Cyber Security Analyst - Full time must include working one weekend day (Sunday)
Cyber security analyst job in Washington
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Event Security, Security Audit, Splunk (Inactive)
Certifications:
None
Experience:
8 + years of related experience
US Citizenship Required:
Yes
Job Description:
Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday)
Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow.
At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT
Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information.
Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations.
Identify acceptable use policy infractions.
Review event logs to determine events of interest.
Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).
Prepare case evidence and incident reports.
Work on special projects as assigned.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.
DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date.
DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date.
Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph
Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems
Saturday and Sunday weekend Day Shift work required.
Willing to work holidays supporting your assigned shift.
Location: 100% On Customer Site
Bolling AFB, Washington D.C.
Reston, VA
Colorado Springs, CO
Riverdale, MD
Pearl Harbor, HI
Tampa is available for part time weekend only support
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
Less than 10%
Telecommuting Options:
Onsite
Work Location:
USA DC Washington
Additional Work Locations:
USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyCyber Analyst
Cyber security analyst job in Washington
Knight Federal Solutions is a trusted provider to industry leading prime contractors, the Department of Defense and the Intelligence Community. We have established a company culture that supports our employees, their families and the communities in which they live and work. When you join our team you belong to a group of people that work hard, strive for greatness and care about people.
Our hard work is evident in everything we do. Whether it be supporting large government programs in the areas of Simulation and Training, Information Technology, Intelligence or Engineering we always strive to be the best. It is for this reason that we have been recognized as a World Class Team Supplier by Northrop Grumman and were also named one of Florida's fastest growing companies by Inc. Magazine.
As Knight Federal Solutions continues to grow, we look forward to hiring the best and the brightest to join us in our success!
Responsibilities
Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature.
Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements.
Support the Mobility & Sustainment team
Requirements
3+ years of experience producing all-source intelligence analysis reports and briefings and input to IC databases
Experience with all-source intelligence analysis and production on foreign national cyber military capabilities and foreign use of cyberspace, including but not limited to doctrine, intent, operations, supporting services and infrastructure, and vulnerabilities
Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings
Knowledge of IC and Combatant Command environments
Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings
TS/SCI clearance, willingness to take a CI polygraph
Bachelor's degree, or 7+ years of experience in all-source analysis in lieu of a degree
Preferred
3+ years of experience with transportation and logistics systems, including railroads, roads/highways, bridges, storage facilities, ports, and airfields
TS/SCI with a CI Polygraph
Experience with network development tools and methods
Knowledge of ICD 203/206 analytic tradecraft standards
Knowledge of the COMBATANT COMMANDS
Knight Federal Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, sex, gender identity, sexual orientation, pregnancy, age, national origin, physical or mental disability, military or veteran status, genetic information or any other protected classification.
Senior Cyber Defense Incident Responder
Cyber security analyst job in Washington
M9 Solutions is dedicated to providing IT services and solutions to the Federal Government by mobilizing the right people, skills, clearance levels, and technologies to help organizations who desire improved performance and modern, sustainable change. M9 has provided quality IT services and support to more than 30 Federal Agencies and multiple commercial customers nationwide. Our capabilities include digital transformation, software development, cloud migration, applications & infrastructure, cybersecurity, data delivery & analytics, and IT talent solutions.
M9 Solutions is seeking a Senior Cyber Defense Incident Responder to work on-site in support of a government contract for a client located in Washington, DC. An active TS/SCI clearance is required.
Responsibilities
Facilitates and coordinates with leadership to provide expert technical support to the enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Correlates incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation to any attacks within the client networks.
Respond to cyber incidents as necessary and act as a liaison between entities with internal and external stakeholders within the organization.
Collects intrusion artifacts (e.g., source code, malware, trojans) and uses discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Performs analysis of log files from a variety of sources to identify possible threats to network security.
Performs cyber defense incident triage, to include determining scope, urgency, and potential impact, identifies the specific vulnerability, and makes recommendations that enable expeditious remediation.
Performs cyber defense trend analysis and reporting.
Assists in Incident Response processes and in the enhancement of behavioral analytics, including the development of Concept of Operations and Standards Operating Procedures.
Develops and maintains models for cyber threat mitigation and improves threat modeling.
Uses behavior analytics (UBA) and ensures all infrastructure components meet proper performance standards.
Coordinates and provides expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Coordinates incident response functions.
Monitors external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
Performs cyber defense trend analysis and reporting.
Performs initial, forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems.
Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts.
Writes and publishes after-action reviews.
Writes and publishes cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
Assists junior Incident Response Technicians in their tasks.
Required Skills and Qualifications
TS/SCI security clearance.
Bachelor's degree in a related field.
8 years of relevant experience. In lieu of some experience, industry certifications can be substituted.
Proven experience conducting incident response and forensic investigations within large, complex enterprise environments, including analysis of malware, logs, and network traffic to identify and mitigate threats.
Strong understanding of cyber threat intelligence, behavioral analytics, and security operations processes, with the ability to develop and document standard operating procedures and after-action reports.
Full-Time Employee Compensation
M9 Solutions' pay range for this position is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include, but are not limited to, responsibilities of the position, education, experience, knowledge, skills, abilities, as well as internal equity, location, alignment with market data, applicable bargaining agreement (if any), or other law.
