incident response and handling methodologies.
Desired Qualifications
Knowledge of existing NAWCAD/NAVAIR Security Operations Center (SOC) implementation, processes and procedures.
Familiarity with usage of SIEM tools such as QRadar and Splunk.
Experience with network monitoring, patch management, SCAP and ACAS scanning.
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Skill in using security event correlation tools.
Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
Knowledge of host/network access control mechanisms (e.g., access control lists, capabilities lists).
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Education
Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education and/or advanced certification.
Clearance
All applicants for this position must possess a current Top-Secret clearance; please note that the clearance process considers financial background aspects.
Compensation
The MIL Corporation values your contributions and offers a range of benefits to support your overall well-being. We are pleased to offer a comprehensive range of benefits to our full-time employees which include health, life, disability, and retirement plans, as well as paid time off, opportunities for professional growth and tuition assistance. Additional benefits and incentives may also apply, which will be communicated during the hiring process.
For this position, the projected compensation range is $130,000 - $170,000per year. This estimate represents the typical salary range and is just one part of MIL's complete compensation package. Final salary for this position is determined based on factors such as individual qualifications, education, experience, and contractual limitations. Learn more on the MIL Careers page.
Why MIL?
The MIL Corporation (MIL) is a dynamic workforce of industry professionals who deliver world-class solutions in cyber, engineering, financial management, and information technology - and we are looking for candidates like you! MIL offers opportunities for professionals at all stages of their careers, from early-career candidates to experienced industry professionals. We are known for a collaborative, people-first culture where employees are supported, valued, and encouraged to grow. This commitment to our people and our work is reflected in the industry and workplace awards MIL has received over the years.
2021 - 2024, Top Workplaces USA award (Energage)
2017 - 2025 Top Workplaces Award, Greater Washington Area (The Washington Post)
2018 - 2025 Certified Great Workplace, Great Place to Work
2021 - 2025, Best Workplaces in Consulting & Professional Services
2021 Fortune Best Workplaces for Millennials
2018 Fortune, Great Place to Work: Best Place to Work for Diversity
2017, 2020 - 2025 Top Workplace Award, South Carolina (Greenville Business Magazine, Columbia Business Monthly, and Charleston Business Magazine)
2025 Corporate Partnership Award, Association of Fundraising Professionals, Maryland Chapter
2025 Moxie Award, GovCon Category
2024 Patriot Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense
2022 Freedom Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense
2018, Above & Beyond Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense
If your goal is to help the federal government deploy leading technologies, improve financial management, or defend the nation in cyberspace, MIL welcomes you. Become a part of something greater, where you, the people, make the difference.
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by state or federal law.
$130k-170k yearly 6d ago
Lead Security Engineer - Cyber Security
Relativity 4.7
Cyber security analyst job in Baltimore, MD
Posting Type
Remote
As a Lead CyberSecurity Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities.
Job Description and Requirements
Responsibilities:
Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources.
Assess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations.
Develop and deploy detection and prevention signatures with response actions as part of a layered defensive strategy leveraging multiple technologies and data types.
Build automation to search through collected telemetry to detect and isolate advanced threats that evade existing security solutions.
Create Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards.
Automate incident handling processes.
Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment.
Serve as a subject matter expert in the mechanism and analysis of observed malicious activity.
Clearly document and communicate investigation findings to both technical and executive stakeholders.
Identify and automate away technical burden.
Build automation to deploy, operate and connect multiple cybersecurity tools and applications.
Preferred Qualifications:
7+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team for Cloud applications and corporate networks
Exposure to threat detection development and tuning
Experience in software design and development
DevSecOps experience
Ability to perform threat hunting, threat emulation, and/or purple teaming exercises
Familiarity with industry standard security devices and their configuration
Experience in reverse engineering malicious code to explore infection and propagation mechanisms
Experience with threat intelligence tools and processes
Certifications: One or more of the following certifications are preferred (GCFA, GCIA, GCIH, GNFA, GREM, OSCP, OSEP, OSED, OSWE, OSDA, OSCE3, CompTIA Security+, CCNA CyberOps, or CEH)
5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team
Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis)
Ability to read, write and analyze PowerShell, C#, and Python
Capability to independently manage the prioritization of complex security events
Advanced understanding of common SOC/CIRT operational processes and documentation
Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks
Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture
Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls
Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data
Strong analytical and problem-solving skills
Minimum Qualifications:
5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team
Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis)
Ability to read, write and analyze PowerShell, C#, and Python
Capability to independently manage the prioritization of complex security events
Advanced understanding of common SOC/CIRT operational processes and documentation
Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks
Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture
Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls
Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data
Strong analytical and problem-solving skills
Ability to leverage programming and scripting languages to build automations and develop SOAR playbooks
Relativity is committed to competitive, fair, and equitable compensation practices.
