Cyber security analyst jobs in Pasadena, MD - 1,203 jobs
All
Cyber Security Analyst
Intrusion Detection Analyst
Senior Security Engineer
Security Engineer
Information Systems Security Officer
Network Security Analyst
Defense Analyst
Information Assurance Engineer
Cyber Security Engineer
Cyber Security Specialist
Information Security Engineer
Cyber ML Engineer: Real-Time Threat Detection
Phase2 Technology 3.9
Cyber security analyst job in McLean, VA
A leading technology firm is seeking a Cyber Machine Learning Engineer to build and improve machine learning models for detecting cyber threats. The ideal candidate has significant experience in cyber threat hunting and proficiency in Python and MLOps practices. This position offers a competitive compensation range of $99,000 to $225,000 annually, along with comprehensive benefits including health, life, and professional development opportunities. The job supports flexible work arrangements.
#J-18808-Ljbffr
A leading financial institution in Washington, DC is seeking a cybersecurity expert to enhance its malware defense team. Responsibilities include analyzing malware, tracking campaigns, and authoring reports. The ideal candidate must possess strong malware analysis skills, experience in creating analytical tools, and a solid understanding of network traffic analysis. This position offers an annual salary between $95,700.00 and $144,900.00 based on experience, alongside robust benefits aimed at ensuring employee wellness.
#J-18808-Ljbffr
$95.7k-144.9k yearly 3d ago
Information Assurance Engineer / Security Manager
C2 Labs, Inc.
Cyber security analyst job in Washington, DC
Information Assurance Engineer / Security ManagerC2 Labs, Inc. - **************
C2 Labs partners with clients on their IT transformation journey via our industry-leading capabilities in full stack development, hyper-automation/DevOps, and cybersecurity compliance. We provide specialized products and services that enable clients to innovate with speed and scale while maintaining a robust and effective security posture. As digital transformation partners, we address the most urgent needs holding back our clients, including proactively addressing cultural change, quantifying risk, automating compliance, and closing critical skill gaps
We are seeking a highly skilled and experienced Information Security Engineering Manager to spearhead the development, implementation, and management of our organization's security infrastructure. This pivotal role will be responsible for safeguarding our critical assets and ensuring compliance with industry-leading security standards. You will lead a team of security professionals, providing technical guidance and fostering a culture of security awareness.
Responsibilities
Design, develop, and implement robust security networking architectures, incorporating Intrusion Detection/Prevention Systems (IDS/IPS) and other advanced security technologies.
Develop and enforce comprehensive security policies and procedures aligned with industry best practices and regulatory requirements.
Lead the monitoring and analysis of security systems, proactively identifying and responding to potential threats and vulnerabilities.
Manage and optimize existing security solutions, ensuring their effectiveness and efficiency.
Drive compliance initiatives, with a focus on the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls.
Effectively manage security projects, ensuring timely completion and adherence to budget.
Lead incident response efforts, coordinating investigations and implementing remediation strategies.
Mentor and develop a high-performing team of security professionals.
Qualifications
Bachelor's degree in an IT-related field required.
Minimum 15 years of experience in information security, or Certified Information Systems Security Professional (CISSP) certification with a minimum of 10 years of experience.
Demonstrated deep understanding of information security principles, including access control, network security, cryptography, and vulnerability management.
Proven experience in managing security projects and leading incident response activities.
Extensive experience with the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls.
Excellent communication, leadership, and problem-solving skills.
EOE STATEMENT
We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen.
#J-18808-Ljbffr
$72k-96k yearly est. 5d ago
Tanium Security Engineer - Federal Focus
Medium 4.0
Cyber security analyst job in Washington, DC
A cybersecurity solutions provider is seeking a Security Engineer specializing in Tanium to enhance endpoint management and security within federal government environments. Responsibilities include designing and maintaining Tanium infrastructure and collaborating with cybersecurity teams. Candidates must possess 12+ years of IT/Security experience and a relevant Bachelor's degree. This position offers a hybrid work model, a competitive salary between $135,000 and $155,000, and extensive benefits including medical and retirement plans.
#J-18808-Ljbffr
$135k-155k yearly 4d ago
Senior Cloud Security Engineer: Incident Response & IAM
Aledade 4.1
Cyber security analyst job in Bethesda, MD
A healthcare technology firm located in Maryland is seeking a Senior Security Engineer I to enhance security capabilities within cloud-native environments. The candidate will design and implement security solutions, lead incident response efforts, and collaborate with various teams to strengthen security posture. Applicants should have a degree in Computer Science or related field, extensive experience in security engineering, and proficiency in scripting languages like Python and Bash. This role offers a supportive workplace that values diversity and innovation.