M9 Benefits - *************************************************
Salary Range
$60,000 - $180,000 USD
M9 Solutions, LLC (M9) is a Federal contractor and we comply with all applicable federal laws prohibiting discrimination in employment, including Title VII of the Civil Rights Act of 1964. We also adhere to the affirmative action requirements of the Vietnam Era Veterans' Readjustment Assistance Act (VEVRAA) and Section 503 of the Rehabilitation Act, ensuring equal opportunity for veterans and individuals with disabilities. Please click here to complete M9's Voluntary Self-Identification Form and then email it to ******************. If you need accommodation during the application process or encounter difficulties using our website, please contact our Human Resources Department at ****************** or ************.
With 14+ years of proven delivery and steady growth, M9 Solutions is a unique small business with credible past performance and key capabilities offering project management services, solution architects, business analysts, program managers, technical architects, and technical consultants. M9 was recognized as an Inc. 5000 Fastest-Growing Private Companies in 2021, 2020, 2019, 2018, 2017, 2016, and 2012. M9 Solutions believes that work should be fun, rewarding, and something everyone can be excited about. We offer a competitive compensation package and value diversity in driving the vision of the company.
F 7.2-27 | REV - 8 | 022525
Auto-ApplyCyber Security Analyst
Cyber security analyst job in Seattle, WA
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplySenior Cyber Intrusion Detection Analyst
Cyber security analyst job in Washington
A Senior Cyber Intrusion Detection Analyst is needed to provide advanced incident response and monitoring support. This is a hybrid position based in Washington, D.C., covering 5th shift work (7am7pm Saturday & Sunday, Friday 11pm7am, and Tuesday 7am3pm).
Responsibilities
Respond to cyber incidents, including SOC incident response calls and emails.
Serve as Subject Matter Expert (SME) in investigations escalated from SOC Tier I & II analysts.
Investigate phishing attempts and other potential cyber threats.
Collaborate with SOC federal staff and Incident Handlers to triage, contain, and remediate incidents.
Participate in Splunk engineer working groups to improve alerting rules and reduce false positives.
Work closely with Threat Hunt and Security Intelligence teams to strengthen SOC capabilities.
Follow established incident response procedures, while identifying process improvement opportunities.
Manage incidents involving enterprise systems and sensitive data, including PII breaches.
Detect, collect, analyze, and report cybersecurity incidents.
Investigate and remediate malware infections.
Analyze a variety of logs and alerts (firewall, IDS, malware, HIPS, PCAP, proxy, Windows/Active Directory, etc.) to identify anomalous activity and document findings.
Conduct advanced log and malicious code reviews to support containment and recovery.
Assist with cybersecurity workforce development by reviewing tickets and annotations.
Required Qualifications
Bachelors degree with 8+ years of cybersecurity experience (or equivalent).
At least 6 years of intrusion detection examination experience.
Experience with a wide range of security technologies and logging data, including WANs, IPS/IDS/HIPS, web logs, raw data logs, and event reviews.
Strong knowledge of Splunk SIEM with 3+ years of advanced analytics experience (queries, Grep skills, firewall ACL review, Snort IDS events, PCAPs, and web server logs).
Strong written and verbal communication skills.
One or more advanced certifications, such as:
CERT Certified Computer Security Incident Handler
CEH (Certified Ethical Hacker)
CISSP
GCIH (Certified Incident Handler)
GISF (Information Security Fundamentals)
Clearance
Must be able to obtain and maintain a Public Trust clearance.
Working Place: Washington, D.C., District of Columbia, United States Company : 2025 Sept 11 Virtual Career Fair - GovCIO
Information System Security Officer - (ISSO)
Cyber security analyst job in Washington
Envisioneering, Inc. is seeking an Information Systems Security Officer (ISSO) to support an active government contract. This position will be responsible for the following:
Lead the RMF process for assigned programs, organizations, systems, or enclaves.
Maintain and report system's A&A status and events.
Manage the SP for assigned systems throughout their lifecycle.
Perform annual security reviews, annual testing of security controls, and annual testing of the contingency plan, in line with FISMA requirements.
Manage POA&M entries and ensuring vulnerabilities are properly tracked, mitigated, and resolved.
Assist with identification of the security control baseline set and any applicable overlays.
Supervise the validation of security controls with the PM/ISO, SCA Liaison, PSO, and AO CSA.
Assemble the Security Authorization Package and submit for adjudication.
Register and maintain the system in eMASS.
Assess the quality of security control implementation against all requirements in accordance with the approved SLCM strategy.
Plan and perform cybersecurity testing to assess security controls and recording security control compliance status during sustainment.
Report changes in the security posture of systems to the AO.
Utilize the Collaboration Board in eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).
Assist the ISSMs in executing their duties and responsibilities.
Ensure compliance with all USN, DON, and DoD cybersecurity policies.
Ensure all users possess the requisite security clearances and awareness of their responsibilities for systems under their purview prior to being granted access.
Ensure an incident response, business continuity, disaster recovery, as well as vulnerability and threat reporting plans and channels are in place and that team members are trained accordingly.
Ensure relevant policy and procedural documentation is current and accessible to properly authorized individuals.
Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).
Assist the ISSE with the following responsibilities:
Oversee the development and maintenance of a system's cybersecurity solutions.
Identify AO and SCA cognizance (i.e. FAO or NAO, and FSCA or SCA) of the system as well as any specific authorization requirements such as reciprocity, cross domain, and applicable overlays to support System Categorization.
Identify mission criticality.
Identify and tailor the security control baseline with applicable overlays.
Assist with development, maintenance, and tracking of the SP.
Lead the security control implementation and testing efforts.