This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives.
The expected salary range for this role is between following values:
$150,000 and $226,000
The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position.
Suggested Skills:
Cybersecurity, Infrastructure Security, Network Security, Penetration Testing, Security Architecture Design, Security Audit, Security Information, Security Information and Event Management (SIEM), Security Operations, Vulnerability Management
$82k-106k yearly est. 4d ago
Information System Security Officer
Conviso Inc.
Cyber security analyst job in Germantown, MD
Conviso Inc is looking for ISSO Officer for onsite Job. This role comes with benefits, 401K & some accrued PTO. The Ideal must have hands-on technical and analytical experience supporting the RMF lifecycle, cybersecurity monitoring, continuous authorization, and security control assessments. Are you open to new opportunities & could this be of interest?
On Site Job at 3 locations - Albuquerque NM, Las Vegas NV, Germantown MD
Active Top-Secret Clearance Required
Title: Information System Security Officer (ISSO)
Minimum 3 years as an ISSO
Required Skills: ISSO personnel must understand and interpret data from security tools and apply NIST frameworks with precision.
Capabilities include:
Proficiency in NIST SP 800-37, 800-53, 800-60, FIPS 199, CNSSI 1253.
Ability to perform risk assessments, system categorization, and control selection.
Experience with eGRC tools (e.g., Archer) for documentation, continuous monitoring, and POA&M management.
Responsibilities:
Prepare: Support enterprise, mission, and system-level RMF readiness, establish tailored baselines, identify assets, assess risks, and determine system placement in the enterprise architecture.
Categorize Information Systems: Perform FIPS 199 categorization, develop SSP subsections, register systems, and ensure early engagement with developers to integrate cybersecurity impact analysis.
Select Security Controls: Document, implement, and validate selected controls, incorporating security architecture, privacy requirements, and common control inheritance.
Assessment: Develop assessment plans, test controls, produce SARs, document findings, and support POA&M development.
Data Calls: Provide timely and accurate evidence and responses using approved tools. Internal & External Assessments: Support audits, collaborate with internal and external partners, and perform self-assessments.
Program-Level Documentation Support: Maintain program policies, adjudicate comments, and assess the impact of federal directives and legislation.
$65k-88k yearly est. 4d ago
Electronic Communications Safety and Security (ECSS) Systems Engineer
Johns Hopkins University 4.4
Cyber security analyst job in Baltimore, MD
Johns Hopkins Public Safety is seeking an
Electronic Communications Safety and Security
(ECSS) Systems Engineer
to support the Electronic Communications Safety and Security (ECSS) Systems primarily focused around the Johns Hopkins Police Department and Johns Hopkins Public Safety. This position will be responsible for the operation, configuration, and management of public safety information technology and ECSS Systems.
The Electronic Communications Safety and Security (ECSS) Systems Engineer will be responsible for administration, programming, maintenance, performance, implementation, security and support of various departmental and enterprise-wide platforms, including the installation and testing of new software, operating systems, related utilities/services, and hardware products as well as the integration of new products and/or software release upgrades into the current environment. ECSS systems include, but are not limited to, two-way radio systems and infrastructure, telecommunications systems, emergency communications center technologies, police vehicle technology hardware and software, integrated security hardware and software solutions, enterprise software applications, ID Badging, access control, door hardware, video surveillance, security detection, alarm monitoring, information management display, mass notification, life safety, and fire detection alarm.
Specific Duties and Responsibilities
Responsible for meeting with technical staff from many Johns Hopkins IT entities to determine customer needs for ECSS software and infrastructure deployments.
Responsible for meeting with stakeholders from Johns Hopkins Police Department (JHPD), Johns Hopkins Public Safety (JHPS), Baltimore Police Department (BPD) and Baltimore City (BCIT) regarding functionality and operation of various ECSS systems.
Collaborate with application support teams, infrastructure groups and departmental IT staff to test, deliver, and maintain ECSS software and infrastructure.
Assist with the ongoing maintenance and administration of Windows desktop management within the organization.
Conducts systems performance evaluations, monitoring, patch management and security evaluations.
Analyzes user needs in various computer environments (including but not limited to mainframe, Windows, and mid-range) and makes recommendations for products and services.
Ensures that all systems environments are maintained in an efficient and cost-effective manner.
Develop solutions based on extensive technical knowledge, skills and experience; influence clients towards innovative/integrated solutions.
Responsible for full life-cycle of medium to large sized complex projects.
Design complex business, clinical, education, or infrastructure solutions. Provide written documentation and diagrams of findings.
Design complex solutions that conform to institutional policies, standards, and guidelines, and infrastructure environment and to vendor and industry best practices.
Select infrastructure applications that reside between end user applications and hardware operating systems working with vendors, customers, and other sources (i.e., opensource or Internet2 initiatives) to provide configurable tools.