#J-18808-Ljbffr
$102k-141k yearly est. 1d ago
Senior Security Engineer
Emergencymd
Cyber security analyst job in Washington, DC
Evolver Federal is seeking a Senior Security Engineer to fulfill a requirement for a potential government client. The Senior Security Engineer is responsible for designing, implementing, and maintaining advanced security solutions to protect federal systems and data. This role prioritizes continuous monitoring, FISMA compliance, and OIG audit readiness while engineering secure architectures, integrating cybersecurity technologies, and ensuring adherence to federal standards such as NIST 800-series, RMF, and TIC 3.0. The Senior Security Engineer will work closely with SOC teams, architects, and program managers to deliver robust security capabilities across cloud (AWS GovCloud, Azure Government), on-premises, and hybrid environments. This position requires deep technical expertise, hands-on experience with security tools, and the ability to lead engineering efforts for mission‑critical systems in highly regulated environments.
Responsibilities
Design and implement security solutions for enterprise and federal environments, ensuring compliance with RMF and NIST guidelines.
Engineer secure configurations for SIEM, SOAR, EDR, and vulnerability management platforms.
Support Tier 2/3 SOC analysts by developing advanced correlation rules for Splunk and optimizing detection workflows.
Support SOC operations by integrating advanced detection and response capabilities.
Conduct security assessments, penetration testing, and risk analysis for critical systems.
Implement continuous monitoring and automated compliance reporting to meet Department of Labor and federal requirements.
Develop and maintain security engineering documentation, including system security plans and architecture diagrams.
Collaborate with architects and program managers to align security engineering with strategic objectives.
Lead efforts to integrate security into DevSecOps pipelines and CI/CD workflows.
Provide technical expertise during incident response and forensic investigations.
Evaluate emerging technologies and recommend enhancements to improve security posture.
Define and track measurable outcomes such as MTTR reduction, SLA adherence, compliance score improvements, and false positive reduction to meet performance‑based contract KPIs.
Coordinate with federal stakeholders (CISO, ISSOs, AO) and provide audit support for ATO processes.
Ensure adherence to performance‑based contract requirements and federal cybersecurity mandates.
Basic Qualifications
Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience, or 4 years' experience in IT Solutions at senior management
Certified Information Systems Security Professional (CISSP) mandatory with Information Systems Security Engineering Professional (ISSEP) concentration
Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended)
Information Technology Infrastructure Library (ITIL) 4 Foundation
10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical contract/BPAs
US Citizen with the ability to pass a comprehensive government background check
Preferred Qualifications
Master's degree in cybersecurity, IT, or a related technical field
Experience supporting SOC operations in federal or regulated environments
Familiarity with RMF, NIST 800-series, OMB A-130, and TIC 3.0
Proven leadership in cross‑functional teams and performance‑based contracts
Strong communication skills, including executive briefings and incident reporting
Hands‑on experience with SIEM (Splunk, Elastic), SOAR (Cortex XSOAR), and EDR (CrowdStrike, Microsoft Defender).
Expertise in cloud security engineering (AWS, Azure, GCP) and container security (Kubernetes, Docker).
Familiarity with Zero Trust Architecture principles and implementation strategies.
Familiarity Continuous Diagnostics and Mitigation (CDM).
Experience with PKI, encryption standards, and secure network design.
Knowledge of automation tools for security orchestration and compliance reporting.
Ability to lead technical teams and mentor junior engineers in cybersecurity best practices.
Experience integrating security controls into large-scale federal systems and mission‑critical applications.
Understanding of advanced threat detection techniques and AI‑driven security solutions.
Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.
Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.
#J-18808-Ljbffr
$98k-136k yearly est. 4d ago
Qualys Security Engineer- Active Secret Clearance Required
VETS, Inc.
Cyber security analyst job in Washington, DC
Staffing Pros, a division of VETS Inc., is recruiting for a full-time Qualys Security Engineer onsite in Washington, DC or Beltsville, MD. This position requires an Active Secret Clearance.
The Senior Qualys Security Engineer will support our customer's enterprise vulnerability management initiatives. This role involves maintaining and optimizing Qualys toolsets, performing vulnerability assessments, and working collaboratively across technical teams to strengthen organizational cybersecurity posture.
This position is based on-site at either the Washington, DC or Beltsville, MD office, with occasional travel between the two locations.
What you'll do:
Oversee day-to-day management of the Qualys platform including agents, scanners, and connectors.
Optimize scan configurations, authentication methods, and template deployments.
Review and interpret scan results to generate actionable intelligence for technical and non-technical audiences.
Partner with infrastructure, development, and SOC teams to validate findings and drive remediation efforts.
Automate tasks using Qualys APIs and custom scripts to support reporting and data integration.
Maintain an up-to-date asset inventory through discovery and classification workflows.