Perform vulnerability-level risk assessment on the POA&M/RISK Assessment Worksheet.
Assist with any security testing required as part of A&A or annual reviews.
Assist in the mitigation and closure of open vulnerabilities under the system's change control process.
Oversee cybersecurity testing to assess security controls and recording security control compliance status during the continuous monitoring phase of the lifecycle.
Make data entries into the eMASS record and POA&M consistent with implementation results.
Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).
Rework shall be documented and provided to the PSO/PMO for review.
Assist the ISSM with the following responsibilities:
Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs).
Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
Advise senior management (e.g., CIO) on risk levels and security posture.
Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.
Collect and maintain data needed to meet system cybersecurity reporting.
Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
Ensure security improvement actions are evaluated, validated, and implemented as required.
Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.
Identify alternative information security strategies to address organizational security objective.
Identify information technology (IT) security program implications of new technologies or technology upgrades.
Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
Manage the monitoring of information security data sources to maintain organizational situational awareness.
Oversee the information security training and awareness program.
Participate in an information security risk assessment during the Security Assessment and Authorization process.
Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
Provide system related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
Recognize a possible security violation and take appropriate action to report the incident, as required.
Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.
Track audit findings and recommendations to ensure appropriate mitigation actions are taken.
Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle.
Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals.
Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.
Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
Forecast ongoing service demands and ensure security assumptions are reviewed as necessary.
Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.
Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.
Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.
Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
Establish overall enterprise information security architecture (EISA) with the organization's overall security strategy.
Evaluate cost benefit, economic, and risk analysis in decision making process.
Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.
Interpret and/or approve security requirements relative to the capabilities of new information technologies.
Lead and align information technology (IT) security priorities with the security strategy.
Lead and oversee information security budget, staffing, and contracting.
Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.
Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure they provide the intended level of protection.
Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.
Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.
Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.
Recommend policy and coordinate review and approval.
Use federal and organization-specific published documents to manage operations of their computing environment system(s).
Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.
Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.
Requirements
MINIMUM SKILLS / QUALIFICATIONS:
Must have and maintain a DoD Top Secret Clearance.
15+ years of technical and managerial experience in system administration and information security/cybersecurity.
CISSP, CISM, or other DOD 8570.01-M IAM Level 3 certification.
Bachelor's degree with a concentration in a related discipline (e.g., information security, cybersecurity, information technology)
Self-motivated and the ability to multi-task and balance multiple goals and priorities.
Must be familiar with DOD Risk Management Framework (RMF) policies, standards, procedures and have relevant experience with associated tools (e.g., eMASS, XACTA 360, Assured Compliance Assessment Solution (ACAS), Anchore, DISA Security Technical Implementation Guides (STIGs), SCAP Compliance Checker (SCC), STIG Viewer, eMASSter, Eval STIG).
Education:
Bachelor's degree with a concentration in a related discipline (e.g., information security, cybersecurity, information technology).
CISSP, CISM, or other DOD 8570.01-M IAM Level 3 certification.
SALARY RANGE: $100,000.00 - $180,000.00
Benefits: Envisioneering, Inc. offers a stable work environment, a competitive salary, and a comprehensive benefits package including 401k, Medical/Dental/Vision, FSA, Short Term, Long Term, AD&D and Life insurance, (employer paid), voluntary life, Tuition Reimbursement, Paid Leave, Holidays and much more.
As a condition of employment: You must pass a drug and pre-employment drug screening. U.S. Citizenship Required. Candidate must follow all company and non-DOT Drug and Alcohol Testing. A Department of Defense (DoD) Top Secret security clearance is at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Please confirm in your cover letter or resume.
Blue Team DART - Senior Security Analyst
Cyber security analyst job in Seattle, WA
We exist to wow our customers. We know we're doing the right thing when we hear our customers say, "How did we ever live without Coupang?" Born out of an obsession to make shopping, eating, and living easier than ever, we're collectively disrupting the multi-billion-dollar e-commerce industry from the ground up. We are one of the fastest-growing e-commerce companies that established an unparalleled reputation for being a dominant and reliable force in South Korean commerce.
We are proud to have the best of both worlds - a startup culture with the resources of a large global public company. This fuels us to continue our growth and launch new services at the speed we have been since our inception. We are all entrepreneurs surrounded by opportunities to drive new initiatives and innovations. At our core, we are bold and ambitious people that like to get our hands dirty and make a hands-on impact. At Coupang, you will see yourself, your colleagues, your team, and the company grow every day.
Our mission to build the future of commerce is real. We push the boundaries of what's possible to solve problems and break traditional tradeoffs. Join Coupang now to create an epic experience in this always-on, high-tech, and hyper-connected world.
Role Overview
As our Cyber Security Incident Response Team (CSIRT) for our Seattle office, you will be a part of our special forces within the BlueTeam. You must have a calm and collected mannerism in high-pressure and time sensitive situations, think like both an attacker and defender, and work with relevant teams to take the right and timely actions to analyze, respond and neutralize attacks.
The BlueTeam is responsible for the detection and response to credible threats. We work hands-on developing detective capabilities, identifying mitigations to vulnerabilities and respond to potential threats to Coupang systems. BlueTeam CSIRT Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis.
The Senior Security Engineer position requires an experienced CSIRT personnel that have expert working knowledge in IR, investigation and hunt techniques, root-cause security flaws and vulnerabilities, quickly assessing the potential cyber threats. Security Engineers are also expected to develop elegant solutions to complex problems and apply appropriate technologies while following security engineering best practices.