Develop new methods to improve service processes, performance, and functionality by examining existing systems management tools and processes.
Research, recommend, and implement new technologies based on the value to the institutions.
Work with vendor processes and product to improve the quality and fit for the institutions.
Install and configure complex server hardware and operating systems.
Install and configure infrastructure applications.
Implement a schedule of system backups and archive operations to ensure data/media recoverability.
Provide complex server level administration (manage HW/SW, maintenance, upgrades and patches, account maintenance, backups and recoveries and assist users).
Develop complex scripts and solutions by using departmental standards to automate systems management.
Perform complex system software upgrades including planning and scheduling, testing, and coordination.
Design and/or integrate security authorization and access control. Audit and maintain user access and authorization to provide for system security.
Generate and maintain complex periodic and ongoing system specific reports to assess system performance, integrity and capacity.
Follow and maintain IT security awareness and best practices by understanding security principles as they pertain to environments supported.
Utilize system management and monitoring tools and incident tracking systems to detect incidents, take corrective actions, and determine root cause.
Implement changes while adhering to the change management policies and procedures. Communicate to all parties the nature, significance, and risk factors.
With assistance of the project team, develop RFP's from requirements gathered by following institutional and purchasing guidelines in order to present well documented requirements to potential vendors for proposed solutions.
Evaluate vendor proposals.
Assist vendors, consultants, and inside Enterprise groups in developing applications.
Participate in scheduled project team meetings.
Author and maintain documentation to serve as technical and/or end user reference.
Other duties as assigned.
The responsibilities listed above are typical examples of the work performed by this position. Not all duties assigned to this position are included, nor is it expected that everyone in this position will be assigned every job responsibility.
Skills and Abilities
Strong technical writing skills.
Strong ability to understand complex business processes.
Must demonstrate strong critical thinking and analytical reasoning skills.
Ability to work on multiple priorities effectively.
Ability to prioritize conflicting demands.
Ability to execute assigned project tasks within established schedule.
Ability to work collaboratively in a team environment.
Writes and communicates clearly and concisely.
Possesses sound documentation skills.
Ability to maintain confidentiality.
Must demonstrate exemplary customer service skills.
Attention to details.
Strong desire to explore new ideas and continually learn.
Self-starter who will act independently.
Proficient/Certified in C-CURE 9000 Access Control and ID Badging Systems, MAS/SAS architecture and administration.
Proficient/Certified in Avigilon CCTV Systems.
Proficient/Certified in American Dynamics Victor Unified VMS.
Proficient/Certified in Magic Monitor CCTV Systems.
Knowledge of FLIR CCTV Systems.
Knowledge of Vendor and Visitor Management Systems.
Minimum Qualifications
Bachelor's Degree.
Five (5) years related experience in the areas to include design; project management; system initialization and training for electronic access control; CCTV and alarm monitoring systems; or engineering experience in the field of electronic communications which must have included working with multi-site radio and/or microwave networks.
Must be able to successfully pass a background investigation including fingerprinting.
Additional education may substitute for required experience and additional related experience may substitute for required education beyond HS Diploma/Graduation Equivalent, to the extent permitted by the JHU equivalency formula.
Preferred Qualifications
Three (3) years of related experience in a law enforcement environment in areas to include design, project management, system initialization and training for electronic access control, CCTV and alarm monitoring systems; OR if the experience is in engineering it must have included working with multi-site radio and/or microwave networks.
Classified Title: Systems Engineer
Job Posting Title (Working Title):Electronic Communications Safety and Security (ECSS) Systems Engineer
Role/Level/Range: ATP/04/PE
Starting Salary Range: $73,300 - $128,300 Annually (Commensurate w/exp.)
Employee group: Full Time
Schedule: M-F 8 am - 4 pm
FLSA Status:Exempt
Location:Hybrid/Eastern High Campus
Department name: VP for Public Safety Office of
Personnel area: University Administration
Total Rewards
The referenced base salary range represents the low and high end of Johns Hopkins University's salary range for this position. Not all candidates will be eligible for the upper end of the salary range. Exact salary will ultimately depend on multiple factors, which may include the successful candidate's geographic location, skills, work experience, market conditions, education/training and other qualifications. Johns Hopkins offers a total rewards package that supports our employees' health, life, career and retirement. More information can be found here: benefits-worklife/.
Education and Experience Equivalency
Please refer to the job description above to see which forms of equivalency are permitted for this position. If permitted, equivalencies will follow these guidelines: JHU Equivalency Formula: 30 undergraduate degree credits (semester hours) or 18 graduate degree credits may substitute for one year of experience. Additional related experience may substitute for required education on the same basis. For jobs where equivalency is permitted, up to two years of non-related college course work may be applied towards the total minimum education/experience required for the respective job.