Minimize false positives through tuning and validation.
Conduct policy compliance assessments in support of regulatory frameworks.
Provide guidance and mentorship to junior analysts in vulnerability management best practices.
Required Qualifications
5+ years of hands-on expertise with Qualys.
Must be able to commute to Beltsville, MD or Washington, DC for full-time onsite work.
Secret clearance with the ability to obtain a Top Secret clearance is required.
Proficiency in scripting (Python, PowerShell, or Bash).
Familiarity with network protocols, OS security (Windows/Linux), and web application vulnerabilities.
Understanding of compliance standards and frameworks (e.g., NIST 800-53, CIS Controls, ISO 27001.)
Qualys Vulnerability Management & Policy Compliance.
Qualys Web Application Scanning.
Automation using Qualys APIs.
Network architecture and protocol knowledge.
Database and OS-level security.
Vulnerability lifecycle and remediation strategies.
Excellent written and verbal communication.
Strong problem-solving and analytical mindset.
Ability to operate independently or as part of a multi-disciplinary team.
Solid documentation and reporting practices.
Experience engaging with cross-functional stakeholders.
US Citizenship is required.
Preferred Qualifications
Professional certifications: CISSP, CEH, GIAC, or equivalent.
Exposure to other scanning tools (e.g., Tenable, Rapid7).
Familiarity with public cloud security models (AWS, Azure, GCP).
Experience with configuration management tools and CI/CD pipelines.
Background in system administration, network engineering, or DevSecOps.
EEO Statement Staffing Pros a division of VETS-inc is an Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information.
$84k-117k yearly est. 42d ago
Information System Security Officer (ISSO) - DHS
LMI Consulting, LLC 3.9
Cyber security analyst job in Tysons Corner, VA
Job ID 2025-13054 # of Openings 1 Category Cyber Benefit Type Salaried High Fringe/Full-Time
LMI is seeking an Information System Security Officer (ISSO) to support our Department of Homeland Security (DHS) market.
LMI is a new breed of digital solutions provider dedicated to accelerating government impact with innovation and speed. Investing in technology and prototypes ahead of need, LMI brings commercial-grade platforms and mission-ready AI to federal agencies at commercial speed.
Leveraging our mission-ready technology and solutions, proven expertise in federal deployment, and strategic relationships, we enhance outcomes for the government, efficiently and effectively. With a focus on agility and collaboration, LMI serves the defense, space, healthcare, and energy sectors-helping agencies navigate complexity and outpace change. Headquartered in Tysons, Virginia, LMI is committed to delivering impactful results that strengthen missions and drive lasting value.
Responsibilities
Acquire and manage all necessary documentation/artifacts, including cybersecurity support and resources, to support IT cybersecurity goals and objectives from a risk management perspective.
Advise senior management on system risk levels and cybersecurity posture for cloud-based environments
Assist in the deployment, architecture and configuration of security controls of deployed systems with Cloud Architects
Ensure that developed systems and architectures are consistent with all applicable DHS cybersecurity policies and guidelines.
Perform Assessment and Authorization (A&A) cybersecurity reviews, identify gaps, and support risk management plans for cybersecurity personnel to execute.
Provide input on cybersecurity requirements and collect and maintain data needed to meet system cybersecurity compliance reporting.
Provide subject matter expertise for Risk Management Framework (RMF) activities and related documentation to support system accreditation / Authority to Operate (ATO) requirements.
Interpret noncompliance to determine the impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
Coordinate with geographically-distributed, multi-discipline teams to ensure compliance with all applicable requirements for cybersecurity are addressed.
Ensure that plans of action and milestones (POAM) or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. and support necessary remediation/compliance activities.
Participate in recurring cybersecurity working group meetings.
Oversee and manage A&A activities to support their respective systems and security activities.
Work with program ISSOs and ISSMs to effectively aggregate technical details for government leadership including the cybersecurity lead, project managers, program managers to facilitate succinct and effective risk discussions and provide understanding of respective program risks.
Provide security support and evaluation to development teams to integrate information assurance/cybersecurity and remediate vulnerabilities throughout the System Life Cycle Development.
Lead the development, review and management of system Assess and Authorize documentation to ensure it is compliant with RMF standards.
Develop guidance and assists associates through the RMF phases.
Participate in ATT and ATO activities
Support the organization's program that implements information systems security technology and procedures.
Review DHS policy and develop local policy and procedures that implement the DHS Cybersecurity subprograms and initiatives.
Create and submit Plan of Actions & Milestones (POA&M) for review and approval by the Authorizing Official (AO)
Qualifications
Required Qualifications
Bachelor's degree in a related field or equivalent experience.