What You Will Do
Analyze and respond to security anomalies, intrusion attempts, and breaches, and root cause analysis, containment, creating the report
Threat hunting to find undetected security threat from the SOC using data from end points, servers, clouds, network and other sources
Ticket review, and security analysis escalated from SOC
Improvement of incident response policies and procedures, and process of SOC. - Analyze and respond to Web security events by CDN security solutions (e.g. Akamai, CloudFlare)
Analyze and respond to Email Security events
Oncall to response urgent security events or security issues
Collaborate effectively with internal teams through efficient communication
Minimum Qualifications
Bachelors Degree in Computer Science or a related technical field or equivalent professional experience.
2 years of experience in information Security with experience in Cyber Security Incident Analysis
Preferred Qualifications
8+ years of experience in information security with at least 5+ years as a Cyber Security Incident Analyst
Experience of Host based security investigation (Windows, Linux, Network/Security appliances)
Experience of analyzing security event and knowledge of AWS or Cloud environment
Experience of analyzing security event from Web security solutions (Akamai, CloudFlare)
Experience of analyzing security event from network security and SaaS solutions (IPS/IDS, Network Monitoring solutions, Email Security, O365, etc)
Experience of analyzing security event from endpoint security solutions (EDR, HIPS, Anti-Virus, DLP, etc)
Experience and skills querying SIEM Solutions for analyzing security events from the logs
Skill to analyze big data or big size logs
Experience in Automation and Scripting using Bash, Python, PowerShell
Proactive and proactive work attitude
Pay & Benefits
Our compensation reflects the cost of living across several US geographic markets. At Coupang, your base pay is one part of your total compensation. The base pay for this position ranges from $108,000/year in our lowest geographic market to $232,000/year in our highest geographic market. Pay is based on several factors including market location and may vary depending on job-related knowledge, skills, and experience.
General Description of All Benefits
Medical/Dental/Vision/Life, AD&D insurance
Flexible Spending Accounts (FSA) & Health Savings Account (HSA)
Long-term/Short-term Disability
Employee Assistance Program (EAP) program
401K Plan with Company Match
18-21 days of the Paid Time Off (PTO) a year based on the tenure
12 Paid Holidays
Paid Parental leave
Pre-tax commuter benefits
MTV - [Free] Electric Car Charging Station
General Description of Other Compensation
"Other Compensation" includes, but is not limited to, bonuses, equity, or other forms of compensation that would be offered to the hired applicant in addition to their established salary range or wage scale.
Coupang is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or gender (including pregnancy, gender identity, gender expression, sexual orientation, transgender status), national origin, age, disability, medical condition, HIV/AIDS or Hepatitis C status, marital status, military or veteran status, use of a trained dog guide or service animal, political activities, or affiliations, citizenship, or any other characteristic or class protected by the laws or regulations in the locations where we operate.
If you need assistance and/or reasonable accommodation in the recruiting process due to a disability, please contact us at ************************.
Requisition # R0064937
Auto-ApplyInformation Systems Security Officer (ISSO) Senior
Cyber security analyst job in Washington
Avint LLC is seeking a highly motivated, solution-oriented, and customer-focused Information Systems Security Officer (ISSO) III to join our growing team. We are looking for a senior-level ISSO who is confident working independently and demonstrates deep technical and operational expertise.
**This position is 100% on-site
1750 Pennsylvania Ave, Washington, DC***
Requirements
Responsibilities:
Provide subject matter expertise to ensure compliance with Treasury, DHS, and NIST cybersecurity policies and frameworks.
Support the implementation and sustainment of security controls in alignment with the NIST Risk Management Framework (RMF).
Responsibility for and to assist system owners in maintaining system Authorization to Operate (ATO) status.
Enhance Treasury's ability to measure, report, and manage cybersecurity posture and control effectiveness at a maturity level consistent with OIG FISMA Metrics Level 4 (“Managed and Measurable”).
Strengthen collaboration and information sharing across internal Treasury offices and external partners to support cybersecurity risk reduction and resilience.
Position Requirements:
US citizen without dual citizenship
Ability to obtain a Public Trust clearance
Currently possess at least 8570 IAT II certification
Thorough knowledge of and experience with executing the seven key steps of the Risk Management Framework (RMF)
Thorough knowledge of and experience with completing the components of a FedRAMP system package, to include the System Security Plan (SSP) and the Control Implementation Summary (CIS)/Customer Responsibilities Matrix (CRM)
Experience with security control implementation statement development and testing
Familiarity with AI-based systems
Benefits
Joining Avint is a win-win proposition! You will feel the personal touch of a small business and receive BIG business benefits. From competitive salaries, full health, and generous time off and Federal Holidays. Additionally, we encourage every Avint employee to further their professional development. To assist you in achieving your goals, we offer reimbursement for courses, exams, and tuition. Interested in a class, conference, program, or degree? Avint will invest in YOU and your professional development!
Salary range $115,000-125,000
Auto-ApplySenior Cloud Security Analyst
Cyber security analyst job in Washington
GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud Security Analyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position
Minimum Qualifications
Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience.