Applicants Completing Studies
Applicants who do not meet the posted requirements but are completing their final academic semester/quarter will be considered eligible for employment and may be asked to provide additional information confirming their academic completion date.
Background Checks
The successful candidate(s) for this position will be subject to a pre-employment background check. Johns Hopkins is committed to hiring individuals with a justice-involved background, consistent with applicable policies and current practice. A prior criminal history does not automatically preclude candidates from employment at Johns Hopkins University. In accordance with applicable law, the university will review, on an individual basis, the date of a candidate's conviction, the nature of the conviction and how the conviction relates to an essential job-related qualification or function.
Diversity and Inclusion
The Johns Hopkins University values diversity, equity and inclusion and advances these through our key strategic framework, the JHU Roadmap on Diversity and Inclusion.
Equal Opportunity Employer
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
EEOis the Law
Accommodation Information
If you are interested in applying for employment with The Johns Hopkins University and require special assistance or accommodation during any part of the pre-employment process, please contact the Talent Acquisition Office at . For TTY users, call via Maryland Relay or dial 711. For more information about workplace accommodations or accessibility at Johns Hopkins University, please visit .
Vaccine Requirements
Johns Hopkins University strongly encourages, but no longer requires, at least one dose of the COVID-19 vaccine.The COVID-19 vaccine does not apply to positions located in the State of Florida. We still require all faculty, staff, and students to receive the seasonal flu vaccine. Exceptions to the COVID and flu vaccine requirements may be provided to individuals for religious beliefs or medical reasons. Requests for an exception must be submitted to the JHU vaccination registry.This change does not apply to the School of Medicine (SOM). SOM hires must be fully vaccinated with an FDA COVID-19 vaccination and provide proof of vaccination status. For additional information, applicants for SOM positions should visit coronavirus/covid-19-vaccine/and all other JHU applicants should visit health-safety/covid-vaccination-information/.
The following additional provisions may apply, depending upon campus. Your recruiter will advise accordingly.
The pre-employment physical for positions in clinical areas, laboratories, working with research subjects, or involving community contact requires documentation of immune status against Rubella (German measles), Rubeola (Measles), Mumps, Varicella (chickenpox), Hepatitis B and documentation of having received the Tdap (Tetanus, diphtheria, pertussis) vaccination. This may include documentation of having two (2) MMR vaccines; two (2) Varicella vaccines; or antibody status to these diseases from laboratory testing. Blood tests for immunities to these diseases are ordinarily included in the pre-employment physical exam except for those employees who provide results of blood tests or immunization documentation from their own health care providers. Any vaccinations required for these diseases will be given at no cost in our Occupational Health office.
$73.3k-128.3k yearly 6d ago
Deputy Information Systems Security Officer (Deputy ISSO) - Secret clearance
RCG, Inc. 4.3
Cyber security analyst job in Suitland, MD
** DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECRET CLEARANCE AND A CISSP**
Location: Suitland, MD - Full-Time, On-Site Salary Range: $130,000 - $140,000 annually
.
Who We Are
RCG is a fast-growing federal contracting firm proudly Certified as a Great Place to Work. We are committed to fostering a culture of innovation, inclusion, and excellence. At RCG, we deliver technology and mission support services that help government agencies succeed.
We are currently seeking a Deputy Information Assurance Engineer / Deputy Information Systems Security Officer (Deputy ISSO) to support our federal government customer in Suitland, MD. This position is fully on-site and supports mission-critical systems within the JPSS/LCCS program.
Please note: Due to the secure nature of this government agency, all candidates must be U.S. Citizens and able to successfully pass the required background investigation.
The Opportunity
This role is ideal for a senior Information Assurance professional who will serve as a Deputy ISSO and team lead, supporting authorization, compliance, and continuous monitoring activities for NOAA JPSS/LCCS systems. The Deputy ISSO will provide leadership to junior ISSOs, maintain system ATOs, and collaborate closely with multiple technical and operational teams to ensure a strong and compliant security posture. The successful candidate will play a key leadership role across A&A, POA&M management, Continuous Monitoring, change control, and incident response activities.
What You'll Do
Deputy ISSO / Team Lead Responsibilities
Serve as Deputy ISSO Team Lead, advising, mentoring, and training junior ISSOs on security and compliance activities.
Provide guidance on RMF, FISMA, and program-level security processes.
JPSS/LCCS A-ISSO Responsibilities
Maintain and support ATO packages for NOAA 5042 and NOAA 5065-1 systems.
Lead Assessment & Authorization (A&A) documentation reviews, updates, and Security Control Assessment (SCA) activities.
Work closely with OMS, LGSS, FVTS, MSC, and GP Security teams to maintain and improve overall program security posture.