8+ years demonstrated SP 800-37 RMF, NIST 800.53 experience
Familiarity with cybersecurity tools such as Aquasec and Sonar Qube
Must possess a Security + certification
Experience developing or ensuring development adheres to cybersecurity requirements and best practices (e.g., NIST controls)
Familiarity with commercial off-the-shelf solutions for specific security capabilities
DHS/CBP background investigation highly preferred
Desired Qualifications
Exposure to AWS, Azure and Google Cloud
Host Base Security System (HBSS), Tenable Nessus Vulnerability Assessment, EMASS
Disclaimer:
The salary range displayed represents the typical salary range for this position and is not a guarantee of compensation. Individual salaries are determined by various factors including, but not limited to location, internal equity, business considerations, client contract requirements, and candidate qualifications, such as education, experience, skills, and security clearances.
Target Salary Range- $119,813.31 - $189,000
LMI is an Equal Opportunity Employer. LMI is committed to the fair treatment of all and to our policy of providing applicants and employees with equal employment opportunities. LMI recruits, hires, trains, and promotes people without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, pregnancy, disability, age, protected veteran status, citizenship status, genetic information, or any other characteristic protected by applicable federal, state, or local law. If you are a person with a disability needing assistance with the application process, please contact
Colorado Residents: In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Need help finding the right job?
We can recommend jobs specifically for you!
Click here to get started.
$119.8k-189k yearly 2d ago
Cyber Security Specialist (SNR)
CSCI Consulting 3.7
Cyber security analyst job in Washington, DC
CSCI Consulting is looking for a CyberSecurity Specialist (SNR) to design & set up the ingestion of various customer data flows to include pre-processing data into a useable format, ensuring proper parsing and indexing. Collaborate with cross-functional teams and responsible for designing & integrating Elastic with a wide variety of data sources and developing associated knowledge objects such as queries, dashboards, reports, alerts for monitoring and analytics
Responsibilities
Perform data transformation using Elastic query language
Track the health of the Elastic environment and optimize its performance. Troubleshoot and resolve issues related to security, performance, data indexing, and searches
Perform watch-officer monitoring duties, including:
Monitoring detecting, investigating, and responding to cybersecurity threats and events using Elastic /SIEM Platform
Reviewing correlated alerts and logs for compromise scenarios
Performing triage of security alerts to prioritize response
Identifying false positives
Investigating security incidents and determining root cause
Collecting and preserving logs for analysis
Escalating confirmed incidents to leadership or SOC teams
Coordinating with IT or DevOps for containment and remediation
Creating after-action reports (AAR) post-incident
In addition, the role may include assistance with monitoring Vulnerability Management tools, such as ACAS and ePO
Minimum Requirements
Have at least three years of working knowledge and hands-on experience with Elastic/Splunk query languages, monitoring SIEM dashboards and real-time alerts, fine-tuning SIEM rules to reduce noise, and NIST 800-53 & DevSecOps frameworks
Must have a DoD/DoW Secret Security Clearance
US Citizenship is required
Required IT Level: ITII
Must currently possess a Security+ certificate
Creativity and adaptability in problem-solving
Ability to work with clients to understand their needs
Strong organizational and time-management skills
Excellent written and verbal communication skills
Professional presence
Preferred Skills
Ability to work in a team environment, as well as independently
Strong customer and vendor relationship skills
Demonstrated ability to comply with data standards and policies
Motivation to learn new technologies and methodologies that demonstrate value
Past experience working with a federal agency
Department of Defense/Department of War experience is a plus!
About CSCI
CSCI is an award-winning information technology and financial management consulting firm founded on one simple philosophy: "Do what is right, always." We apply this philosophy across all elements of our growing business, from delivering world-class services for customers to providing an environment where associates thrive both personally and professionally. At CSCI, work and fun aren't diametrically opposed!
At CSCI, our goal is to hire people with proven track records and retain them with an energizing, diverse company culture. We value each associate's natural drive to excel, and we provide them with the freedom to do things their way. CSCI seeks the best and brightest in the industry-those who are ready to move their lives and career forward. Join us today and get excited about Mondays again!
Benefits of Working at CSCI
Competitive salaries
Generous Paid Time Off (PTO) package
Paid holidays aligned to the Federal calendar
Full health benefits including medical, dental, vision, and life insurance
401(k) retirement plan
Team building events
Professional development support
Legal
CSCI complies with all applicable Federal, state, and local employment regulations. Please reach out to with any questions.
Equal Employment Opportunity
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. CSCI provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
If you require an accommodation, please contact CSCI Human Resources for further assistance. For questions regarding the qualifications listed above, please contact the CSCI Recruiting Team.
E-Verify
CSCI participates in E-Verify to confirm the employment eligibility of all newly hired employees. For more information, please visit*********************
California Consumer Privacy Act (CCPA) Notice
As part of the application and recruitment process, CSCI Consulting, Inc. may collect personal information as described under the California Consumer Privacy Act (CCPA).