Preferred Qualifications
4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling
Work Schedule
Monday - Friday, 8am - 5pm (occasional evenings and weekends)
Information Systems Security Officer (ISSO)
Cyber security analyst job in Washington
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation Systems Security Officer (ISSO)
Cyber security analyst job in Washington
Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
Description of Task to be Performed:AnaVation is seeking a mid-level ISSO for our mission critical customer in Washington, DC. You will work as part of a highly talented team providing security compliance expertise on high priority projects. Daily duties include, but are not limited to:· Developing, maintaining, and assessing Security Assessment & Authorization (SA&A) packages resulting in an authority to operate (ATO) for IT systems.· Creating and maintaining SSPs and supporting documentation in accordance with agency guidelines and directives. This includes writing implementation statements, creating supporting documentation (e.g., contingency Plans, Incident Response Plans, Account Management Plans, etc.), and performing self-assessments, while working with system stakeholders.· Develop, coordinate, test, and train personnel on Incident Response Plans and Contingency Plans.· Ensuring that information systems are accredited, maintain their ATO, and are being continuously monitored.· Performing risk assessments for government systems, to include cloud-based systems.· Performing security control assessments to include collecting supporting artifacts/evidence and interviewing system owner/owner representatives.· Having an in-depth knowledge of the Risk Management Framework (RMF).· Maintaining and tracking system POA&Ms.· Conducting vulnerability management and analysis.· Reviewing and analyzing government policy.· Improving on processes and procedures and making recommendations to improve the security posture of the agency's IT systems and applications.
This position requires a Top-Secret clearance with SCI eligibility and the ability to obtain a CI Poly. This position is on-site in Washington DC with no remote option.Required Qualifications:
Bachelor's in Computer Science, or other related analytical, scientific, or technical discipline
4+ years' experience with NIST, FISMA, and Security Assessment & Authorization.
Knowledgeable on various security-related NIST publications (e.g., SP 800-53r5, SP 800-53A, SP 800-18r1, etc.)
In-depth knowledge of information security principles, methodologies, and best practices.
Experience in conducting risk assessments and implementing security controls.
Proficiency in using security tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability management tools.
Knowledge of incident response procedures.
Obtain a CI Poly.
Can be on-site 5 days a week.
Preferred Qualifications:
Desirable Qualifications (Education/Certificates, Experience, Physical, etc.):
Certifications: CISSP
FedRAMP and Cloud experience (e.g., Azure, AWS, Oracle (OCI))
Hands-on experience using a Governance, Risk, and Compliance tool, such as CSAM or eMASS.
Ability to conduct gap analysis on non-federated vendor audit results, such as SOC Type 2, HIPAA comparison review and analyst against NIST SP 800-53 Revision 5 security controls.
Ability to accurately manage complex workstreams, comprehend the application of the RMF, and understand the application of security controls across the interface, application, operating system, network, and database layers of modern information systems. Understand the applicable artifacts used as evidence to assess compliance.
Experience with multiple tools providing security functions such as vulnerability management (e.g., Nessus), configuration management (e.g., BigFix, SCCM, ePO), endpoint protection (e.g., antivirus, ATP), data loss prevention, and intrusion detection software and hardware.
Ability to evaluate data flows, network diagrams, and logical security boundaries.
Familiarity with the use of data analysis tools, including the use of Microsoft Excel or PowerBI to combine data from multiple sources.
Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance
About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team.
If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you!
AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
Auto-ApplyInformation Systems Security Officer
Cyber security analyst job in Washington
Business Operational Concepts (BOC) is a recognized leader in providing Technical and Program Management Services, Information Technology, and Support.
BOC has enabled their Government and Commercial clients to achieve their organizational initiatives through the application of high quality, innovative, and cost-effective professional services and solutions. We provide a positive working environment, with opportunities for advancement in our growing Federal sector workforce.
We offer an excellent compensation package which includes a generous salary, insurance (medical, dental, etc.), paid leave, 401k plan and more. We are committed to the diversity we bring to the marketplace and believe customer satisfaction comes first.
JOB SUMMARY:
Business Operational Concepts (BOC) is currently seeking an Information Systems Security Officer (ISSO) to work with our government client. The selected candidate will serve as a technical and governance subject matter expert responsible for integrating cybersecurity risk management with system and infrastructure engineering. This position bridges the traditional gap between GRC and technical implementation by ensuring security is designed, implemented, and continuously monitored throughout the system development life cycle (SDLC).
DUTIES AND RESPONSIBILITIES:
The incumbent collaborates with system owners, developers, cloud and DevSecOps engineers, and security control assessors to ensure the confidentiality, integrity, and availability of agency information systems in alignment with federal requirements (e.g., FISMA, NIST RMF, FedRAMP, and OMB guidance).
Requirements
QUALIFICATIONS:
Required (Minimum) Qualifications - Education, Certification, Experience, and Skills
Risk Management and Governance (40%)
Serve as the primary technical lead for system-level RMF activities, including security categorization, control selection, implementation, and assessment.
Develop and maintain system security documentation (SSPs, SARs, POA&Ms) and ensure continuous authorization (O-ATO) compliance.
Conduct risk assessments to identify vulnerabilities, evaluate likelihood and impact, and recommend mitigation strategies.
Support annual FISMA audits, OIG reviews, and internal compliance assessments with defensible technical evidence.
Develop standardized risk metrics and dashboards that link system vulnerabilities to enterprise risk posture.
Security Engineering and Architecture Integration (35%)
Embed security engineering practices into system design and cloud architectures, ensuring 'security-by-design' and 'Zero Trust' principles.
Partner with system engineers and developers to integrate security controls in CI/CD pipelines, automation scripts, and infrastructure-as-code deployments.
Validate security control implementations through technical testing, configuration review, and vulnerability analysis.