Lead weekly cross-contract POA&M and security operations management meetings.
Participate in and vote during Mission Change Control Boards (CCBs) for system modifications.
Lead JPSS/LCCS Continuous Monitoring working group meetings.
Serve as Chair of the program SSID documentation review board.
Assist in incident response activities, working directly with operational and cybersecurity teams.
Maintain strong working relationships with Federal clients, including System Owners, ISSOs, Flight, and Operations personnel.
Required Qualifications
Active Secret clearance (REQUIRED).
Bachelor's degree in a relevant technical field.
Minimum 8 years of experience in Information Assurance, Information Security, or ISSO-related roles.
Demonstrated experience supporting RMF, FISMA, ATO, and Continuous Monitoring activities.
Proven leadership experience mentoring or leading junior security staff.
Strong ability to collaborate across multiple technical, operational, and security teams.
Excellent written and verbal communication skills.
Certifications (Required)
CISSP
Physical Demands
The physical demands described here are representative of those required to successfully perform the essential functions of this role. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions.
EEO Statement
RCG, Inc. does not discriminate against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibits discrimination against all individuals based on race, color, religion, sex, sexual orientation/gender identity, or national origin.
$130k-140k yearly 2d ago
Computer Network Defense Analyst (CNDA) Level 1
Aerovironment 4.6
Cyber security analyst job in Jessup, MD
The primary role of the Computer Network Defense Analyst (CNDA) is to be on the front lines of protecting critical systems, applying your expertise in cybersecurity, network defense, and traffic analysis to detect, respond, and prevent threats.
Position Responsibilities
Design and develop computer or information systems, including programming and network/cybersecurity solutions.
Conduct vulnerability analysis, penetration testing, computer forensics, and information assurance.
Perform systems engineering and network/system administration.
Analyze data from multiple sources (intrusion detection systems, firewalls, traffic logs, host system logs) to: Identify potential vulnerabilities, Respond to active cyber events, and Defend against emerging threats
Basic Qualifications (Required Skills & Experience)
Bachelor's degree in Computer Science, Network Engineering, Information Technology or related STEM discipline or equivalent combination of education, and experience
Minimum 2+ years of relevant experience
An active TS/SCI with polygraph
Salary Range: $70,000 - $100,000
The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
Clearance Level
Top Secret with Poly
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
U.S. Citizenship required
$70k-100k yearly Auto-Apply 30d ago
Visual Imagery Intrusion Detection System (VIIDS)
Siertek
Cyber security analyst job in Maryland
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
$80k-112k yearly est. 5d ago
Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)
Red Alpha
Cyber security analyst job in Annapolis, MD
A day in the life:
As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to):
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity
Document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
What you bring to the table:
Level 1:
A Bachelor's degree in a technical discipline and 2+ years of relevant experience
Experience in malware analysis
Programming experience in C, C#, Java, Perl or Python is preferred
An active TS/SCI with Polygraph
Level 2:
A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active TS/SCI with Polygraph
Level 3:
A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active US Government TS/SCI security clearance with Polygraph
Bonus Skills:
Level 1:
CISSP, GIAC GREM or CREA Certification is preferred
The total package:
Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves
and
their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information.
Salary Range:
Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself.
Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are:
Level 1: $80,000 - $125,000
Level 2: $120,000 - $160,000
Level 3: $140,000 - $180,000
Level 4: $165,000 - $215,000
Some of our additional perks and benefits include:
Retire sooner than planned:
Get closer to retirement with up to 10% in 401k contributions, immediately vested.
Have a career AND a life:
Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays.
Stay at your best:
As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym!
Keep current on new technologies and technological advancements
: $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships.
Dress in style:
Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc.
Enjoy the culture:
Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more!
Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we
bring digital transformation to the fight!
$165k-215k yearly Auto-Apply 60d+ ago
Intrusion Analyst 3
Wyetech
Cyber security analyst job in Annapolis, MD
At Wyetech, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). Develop and implement mitigation strategies Have a network and/or host-based focus.
Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).
Required Qualifications
TS/SCI with agency appropriate poly
Master's degree with 6 years of relevant experience
Bachelor's Degree with 8 years of relevant experience
Associates degree with 10 years of relevant experience
Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university.
Relevant Experience
Relevant experience must be in malware analysis, Programming experience in C, C#, C++, Java, Perl, or Python is preferred. CISSP, GIAC GREM or CREA Certification is preferred for level 1.
CISSP, CEH, Sec+, Net+, GIACGREM and/or CREACertifications required for Level 2 and 3
The Benefits Package
Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds.
Additional benefits include:
Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs.