This information is collected solely for employment-related purposes, including evaluating your qualifications, processing your application, and complying with legal obligations.
By applying to this position, you acknowledge that you have read and understand the following notice regarding the collection of your personal information as a job applicant:
Categories of Information Collected: Personal identifiers, employment history, educational information, and any other information provided in your application or as part of the interview process.
Purposes for Collecting Information: To review your application, assess your qualifications, and manage the hiring process.
Retention and Security: Information collected will be retained indefinitely and will be securely stored and handled in accordance with CCPA guidelines and CSCI Consulting, Inc. policies.
Rights of Applicants: Under CCPA, California residents have the right to request information about the personal data we collect, delete it, and request restrictions on certain uses. However, some information may be retained as required by law.
For further information, or to exercise your rights under the CCPA, please contact CSCI's HR team.
Disclaimer
The above declarations are not intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be such a listing of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job.
$91k-121k yearly est. 6d ago
Information System Security Officer
Conviso Inc.
Cyber security analyst job in Germantown, MD
Conviso Inc is looking for ISSO Officer for onsite Job. This role comes with benefits, 401K & some accrued PTO. The Ideal must have hands-on technical and analytical experience supporting the RMF lifecycle, cybersecurity monitoring, continuous authorization, and security control assessments. Are you open to new opportunities & could this be of interest?
On Site Job at 3 locations - Albuquerque NM, Las Vegas NV, Germantown MD
Active Top-Secret Clearance Required
Title: Information System Security Officer (ISSO)
Minimum 3 years as an ISSO
Required Skills: ISSO personnel must understand and interpret data from security tools and apply NIST frameworks with precision.
Capabilities include:
Proficiency in NIST SP 800-37, 800-53, 800-60, FIPS 199, CNSSI 1253.
Ability to perform risk assessments, system categorization, and control selection.
Experience with eGRC tools (e.g., Archer) for documentation, continuous monitoring, and POA&M management.
Responsibilities:
Prepare: Support enterprise, mission, and system-level RMF readiness, establish tailored baselines, identify assets, assess risks, and determine system placement in the enterprise architecture.
Categorize Information Systems: Perform FIPS 199 categorization, develop SSP subsections, register systems, and ensure early engagement with developers to integrate cybersecurity impact analysis.
Select Security Controls: Document, implement, and validate selected controls, incorporating security architecture, privacy requirements, and common control inheritance.
Assessment: Develop assessment plans, test controls, produce SARs, document findings, and support POA&M development.
Data Calls: Provide timely and accurate evidence and responses using approved tools. Internal & External Assessments: Support audits, collaborate with internal and external partners, and perform self-assessments.
Program-Level Documentation Support: Maintain program policies, adjudicate comments, and assess the impact of federal directives and legislation.
$65k-88k yearly est. 2d ago
Principal Cloud Security Engineer
Zealotech People
Cyber security analyst job in Washington, DC
Clearance: Active Secret
Employment Type: Full-Time
We are seeking a Principal Cloud Security Engineer to lead the design, automation, and enforcement of security across large-scale federal cloud environments. This role focuses on cloud security architecture, DevSecOps automation, and secure platform enablement in a multi-cloud ecosystem.
The ideal candidate is highly technical, self-directed, and comfortable operating as the senior security authority for cloud platforms. You will define secure patterns, implement guardrails at scale, and embed security directly into infrastructure and CI/CD pipelines.
Key Responsibilities:
Cloud Security Architecture:
Design and guide secure architectures across AWS, Azure, and GCP, including GovCloud and restricted environments
Define and enforce security baselines aligned with NIST 800-53, FedRAMP, and CIS Benchmarks
Lead threat modeling, architecture reviews, and secure design guidance for cloud workloads
DevSecOps & Automation:
Build and maintain Infrastructure as Code using Terraform (preferred) and cloud-native tooling
Integrate automated security controls into CI/CD pipelines (SAST, DAST, IaC scanning, container scanning)
Implement policy-as-code guardrails using tools such as AWS SCPs, Azure Policy, and cloud-native governance services
Develop automated remediation and enforcement workflows to reduce manual security effort
Governance, Compliance & Visibility:
Embed compliance controls directly into cloud infrastructure and pipelines to support ATO efforts
Partner with compliance teams and auditors on evidence collection and continuous monitoring
Implement centralized logging, monitoring, and incident response across cloud environments
Technical Leadership:
Serve as the senior cloud security SME for engineers, architects, and stakeholders
Mentor engineers on secure cloud development and DevSecOps practices
Translate complex security concepts to both technical and non-technical audiences
Required Qualifications:
Active Secret clearance
8+ years in cybersecurity or cloud engineering, including 5+ years focused on cloud security
Deep hands-on experience securing AWS, Azure, or GCP (experience in at least two preferred)
Strong Infrastructure as Code experience (Terraform strongly preferred)
Experience integrating security into CI/CD pipelines (GitHub Actions, GitLab, or similar)
Proficiency in Python, Go, PowerShell, or Bash
Strong understanding of IAM, networking, encryption, key management, and cloud-native security services
Ability to operate independently and define security priorities without daily direction
Preferred Qualifications:
Experience securing GovCloud, DoD IL5/IL6, or other regulated cloud environments
Kubernetes and container security experience
Zero Trust architecture implementation experience
ServiceNow integrations for security workflows
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, etc.)