Conduct secure architecture reviews and provide technical consultation on encryption, access control, and network segmentation.
Collaborate with SOC and vulnerability management teams to ensure findings inform risk posture and remediation planning.
Continuous Monitoring and Technical Validation (15%)
Develop and maintain continuous monitoring strategies and implement automated data feeds from scanners, SIEM, and cloud tools into GRC systems.
Validate and verify that implemented controls are operating as intended and produce desired security outcomes.
Track and report control effectiveness and residual risks to leadership.
Policy, Audit, and Training Support (10%)
Support updates to cybersecurity policy, SOPs, and agency guidance to reflect emerging threats and technologies.
Provide training and mentoring to system owners and developers on secure design and RMF requirements.
Support external audits by providing technical explanations and evidence of control effectiveness.
Knowledge, Skills, and Abilities (KSAs)
Security Engineering: Knowledge of systems design, cloud infrastructure, encryption, access control, and secure configuration management.
Risk Management: Knowledge of the principles and tools used for risk assessment and mitigation.
Compliance & Governance: Expertise in NIST SP 800-37, SP 800-53, SP 800-53A, FIPS 199/200, FedRAMP, and OMB A-130.
Vulnerability Management: Ability to analyze vulnerability data, interpret scanning results, and evaluate technical mitigations.
Automation & Tools: Familiarity with GRC platforms (e.g., Archer, ServiceNow IRM, Xacta) and technical tools (e.g., Nessus, Splunk, AWS Config, Prisma).
Communication: Skill in articulating technical risks and recommendations to both executive and technical audiences.
Collaboration: Ability to partner effectively across multidisciplinary teams including developers, engineers, and policy staff.
U.S. Citizenship required.
Active Public Trust or higher clearance (or ability to obtain).
Bachelor's degree in Computer Science, Information Systems, Engineering, or equivalent experience.
3-5 years of experience in security engineering, GRC, or cybersecurity risk management.
Preferred Qualifications - Education, Certification, Experience, Skills, Knowledge, and Abilities
Desired Certifications: CISSP, CISM, CAP, CGRC, CEH, Security+, or Cloud Security certifications
CLEARANCE REQUIREMENTS:
Public Trust or the ability to obtain and maintain a Public Trust clearance. (Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.)
Information System Security Officer (ISSO)
Cyber security analyst job in Washington
Who We're Looking For (Position Overview):This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.What Your Day-To-Day Looks Like (Position Responsibilities):
Serve as the principal cybersecurity advisor to system owners and stakeholders.
Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions.
Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities.
Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability.
Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments.
Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO).
Responsible for ensuring operational security is maintained for assigned information systems.
Ensure systems are operated, maintained, disposed of in accordance with security policies and practices.
Perform Security Incident Reporting and Response.
Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process.
Ensure audits and reviews are responded to with accurate information.
Perform system access control responsibilities.
Participate in the change management process for assigned applications.
Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle.
Perform continuous system security monitoring.
Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management.
Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented.
Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures.
Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan.
Responsible for ensuring the implementation and maintenance of annual security controls assessments.
Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations.
Working directly with development, platform, and infrastructure teams on security problems.
What You Need to Succeed (Minimum Requirements):
Top Secret (TS) Clearance with SCI eligibility.
3 - 5 years of experience required.
Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA.
Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure.
Analyze logs using Splunk and AWS tools.
Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk.
Work with GRC tools such as Xacta/JCAM
Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP
Experience using Atlassian suite tools such as JIRA/CONFLUENCE
Experience with Agile Methodologies/SAFe
Expertise on Information Security Principles, processes and guidelines
Able to obtain and maintain an Authority to Operate (ATO) for Information Systems.
Experience with scanning tools such as Tenable Nessus
Ability to work on multiple projects with various timelines, at times very short deadlines.
Ideally, You Also Have (Preferred Qualifications):
Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security - Specialty, or other relevant certifications.
Experience in a high-side or multi-enclave (U/S/TS) environment.
Experience working with Agile development teams and CI/CD pipelines.
Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible).
Familiarity with NIST 800-53 Rev. 5
#CJ
Auto-ApplySenior Security Analyst
Cyber security analyst job in Seattle, WA
Join us in stopping bad bots, for good! Kasada protects millions of online users everyday. Founded to stop automated bot attacks, we believe the internet should be a safe place for everyone. Bad bots are highly destructive. They take over accounts, steal content, overload systems and infrastructure and cause billions of dollars in damages every year. Seeking to restore trust in the internet, Kasada stops bots at the very first request including those that have never been seen before.
We've grown from a few friends working out of a shipping container under the Sydney Harbour Bridge to now operating globally, we're spread across the world protecting some of the most well-known brands on the face of the earth.
We're an innately curious team that's not afraid to bring bold ideas to create better ways of solving problems. We're looking for people who are passionate about solving some of the most difficult and pressing cybersecurity issues, while having fun doing it!
The Role
We're currently on the lookout for a Senior Security Analyst to join our Security Operations team, focused on taking on complex and high impact unwanted automation for our customers. This role will require you to act as an escalation point for other analysts, handle investigations end to end, and contribute to improving our investigative methods and tooling. Your experience in a similar role in a cyber security environment will be highly regarded.
This position will allow you to apply your analytical skills in the fight against bad bots. Working with some of the world's biggest companies, you'll help reduce the damage caused by unwanted automation, while sharing your expertise and supporting our team.