Full-time employees have the option to participate in a variety of voluntary benefit plans including:
A Choice of Medical Plan Options, some with Health Savings Account (HSA)
Vision and Dental
Life and AD&D Benefits
Short and Long-Term Disability
Hospital Indemnity, Accident, and Critical Illness Insurances
Optional Identity Theft and Legal Protection Services
Company Environment & Perks
Employee Referral Bonus Eligibility up to $10,000
Mobility Among Wyetech-supported Contracts
Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS
Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party.
Employees receive two complementary branded clothing orders annually.
$65.01 - $88.04 an hour
Pay Range: $65.01 - $88.046 per hour*
Hourly pay rates listed for this position serve as a general guideline and are not a guarantee of compensation. Compensation will vary dependent upon factors including but not limited to: Government contract rates; education; relevant prior work experience, knowledge, skills, and competencies; certifications, and geographic location. *Hourly pay rates reflect the pre-benefit gross wage amounts.
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Affirmative Action Statement:
Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.
Accommodations:
Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact Brittney Wood. at 844-WYETECH x727 or [email protected]. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$65-88 hourly Auto-Apply 30d ago
Intrusion Analyst
Synergy ECP
Cyber security analyst job in Columbia, MD
Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security.
In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our Employees, to our Customers and by Improving Performance (ECP).
It's what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results - showing we're ready to meet our customers' evolving demands.
Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services.
Synergy ECP is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected class.
Requirements
A Bachelor's degree and 5 years of relevant experience or a Master's degree plus 3 years of relevant experience or a Doctoral degree and 2 years of relevant experience. An Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
CISSP, CEH, Sec+, Net+, GIAC, GREM, or CREA Certification is required.
Relevant experience must be in malware analysis. Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources.
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis.
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs).
Develop and implement mitigation strategies.
Have a network and/or host-based focus.
$80k-112k yearly est. 60d+ ago
Computer Network Defense (CND) Analyst
CTC Group 3.1
Cyber security analyst job in Fort Meade, MD
Job Description
CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Responsibilities
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Qualifications
Active TS/SCI with polygraph clearance
STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field.
18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree.
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration.
If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Documented foreign language proficiency may count toward experience requirements.
Level 1 Requirements
Associate's degree plus 4 years of relevant experience.
OR: Bachelor's degree or 2 years of relevant experience.
Level 2 Requirements
Associate's degree plus 7 years of relevant experience.
OR: Bachelor's degree plus 5 years of relevant experience.
OR: Master's degree plus 3 years of relevant experience.
OR: Doctorate degree plus 2 years of relevant experience.
Level 3 Requirements
Associate's degree plus 10 years of relevant experience.
OR: Bachelor's degree plus 8 years of relevant experience.
OR: Master's degree plus 6 years of relevant experience.
OR: Doctorate degree plus 4 years of relevant experience.
Level 4 Requirements
Associate's degree plus 13 years of relevant experience.
OR: Bachelor's degree plus 11 years of relevant experience.
OR: Master's degree plus 9 years of relevant experience.
OR: Doctorate degree plus 7 years of relevant experience.
#CJ
Why CTC Group?
As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations.
CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here.
CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Powered by JazzHR
Luf4o3VeSC
$66k-94k yearly est. 10d ago
Visual Imagery Intrusion Detection System (VIIDS)
Siertek Ltd.
Cyber security analyst job in Andrews Air Force Base, MD
Job Description
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
$80k-112k yearly est. 25d ago
Network and Security Analyst
Vheda Health
Cyber security analyst job in Columbia, MD
We're seeking a talented and motivated Network and SecurityAnalyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role.
Key Responsibilities
Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi)
Assess and improve existing IT systems and processes
Coordinate with vendors for cabling, equipment, and installation
Set up and recommend equipment for new hires
Manage access control systems, surveillance integration, and UPS/power solutions
Evaluate and improve domain/web infrastructure
Ensure HIPAA and data privacy compliance in all IT operations
Required Qualifications
Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+)
5-10+ years in IT infrastructure, networking, or systems analysis
Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control
Familiar with HIPAA, PII, and cybersecurity best practices
Experience with Microsoft 365, Power BI, and Asana (preferred)
Preferred Qualifications
Healthcare or regulated industry experience
Why Join Vheda Health?
At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package:
Compensation: Competitive salary within the published range plus performance bonus and equity opportunities
Healthcare: Comprehensive medical, dental, and vision coverage
Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability
Work-Life Balance: Unlimited paid time off and 11 paid company holidays
Community: Engaging team events and activities throughout the year
$66k-90k yearly est. 60d+ ago
Network Security Analyst
Cymertek
Cyber security analyst job in Annapolis, MD
Network SecurityAnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information SecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$66k-90k yearly est. Easy Apply 60d+ ago
Cyber Security Engineer - Impact in Cloud & On-Prem
Leidos 4.7
Cyber security analyst job in Bethesda, MD
A leading technology solutions provider in Bethesda, MD is seeking a CyberSecurity Engineer to deliver expertise and support in cloud and on-premises security infrastructures. The ideal candidate will have a minimum of a BS degree and 8+ years of relevant experience, coupled with strong analytical and problem-solving skills. This position requires an active TS/SCI clearance and at least one IAT Level II certification. Opportunities for additional responsibilities and certifications available. Join a team that values innovation and collaboration.
#J-18808-Ljbffr
$76k-98k yearly est. 1d ago
Senior Security Engineer
Netimpact Strategies 3.7
Cyber security analyst job in Bethesda, MD
We are seeking a highly skilled Security Engineer to join our team, specializing in implementing secure and resilient infrastructural modifications and advanced IT security enhancements to join our onsite team in Bethesda, MD. In this role, you will manage ITIL-based configuration and change management framework, ensuring alignment with NIST SP 800-128 guidelines. Your responsibilities will include overseeing the deployment and maintenance of both cloud-based and on-premises infrastructure, utilizing next-generation cybersecurity strategies to optimize performance and security. If you possess these skills and are passionate about maintaining high security and compliance standards through innovative IT solutions, we encourage you to apply now.
Responsibilities:
Design and implement secure infrastructural modifications, leveraging expert technical and systems engineering consultancy.
Develop and manage a forward-thinking configuration and change management framework aligned with NIST SP 800-128 guidelines, utilizing automation and predictive analytics.
Deploy and maintain a diverse array of computing and communication technologies, ensuring compliance with NIST standards.
Strategically adhere to the Risk Management Framework to achieve Security Authorization objectives, enhancing institutional resilience.
Provide primary support for critical network and security functions, including firewall management, IP address allocation, and incident response.
Develop and maintain detailed documentation and testing protocols for cloud-based and on-premises server setups and configurations.
Employ a detailed change management process aligned with NIH Configuration Management Plan, ensuring thorough review and security impact analysis.
Optimize endpoint security using tools like HCL BigFix for real-time patch deployment and vulnerability management.
Implement automation for security certificate processes and other security-related tasks to enhance efficiency and compliance.
Implement AI-driven tools for proactive server and endpoint monitoring, enhancing security posture.
Partner with security personnel for annual Contingency Plan and Incident Response testing, ensuring readiness and compliance.
Produce comprehensive security reports and documentation for systems and software lifecycle phases, adhering to federal standards and guidelines.
Implement Information Security Continuous Monitoring (ISCM) and mitigate identified security risks throughout the lifecycle.
Maintain security requirements for cloud services, ensuring FedRAMP compliance, data jurisdiction, and interconnection agreements.
Provide detailed documentation to support Security Assessment and Authorization (A&A) processes, including System Security Plans (SSP) and Security Assessment Reports (SAR).
Qualifications
Required
A bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field is often required. Some positions may prefer or require a master's degree for senior roles.
6+ years of experience in information security or related IT field.
Endpoint monitoring using BigFix.
Relevant certifications demonstrate expertise and commitment to the field including CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CompTIA Security+, or CCSP (Certified Cloud Security Professional)
Effective communication skills, both written and verbal, are crucial for documenting processes, explaining technical concepts to non-technical stakeholders, and collaborating with cross-functional teams.
Analytical thinking, problem-solving abilities, attention to detail, and the ability to work under pressure are also important traits.
Understanding of regulatory compliance requirements (such as HIPAA) and industry standards (ISO 27001, NIST frameworks) is beneficial.
Experience with IBM BigFix manage and secure end points inccluding virtual, cloud and on-prem devices
Preferred
Federal Consulting Industry Experience Preferred
#LI-Onsite
About Us
Perks of working at NetImpact Strategies
Your health comes first - we offer comprehensive medical, dental, & vision insurance that starts the first of the month after you join the team
Invest in your future - 401(k) Plan - Immediately vested employer contributions; no matching required
Work hard, play hard - we offer a generous Paid Time Off (PTO) policy, one (1) additional day of paid wellness leave per calendar year, and observeten (10) federal holidays
Pawsitively pawesome - Pet Insurance (because our little critters are part of our families, too!)
Invest in your education - Tuition reimbursement, internal training programs, & company-sponsored industry certifications!
Be part of a dynamic and collaborative work environment recently ranked by The Washington Post as a Top Work Place in 2019, 2021,2022, 2023, & 2024!
Have fun and celebrate and give back - Team building activities, community volunteering, quarterly HQ days, wellness events, happy hours, family fun events, and more!
ABOUT US
NetImpact Strategies Inc. (NetImpact) has been a Trusted Advisor driving impact through digital transformation for the Federal Government for over a decade. We solve complex problems with innovation and agility to create meaningful, transformative, and enduring change. As Trusted Advisors, NetImpact professionals partner with customer agencies to deliver solutions that empower them to not only meet their missions but also realize their strategic vision through agile, outcome-focused solutions addressing both strategic and tactical requirements. We design and implement comprehensive, tailored solutions that are both mindful of the client's culture and organizational dynamics. NetImpact's core values and commitment to a customer and results-oriented delivery approach has propelled our growth and enabled us to deliver impactful value across Strategic Consulting, Process Automation, Cloud, DevSecOps, Data and Analytics, and CyberSecurity for the Federal Government.
ACCESSIBILITY NOTE
NetImpact Strategies is committed to complying with all applicable provisions of the Americans with Disabilities Act, as amended (“ADA”), and applicable state and local laws. It is NetImpact's policy not to discriminate against any qualified person or applicant with regard to any terms or conditions of employment on the basis of such individual's disability. Consistent with this policy of non-discrimination, NetImpact will provide reasonable accommodations to an individual with a disability, as defined in the ADA or applicable law, who has made NetImpact aware of his/her disability, unless doing so would cause undue hardship to NetImpact. If you are an applicant and need reasonable accommodation when applying for job opportunities within NetImpact, or request reasonable accommodation to utilize NetImpact's online employment application, please **************************************.
#J-18808-Ljbffr
$91k-121k yearly est. 3d ago
Information Systems Security Officer (ISSO) - SECRET CLEARANCE (On Site)
RCG, Inc. 4.3
Cyber security analyst job in Suitland, MD
*** DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECRET CLEARANCE ***
Information Systems Security Officer (ISSO)
SECURITY REQUIREMENT:
.
Location: Suitland, MD - Full-Time, FULLY ON-SITE 5 days a week
Salary Range: $120,000 - $125,000 annually
Who We Are
RCG is a fast-growing federal contracting firm proudly Certified as a Great Place to Work. We are committed to fostering a culture of innovation, inclusion, and excellence. At RCG, we deliver technology and mission support services that help government agencies succeed. We are currently seeking an Information Assurance Engineer / Information Systems Security Officer (ISSO) to support our federal government customer in Suitland, MD.
(Updated) This role follows an ON-SITE schedule, requiring on-site 5 days a week.
**Due to the secure nature of this government agency, all candidates must be U.S. Citizens and able to successfully pass the required background investigation.**
The Opportunity
This role is ideal for a seasoned Information Assurance professional with strong experience supporting FISMA systems in a cloud-based environment. The ISSO will serve as a subject matter expert (SME), advising system development teams on security best practices, regulatory requirements, and compliance standards while supporting Security Assessment & Authorization (SA&A) activities for new and existing systems. The successful candidate will help maintain an appropriate security posture, manage security-related change requests, and support system authorization efforts across evolving threat landscapes.
What You'll Do
Serve as an Information Assurance SME for systems development projects in a cloud-based environment.
Review proposed systems, networks, and software for potential security risks and advise on secure product selection and implementation.
Define system scope and required level of detail for security plans and documentation.
Manage and analyze Change Requests (CRs), assessing security impact and required updates to system posture.
Provide Security Assessment & Authorization (SA&A) support for new and existing systems.
Identify, develop, and maintain required security artifacts for authorization packages.
Prepare and review System Security Plans (SSPs), including FIPS 199, FIPS 200, and E-Authentication documentation.
Coordinate and participate in Security Test & Evaluation (ST&E) activities and review ST&E reports.
Perform vulnerability assessment reviews and generate reports for System Owners and key stakeholders.
Validate system hardening, patching, and compliance with applicable security requirements and checklists.
Report status, findings, and risk posture to the Program Manager and Deputy Program Manager.
Required Qualifications
Active Secret clearance (REQUIRED).
U.S. Citizenship required.
Bachelor's degree in a technical field (e.g., Engineering, Computer Science) or 10 years of experience in IT systems engineering or IT security architecture.
6+ years of hands-on experience in information assurance or information security.
Demonstrated ISSO experience supporting FISMA systems.
Strong expertise in cloud architecture, cloud engineering, and cloud compliance.
Ability to work on-site 5 days a week.
Excellent interpersonal skills with demonstrated ability to collaborate across teams and organizations.
Strong verbal and written communication skills in English.
Certifications (Required)
CISSP or equivalent security certification
Desired (Not Required) Qualifications
Experience supporting cloud systems in AWS environments.
AWS Cloud Practitioner or Essential certification.
Certificate of Cloud Knowledge (CCAK) Plus.
Certified Cloud Security Professional (CCSP).
Physical Demands
The physical demands described here are representative of those required to successfully perform the essential functions of this role. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions.
EEO Statement
RCG, Inc. does not discriminate against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibits discrimination against all individuals based on race, color, religion, sex, sexual orientation/gender identity, or national origin.