What Makes This a True Principal Role:
Highly hands-on and deeply technical
Owns security outcomes rather than executing predefined tasks
Heavy DevSecOps and IaC focus
Large-scale, multi-cloud environment
Architecture and influence matter as much as implementation
$84k-117k yearly est. 4d ago
Deputy Information Systems Security Officer (Deputy ISSO) - Secret clearance
RCG, Inc. 4.3
Cyber security analyst job in Suitland, MD
** DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECRET CLEARANCE AND A CISSP**
Location: Suitland, MD - Full-Time, On-Site Salary Range: $130,000 - $140,000 annually
.
Who We Are
RCG is a fast-growing federal contracting firm proudly Certified as a Great Place to Work. We are committed to fostering a culture of innovation, inclusion, and excellence. At RCG, we deliver technology and mission support services that help government agencies succeed.
We are currently seeking a Deputy Information Assurance Engineer / Deputy Information Systems Security Officer (Deputy ISSO) to support our federal government customer in Suitland, MD. This position is fully on-site and supports mission-critical systems within the JPSS/LCCS program.
Please note: Due to the secure nature of this government agency, all candidates must be U.S. Citizens and able to successfully pass the required background investigation.
The Opportunity
This role is ideal for a senior Information Assurance professional who will serve as a Deputy ISSO and team lead, supporting authorization, compliance, and continuous monitoring activities for NOAA JPSS/LCCS systems. The Deputy ISSO will provide leadership to junior ISSOs, maintain system ATOs, and collaborate closely with multiple technical and operational teams to ensure a strong and compliant security posture. The successful candidate will play a key leadership role across A&A, POA&M management, Continuous Monitoring, change control, and incident response activities.
What You'll Do
Deputy ISSO / Team Lead Responsibilities
Serve as Deputy ISSO Team Lead, advising, mentoring, and training junior ISSOs on security and compliance activities.
Provide guidance on RMF, FISMA, and program-level security processes.
JPSS/LCCS A-ISSO Responsibilities
Maintain and support ATO packages for NOAA 5042 and NOAA 5065-1 systems.
Lead Assessment & Authorization (A&A) documentation reviews, updates, and Security Control Assessment (SCA) activities.
Work closely with OMS, LGSS, FVTS, MSC, and GP Security teams to maintain and improve overall program security posture.
Lead weekly cross-contract POA&M and security operations management meetings.
Participate in and vote during Mission Change Control Boards (CCBs) for system modifications.
Lead JPSS/LCCS Continuous Monitoring working group meetings.
Serve as Chair of the program SSID documentation review board.
Assist in incident response activities, working directly with operational and cybersecurity teams.
Maintain strong working relationships with Federal clients, including System Owners, ISSOs, Flight, and Operations personnel.
Required Qualifications
Active Secret clearance (REQUIRED).
Bachelor's degree in a relevant technical field.
Minimum 8 years of experience in Information Assurance, Information Security, or ISSO-related roles.
Demonstrated experience supporting RMF, FISMA, ATO, and Continuous Monitoring activities.
Proven leadership experience mentoring or leading junior security staff.
Strong ability to collaborate across multiple technical, operational, and security teams.
Excellent written and verbal communication skills.
Certifications (Required)
CISSP
Physical Demands
The physical demands described here are representative of those required to successfully perform the essential functions of this role. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions.
EEO Statement
RCG, Inc. does not discriminate against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibits discrimination against all individuals based on race, color, religion, sex, sexual orientation/gender identity, or national origin.
$130k-140k yearly 5d ago
Information Security Engineer
Aarete 4.1
Cyber security analyst job in Vienna, VA
AArete is one-of-a-kind when it comes to consulting firm culture.
We're a global, innovative management and technology consulting firm, with offices in the U.S., India, and the U.K. Our name comes from the Greek word for excellence: "Arete." And excellence is exactly what we strive for.
Our success starts with enriching and empowering our people. From robust career development planning to competitive life and wellness benefits, AArete's "Culture of Care" takes a holistic approach to the employee experience.