This is a remote role, to ensure timezone overlap with our Australia-based team candidates should be located on the West Coast. What you will be doing;
Lead complex investigations and in-depth analysis of automated software activity within customer environments, driving cases to resolution.
Act as an escalation point for incident response and threat detection, providing expert guidance on challenging or ambiguous cases.
Apply and optimise a range of investigative tools and techniques to uncover patterns, anomalies, and root causes.
Collaborate across teams to provide clear, actionable advice on complex investigations and contribute to improving detection and response processes.
What you will bring;
Demonstrable, recent experience in cybersecurity or IT security roles.
Significant experience identifying and mitigating security risks in a web application or similar environments.
Solid understanding of security frameworks, incident response methodologies, and threat intelligence.
Familiarity with analytical security tools (e.g., Splunk, ElasticSearch, SQL, NoSQL databases).
Solid knowledge of web technologies (TCP stack, HTTP/S, WebSockets, Browser Architectures, Operating Systems)
Subject matter knowledge and awareness of automated cyber security attacks and/or bot groups.
Relevant certifications (e.g., CISSP, CISM, CEH, Bachelors degree in a relevant field) are desirable but not essential.
Critical and analytical mindset with proven ability to make sound, timely judgments.
$140,000 - $175,000 a year The Benefits of being a Kasadian
We want to ensure Kasada remains a great place to work and a place to do great work. It's important to us to build an inclusive environment where you can realize your full potential. We are a highly collaborative team regardless of location, placing a strong emphasis on our core values; and we have designed our benefits package so you can thrive, both inside and outside of work:
- A stake in Kasada's global success with equity/stock options - Flexible working hours and arrangements - Create a schedule that suits you - Support for growing families - Generous parental leave allowances and resources to help in the lead up, during and after parental leave. - Resources for well-being to support your growth including our EAP - confidential counselling for you and your loved ones - Birthday leave - Wellness leave - An action packed calendar of fun in-person and virtual events
Sound interesting? What's next?
Hit the apply button and one of our team will set up an exploratory, confidential discussion. We have designed our hiring process to be streamlined and thorough so everyone can make the right call on whether it is the right move for you. We are an inclusive team and this extends to all candidates that interview with us. Interviews are conducted virtually however if you want to come onsite - just ask! When you apply, please tell us the pronouns you use and any adjustments you may need during the interview process, we want to ensure you are set up for success in every conversation.
Still with us? Just a little bit more…
Research shows that women and other marginalized individuals tend to only apply when they check every box. We're always keen to broaden our perspective, so if you think you have what it takes, but don't necessarily meet every single point above, please still get in touch, we'd love to have a chat and see if you could be a great addition to the team!
Please note: Kasada is an e-verify employer (US based applicants only)
Auto-ApplyInformation Security Specialist (Cyber security analysis)
Cyber security analyst job in Bellevue, WA
Job Title: “Information Security Specialist” (Cyber security analysis)
Duration: 9+ Months (with high possibility of extending into full time)
Job Description:
This position is in Corporate Information Security and under the direction of the Manager, Third-Party Cybersecurity Assessments. The Cybersecurity Assessment Analyst will perform cybersecurity assessments on new and existing third parties. The Analyst will construct detailed and summary reports of assessments, including customized reports, as needed. The Analyst will work with Subject Matter Experts (SME) to develop and apply risk assessment criteria (aligned with Policy) to new and existing suppliers using internal and external business intelligence. The Analyst will work with Third-Party Risk Management, Privacy and Legal Counsel, Procurement and Contract Managers, Compliance, and Business Owners to develop and maintain an internal service model that informs the business of key risks in a timely manner to limit unnecessary impediments and avoid bureaucracy.
Specific responsibilities:
- Coordinate the development of information security policies, standards and procedures. Work with key IT offices, data custodians and governance groups in the development of such policies. Ensure that company policies support compliance with external requirements. Oversee the dissemination of policies, standards and procedures to the user community
- Coordinate the development and delivery of an education and training program on information security and privacy matters for employees, other authorized users, and vendors
- Serve as the company compliance officer with respect to state and federal information security policies and regulations. Work with the -designated internal audit, SOX compliance, legal, and HR on compliance issues as necessary. Prepare and submit and submit required reports to external agencies.
- Develop and implement an Incident Reporting and Response System to address security incidents (breaches), respond to alleged policy violations, or complaints from external parties.
- Serve as the official company contact point for information security, privacy and copyright infringement incidents, including relationships with law enforcement entities.
- Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing.
Required Qualifications:
Talent management, results focus and inspirational leadership.
Essential Functions
• Conduct third-party cybersecurity risk assessments, applying established criteria
• Support assessment team with quality assurance reviews over work product and reporting
• Collaborate with internal partners and third parties to mitigate and otherwise resolve third-party cyber risks
• Consistently deliver on commitments, deadlines and objectives while remaining in scope and leveraging appropriate tools, methods, frameworks, and professional standards
• Demonstrate consistent credibility with business partners and leadership while recommending initiatives, identifying gaps, and potential issues
• Continuously demonstrate the ability to work independently while representing the services of the department with the highest level of professionalism
• Demonstrate the ability to appropriately influence business decisions, and the professional judgment for selecting the appropriate methods and techniques to do so
Preferred Qualifications:
• Solid background both educationally and via professional experience. No less than 3 years' professional experience in business operations, project/program management, finance, risk management, information security, business analytics or similar.
• Experience in large companies and/or complex environments, or providing professional consulting services for them.
• Demonstrated abilities in problem-solving and analysis: identifies issues, analyses information to assess root cause and relationships, risks, and potential risk responses. Proven ability to synthesize and summarize complex data into concise recommendations and reports.
• Demonstrated strong business writing and professional oral communication skills.
• Proven ability to balance multiple priorities, adapt to a constantly changing business environment, work independently, drive projects to completion, and meet deadlines in a fast-paced environment-with only periodic supervision.
• Ability to work collaboratively and manage and initiate effective cross-functional relationships.
• Strong computer skills, including MS Office products (e.g. Word, Excel, PowerPoint, Visio) and other business software to prepare reports, memos, summaries, and analyses.
Desired
• Analytical - Synthesizes complex or diverse information; Collects and researches data; employs intuition and experience to complement data; Designs work flows and procedures.
• Quality Management - Looks for ways to improve and promote quality; Demonstrates accuracy and thoroughness. Applies feedback to improve performance; Monitors own work to ensure quality
• Planning/Organizing - Prioritizes and plans work activities to achieve success; Sets and achieves goals and objectives; Develops realistic action plans
• Professionalism - Reacts well under pressure; Keeps commitments; Accepts responsibility for own actions.
• Career Growth: Focus on cyber security auditing with potential advancement goals in engineering or threat analysis roles
• Self-directed team player with Agile environment experience
Education
Minimum Required
• Bachelor's Degree
• Equivalent experience is acceptable.
License or Certification
Desired: (one of the following):
CISA (Certified Information Systems Auditor)
GSEC (GIAC Security Essentials Certification)
CompTIA - Security+
ECSA - EC-Council Certified Security Analyst
SSCP (Systems Security Certified Practitioner)
Other:
Six Sigma, PMP or Agile certificates
Other comments - suppliers:
Organizational skills; office suite knowledge; and good communication skills are “must haves”. Cyber security analysis experience is preferred.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Engineer, Information Security and Risk
Cyber security analyst job in Olympia, WA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer, Operating Systems
Cyber security analyst job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyInformation Systems Security Officer
Cyber security analyst job in Camas, WA
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security
posture for information systems and as such, works in close collaboration with the ISSM, CPSO, and FSO. The
ISSO must have detailed knowledge and expertise required to manage the security aspects of an information
system and is assigned the day-to-day responsibility for assigned systems. Responsibilities include
implementation of the requirements of Risk Management Framework, including the Joint Special Access
Program (SAP) Implementation Guide (JSIG), NIST 800-53, or other security requirements as assigned.
This position will report to the Corporate Information Assurance Manager and work in close collaboration with
the AFSO and FSO. The ISSO is responsible for developing and updating the security authorization package, managing and controlling changes to the system, and assessing the security impact of those changes.
Ensure systems are operated, maintained, and disposed of following security policies and procedures as outlined
in the security authorization package.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Monitor system recovery processes to ensure security features and procedures are properly restored and
functioning correctly.
Ensure audit records are collected, reviewed, and documented.
Duties also include physical and environmental protection, personnel security, and incident handling.
DUTIES & RESPONSIBILITIES
Lead the information system security program for their assigned location to include implementation and
validation of automated informational security, ensuring security requirements as contracted are
satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current
DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring,
trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by
local employees
Conduct system audits in accordance with security accreditation package requirement
Lead the information system security program for their assigned location to include implementation and validation of automated informational security, ensuring security requirements as contracted are satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
Conduct system audits in accordance with security accreditation package requirements
Conduct vulnerability scans and analysis
Conduct maintenance on the networks, systems, and hardware
Perform software upgrades on networks, systems, and hardware
Perform security assignments in accordance with the Automated Information System requirements and local regulations
Understand and follow NISPOM/ODAA/RMF/JAFAN/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 4 years' experience in related field
DoD 8570 compliant, IAT Level II
Experience with Windows based administration of Information Systems
Ability to work within compliance standards; previous experience with RMF, HIPAA , PCI DSS, or
equivalent compliance standard preferred
Strong experience in networking, active directory, centralized logging solutions, vulnerability scanning
and anti-virus solutions
Experience with security audits for information systems
Strong communication and problem-solving skills
Ability to work in both a team environment as well as independently
Must be organized and detail oriented
Ability to obtain and maintain Top Secret clearance with the ability to obtain approval for SAP/SCI access
DESIRABLE
Have previous experience with DoD Security Regulations and Policies
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership
Information Security Compliance Specialist
Cyber security analyst job in Washington
Responsibilities:
Conduct Security Assessment and Authorization (A&A) support for IT systems
Conduct Security A&A documentation review
Update IT Security Compliance SOPs
Monitor and report on FISMA Compliance activities
Conduct Plan of Action and Milestone (POA&M) management and quality control activities and ensure accuracy of the organization's Security A&A tool.
Support Ongoing Authorization (OA) by review of the security controls
Working Place: Washington D.C., District of Columbia, United States Company : Sept 25 - Tria
Information Security Analyst
Cyber security analyst job in Bellevue, WA
Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients.
Visit our website: http://www.aditistaffing.com/
Job Description
Role: Information Security Analyst
Location: Information Security Analyst
6-8 years of experience in information security / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups.
Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established.
While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the information security and privacy program.
Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls.
Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines.
Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls).
Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required.
Good to Have:
Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems
Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools
Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus
Experience in developing and administering an information security program desirable
Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable
Additional Information
Regards,
Arun Kumar R
arunkr(AT)aditistaffing.com
D: 425-457-7916