AAretians (our team members) are leaders at every level. You are encouraged to unlock your full potential by directly contributing to our mission and prioritizing space for personal development and fulfillment.
The Role
AArete is looking for an Information Security Engineer. You are highly technical with an entrepreneurial spirit and commitment to excellence. You thrive in a team environment and have the ability to flip tasks and priorities midstream because you love an exciting challenge. The bar is set high at AArete. There is a lot to do around here, and you love getting the job done right.
At AArete, we are dedicated to delivering the best experience to our clients every day. We are fresh, passionate, full of energy, and love what we do-providing non-labor cost reduction solutions and impressing our clients with impeccable service.
Work You'll Do
Manage and optimize security technologies, including endpoint protection tools, email security tools, vulnerability scanners, and Siems
Provide support, administration, and maintenance necessary to ensure effective and efficient information technology system performance and security
Identify, analyze, and mitigate threats to internal information technology systems or networks
Maintain baseline system security according to organizational policies
Manage accounts, network rights, and access to systems and equipment
Design access control lists to ensure compatibility with organizational standards, business rules, and needs
Provide ongoing optimization and problem-solving
Analyze data sources to provide actionable recommendations
Assess the validity of source data and subsequent findings
Present technical information to technical and non-technical audiences
Present data in creative formats
Provide actionable recommendations to stakeholders based on data analysis and findings
Oversee installation, implementation, configuration, and support of system components
Answer requests for information
Conduct in-depth research and analysis
Provide input and assist in the development of plans and guidance
Maintain infrastructure within a cloud environment
Other duties as assigned
Requirements
2+ years of experience working in an information security role
Experience with tools such as Sentinel One, Microsoft Defender, Mimecast, Rapid7 IDR, AWS Native Security Services, Microsoft Purview, Microsoft Intune, vRx (Vicarius) or similar
Direct client interaction, including possible travel to client location
Applicants must be based in Chicago, IL, and flexible to work from our Chicago office as needed
Must be legally authorized to work in the United States without the need for employer sponsorship
Preferred Requirements
Technology-focused degree
Professional certifications such as GSEC, SSCP, Security+, SC-200, SC-400 or others
Compensation & Benefits
Flexible PTO, monthly half-day refuels, volunteer time off, 10 paid holidays
Own Your Day flexible work policy
Competitive majority employer-paid benefits: Medical, Dental, Vision, 401K Match
Generous paid parental leave options
Employer paid Life Insurance, STD, LTD
Charitable contribution matching program
New client commission opportunities and referral bonus program
Bike share discount program
The estimated base salary range for this position is $72,000 - $92,000. In addition to this base salary, individuals may be eligible for an annual discretionary bonus. This range is a part of a competitive, total compensation package together with our majority employer-paid benefits and incentive pay for eligible roles. Please note that this range is a guideline and individual total compensation may vary due to numerous factors including but not limited to experience level, certifications, and other relevant business considerations.
AArete will accept applications until the position is filled. The job posting will be removed once the role is no longer available.
We put humans at the center of our work
We're a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and strategy & change for clients. Our cross-industry solutions are powered by a digital-first mindset, market intelligence, and data-driven approach to deliver purposeful change, actionable insights, and guaranteed results.
But what sets us apart is our people. We are guided by our deeply embedded guiding principles: Excellence, Passion, Loyalty to Clients, Stewardship, Family, Community, Sustainability, and Inclusion.
And we've been recognized as a top firm to work for by companies like Forbes, Top Workplaces Chicago Tribune, and Consulting Magazine.
We've earned a Great Place to Work Certification and been named a World's Best Management Consulting Firm by Forbes, Vault's Top 50 Firms to Work For, Crain's Chicago Business Fast 50, Inc 5000's Fastest Growing Firms, and Consulting Magazine's Fastest Growing Firms.
Learn more about our award-winning culture
We are an Equal Employment Opportunity Employer
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
#LI-DNI
$72k-92k yearly 4d ago
Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)
Red Alpha
Cyber security analyst job in Annapolis, MD
A day in the life:
As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to):
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity
Document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
What you bring to the table:
Level 1:
A Bachelor's degree in a technical discipline and 2+ years of relevant experience
Experience in malware analysis
Programming experience in C, C#, Java, Perl or Python is preferred
An active TS/SCI with Polygraph
Level 2:
A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active TS/SCI with Polygraph
Level 3:
A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active US Government TS/SCI security clearance with Polygraph
Bonus Skills:
Level 1:
CISSP, GIAC GREM or CREA Certification is preferred
The total package:
Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves
and
their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information.
Salary Range:
Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself.
Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are:
Level 1: $80,000 - $125,000
Level 2: $120,000 - $160,000
Level 3: $140,000 - $180,000
Level 4: $165,000 - $215,000
Some of our additional perks and benefits include:
Retire sooner than planned:
Get closer to retirement with up to 10% in 401k contributions, immediately vested.
Have a career AND a life:
Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays.
Stay at your best:
As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym!
Keep current on new technologies and technological advancements
: $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships.
Dress in style:
Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc.
Enjoy the culture:
Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more!
Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we
bring digital transformation to the fight!
$165k-215k yearly Auto-Apply 60d+ ago
Intrusion Detection Analyst - 2nd Shift
Govcio LLC
Cyber security analyst job in Washington, DC
GovCIO is currently hiring for a 2nd shift (3pm - 11:30pm) Intrusion Detection Analyst onsite in Washington, DC.
Responsibilities:
Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client
Provides timely and actionable sanitized intelligence to cyber incident response professionals
Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture
Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks
Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership
Qualifications:
Bachelor's with 8+ years of cybersecurity experience (or commensurate experience)
7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs
Working experience of Splunk SIEM. Contractor will have at least two years as a cybersecurity or security operations shift team leader
At least five years' experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $108,310.00 - USD $150,000.00 /Yr.
$108.3k-150k yearly Auto-Apply 4d ago
Intrusion Detection Analyst - 2nd Shift
Govcio
Cyber security analyst job in Washington, DC
GovCIO is currently hiring for a **2nd shift (3pm - 11:30pm)** Intrusion Detection Analyst onsite in Washington, DC. **Responsibilities** + Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client
+ Provides timely and actionable sanitized intelligence to cyber incident response professionals
+ Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture
+ Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks
+ Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership
**Qualifications**
+ Bachelor's with 8+ years of cybersecurity experience (or commensurate experience)
+ 7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs
+ Working experience of Splunk SIEM. Contractor will have at least two years as a cybersecurity or security operations shift team leader
+ At least five years' experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment
**Company Overview**
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
**What You Can Expect**
**Interview & Hiring Process**
If you are selected to move forward through the process, here's what you can expect:
+ During the Interview Process
+ Virtual video interview conducted via video with the hiring manager and/or team
+ Camera must be on
+ A valid photo ID must be presented during each interview
+ During the Hiring Process
+ Enhanced Biometrics ID verification screening
+ Background check, to include:
+ Criminal history (past 7 years)
+ Verification of your highest level of education
+ Verification of your employment history (past 7 years), based on information provided in your application
**Employee Perks**
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
+ Employee Assistance Program (EAP)
+ Corporate Discounts
+ Learning & Development platform, to include certification preparation content
+ Training, Education and Certification Assistance*
+ Referral Bonus Program
+ Internal Mobility Program
+ Pet Insurance
+ Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
**We are an Equal Opportunity Employer.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
**Posted Pay Range**
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an "at-will position" and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
**Posted Salary Range**
USD $108,310.00 - USD $150,000.00 /Yr.
Submit a referral to this job (********************************************************************************************************************************************
**Location** _US-DC-Washington, D.C._
**ID** _2026-7338_
**Category** _Information Technology_
**Position Type** _Full-Time_
$108.3k-150k yearly 11d ago
Intrusion Analyst
Synergy ECP
Cyber security analyst job in Columbia, MD
Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security.
In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our Employees, to our Customers and by Improving Performance (ECP).
It's what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results - showing we're ready to meet our customers' evolving demands.
Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services.
Synergy ECP is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected class.
Requirements
A Bachelor's degree and 5 years of relevant experience or a Master's degree plus 3 years of relevant experience or a Doctoral degree and 2 years of relevant experience. An Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
CISSP, CEH, Sec+, Net+, GIAC, GREM, or CREA Certification is required.
Relevant experience must be in malware analysis. Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources.
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis.
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs).
Develop and implement mitigation strategies.
Have a network and/or host-based focus.
$80k-112k yearly est. 60d+ ago
Visual Imagery Intrusion Detection System (VIIDS)
Siertek
Cyber security analyst job in Andrews Air Force Base, MD
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
$80k-112k yearly est. 60d+ ago
Visual Imagery Intrusion Detection System (VIIDS)
Siertek Ltd.
Cyber security analyst job in Andrews Air Force Base, MD
Job Description
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
$80k-112k yearly est. 28d ago
Network Security Analyst
Cymertek
Cyber security analyst job in Annapolis, MD
Network SecurityAnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information SecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
How much does a cyber security analyst earn in Pasadena, MD?
The average cyber security analyst in Pasadena, MD earns between $65,000 and $117,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Pasadena, MD
$87,000
What are the biggest employers of Cyber Security Analysts in Pasadena, MD?
The biggest employers of Cyber Security Analysts in Pasadena, MD are: