Senior Cyber Security Analyst jobs at General Dynamics - 2978 jobs
Information Systems Security Officer (ISSO) II
General Dynamics Information Technology 4.7
Senior cyber security analyst job at General Dynamics
**Req ID:** RQ212016 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Information Security,Information Security Management,Information System Security
**Certifications:**
GICSP: Global Industrial CyberSecurity Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC), Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco
**Experience:**
2 + years of related experience
**US Citizenship Required:**
Yes
**Job Description:**
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
+ Assist the ISSM in meeting their duties and responsibilities
+ Prepare, review, and update authorization packages
+ Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
+ Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
+ Conduct periodic reviews of information systems to ensure compliance with the security authorization package
+ Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
+ Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
+ Ensure all IS security-related documentation is current and accessible to properly authorized individuals
+ Ensure audit records are collected, reviewed, and documented (to include any anomalies)
+ Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
+ Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans
+ Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures for them
+ Prepare reports on the status of security safeguards applied to computer systems
+ Perform ISSO duties in support of in-house and external customers
+ Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
+ 2+ years related experience
+ SAP experience **required**
+ Prior performance in roles such as System, Network Administrator, or ISSO
Education:
+ Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
+ IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.)
Security Clearance:
+ TS/SCI required
+ Must be able to Attain - TS/SCI with CI Polygraph
Other Requirements:
+ Must be able to regularly lift up to 50lbs
\#AirforceSAPOpportunities
The likely salary range for this position is $86,615 - $117,185. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at ********************
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$86.6k-117.2k yearly 7d ago
Looking for a job?
Let Zippia find it for you.
Acquisition Security Analyst
Mantech 4.5
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 5d ago
Senior Information System Security Officer
Mantech 4.5
Huntsville, AL jobs
MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama.
Responsibilities include, but are not limited to:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Provide liaison support between the system owner and other IS security personnel
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters
Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes
Minimum Qualifications:
Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience.
Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Preferred Qualifications:
A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline
Clearance Requirements:
Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position.
Selected candidate must be willing to undergo a Polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
Often positions self to maintain computers in the lab, including under the desks and in the server closet
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Duration: 11+ Months Contract
Contract
Interview Type: In-person
Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work).
Requirement ID: NYC_OT735_SS
contact Sandeep @ **********************
Job Description
Justification:
This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases.
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
Note:
Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum.
SCOPE OF SERVICES:
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered
At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety.
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats.
Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls.
DESIRABLE SKILLS/EXPERIENCE:
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant.
Please share my contact information with others working in Information Technology.
$81k-109k yearly est. 1d ago
Security Analyst
Matlen Silver 3.7
Charlotte, NC jobs
Title: SecurityAnalyst
Duration: 1 year, contract to hire
Environment: 5 Days onsite (NON NEGOTIABLE)
Pay: $52-$65/hour W2 (NO C2C)
** Due to client requirements, US Citizen or Green Card Holders ONLY**
Requirements:
Minimum 7+ years of professional related experience
Previous experience in financial services, banking, wealth management, credit card, or payment processing: preferably in enterprise level environment
Lead and drive cybersecurity initiatives across a range of projects, balancing scope, priorities, and business needs while operating in a fast-paced, multi-tasking environment.
Bring strong hands-on experience with Identity Governance and Administration (IGA) platforms such as SailPoint, Saviynt, Oracle Identity Governance (OIG), or ForgeRock, with the ability to identify and resolve access and security issues.
Apply strong analytical skills to work with complex data, including writing SQL queries, Python, and shell scripts to extract, analyze, and validate information from databases and file systems.
Design, build, and maintain meaningful dashboards and metrics that provide insight into security posture, performance, and operational effectiveness.
Collaborate closely with IAM teams, business users, and leadership to remediate issues, improve processes, and support access governance objectives.
Mentor and train junior analysts, helping to improve workflows, consistency, and overall team capability.
Nice to have: 7+ years of experience with any IGA Platforms
Responsibilities:
This project focuses on reviewing user access on a daily basis to confirm it aligns with established controls and application requirements. The team works closely with application owners and business partners to address access issues, follow through on remediation, and escalate items when needed. Team members are supported and coached on the process to ensure work is completed accurately and consistently. Overall, the effort helps maintain strong access governance while keeping day-to-day operations running smoothly.
$52-65 hourly 2d ago
DevOps and Security Engineer
Comrise 4.3
Miami, FL jobs
Job Posting Title DevOps & Security Engineer
We are looking for a DevOps & Security Engineer to maintain and secure our Web3 stablecoin infrastructure. You will be responsible for overall server architecture, security hardening, node maintenance, and CI/CD deployments to ensure 24/7 system reliability for both our off-chain systems and on-chain nodes.
Location: Miami, Florida (temporarily remote, with future hybrid in-office requirements)
Key Responsibilities:
Manage day-to-day operations of company infrastructure including servers, cloud services, and container platforms.
Maintain critical node services including RPC services and oracle components.
Establish security protocols and implement host/network security hardening (WAF, security groups, firewalls)
Oversee service monitoring, log analysis, troubleshooting, and capacity planning.
Build and maintain CI/CD pipelines using GitHub Actions/GitLab CI
Manage Docker and Kubernetes clusters.
Administer certificates, TLS, VPN, and IAM permission systems.
Conduct regular vulnerability scans, coordinate penetration tests, and manage patch updates.
Undertake ad hoc projects as we continue to grow.
Qualifications:
3+ years of experience in DevOps, infrastructure, or security roles.
Strong Linux administration skills with substantial experience in troubleshooting and performance tuning.
Proficiency with Docker/Kubernetes, Nginx, load balancing, and logging systems (ELK/EFK).
Solid understanding of network security concepts: VPC, ACL, WAF, DDoS protection, firewalls, zero-trust.
Experience with at least one major cloud platform (AWS/GCP/Azure).
Scripting skills in Shell, Python, or Go.
$73k-101k yearly est. 1d ago
Network Security Lead (Telecom GRC)
Optomi 4.5
Chantilly, VA jobs
Network Security Lead (Telecom Compliance Specialist) - Onsite in Chantilly, VA or Charlotte, NC*
Optomi, in partnership with a Fortune 50 company, is looking to add a Network Security Lead to help drive Telecom-related compliance initiatives. The Network Security Lead will help safeguard the National Public Safety Broadband Network for first responders, ensuring robust cybersecurity compliance across a mobility ecosystem (LTE, 5G Core, RAN infrastructure, OSS/BSS systems, mobile apps, and IoT deployable devices).
This role starts off as a full-time contract to hire role on W2 (benefits like medical, dental and 401K are offered through Optomi during the contract duration).
Required Expertise
Telecom & Mobility: LTE, 5G, VoIP; familiarity with 3GPP standards and protocols (SS7, SIGTRAN, Diameter, SIP).
Virtualization & Cloud: OpenStack, Docker, Kubernetes; experience with hybrid physical/virtual environments.
Security Tools: Vulnerability scanning, EDR, patch management, and monitoring aligned with NIST guidelines.
Networking: Proficiency in Wireshark, tcpdump, Cisco IOS, BGP, OSPF, VLANs, QoS.
Certifications: CISSP, CISM, CRISC (preferred)
Experience with government contracts and mobility security standards (preferred)
Knowledge of encryption technologies and zero-trust frameworks (preferred)
M.S. in Cybersecurity, Telecommunications, Computer Science, or related field (or equivalent experience) preferred
Key Responsibilities
Cybersecurity Oversight: Lead compliance and security control validation for FirstNet mobility components, including RAN, Core, and associated management systems.
Risk & Compliance Management: Align with regulatory frameworks (3GPP, ETSI, NIST, ISO/IEC 27001) and coordinate internal audits, risk assessments, and incident response processes.
Architecture & Governance: Drive zero-trust principles, encryption standards, and identity management across virtualized and cloud-native environments.
Vendor Security Assurance: Oversee compliance for mobility vendor products (Ericsson, Nokia, Cisco) supporting RAN and Core functions.
Technical Leadership: Evaluate security controls for networking, APIs, and emerging technologies (network slicing, edge computing, AI-driven threat detection).
Cross-Functional Collaboration: Partner with engineering and program teams to identify and mitigate cybersecurity gaps during deployments.
This role is looking for someone who is able to work fully onsite in either Chantilly, VA or Charlotte, NC*
$79k-126k yearly est. 3d ago
Cyber Intrusion Analyst
AMS Technologies 4.3
Hawaii jobs
AMS Technologies is a leader in providing technological solutions tailored to meet the ever-changing needs of our customers. We pride ourselves on delivering scalable, customer-focused, and cost-effective solutions that drive success in complex environments.
Summary
As a CybersecurityAnalyst at AMS Technologies, you will play a crucial role in safeguarding our clients' information systems. This position is vital for ensuring the security and integrity of our technological solutions, allowing us to maintain our commitment to excellence and customer satisfaction.
PRIMARY RESPONSIBILITIES:
Detect, analyze, and respond to computer network incidents by identifying anomalous activities that may pose threats to the enterprise.
Monitor security tools and applications for suspicious activity, investigate alerts, and recommend appropriate mitigation strategies.
Analyze subtle (“low and slow”) events to uncover unauthorized actions using problem-solving and self-learning techniques.
Conduct near real-time event triage and analysis, leading to network traffic validations or incident reporting to Mission Partners.
Follow established policies and utilize DoD-approved network monitoring and traffic analysis tools to identify suspicious or malicious traffic around the clock.
Review and analyze logs promptly to detect intrusions and formally notify Mission Partners of findings through incident reports.
Develop, apply, and fine-tune countermeasures to prevent or reduce cyber event impacts.
Perform detailed network traffic analysis using raw packet data, net flow, IDS/IPS, and custom sensor outputs to protect communication networks.
Maintain a thorough understanding of attack signatures, tactics, techniques, and procedures used by advanced threats.
Document all events and analyses clearly in a ticketing system, requiring strong technical writing skills.
Communicate effectively with customers and team members, with regular face-to-face interactions and ongoing coordination.
BASIC QUALIFICATIONS:
Active DoD Top Secret clearance required.
Bachelor's Degree plus 4+ years of relevant experience; relevant cyber courses, certifications, or DISA customer experience may substitute for the degree.
Current DoD 8570 IAT Level II Certification (e.g., Security+ CE) or higher at start.
Current DoD 8570 CSSP Analyst Certification (e.g., CEH, CySA+), or ability to obtain within 180 days of start.
Experience performing Computer Network Defense (CND) duties, including Protect, Defend, Respond, and Sustain.
Experience working with DoD and government leadership at multiple levels.
Strong knowledge of computing systems and networking, including protocols and security elements like IDS/IPS and firewalls.
Experience analyzing packet captures.
PREFERRED QUALIFICATIONS:
Proficiency in command-line scripting (PERL, Python, Shell) for automating analysis tasks.
Understanding of hacker tactics, techniques, and procedures (TTP).
Familiarity with security frameworks such as MITRE ATT&CK and Cyber Kill Chain.
Experience monitoring intrusion detection systems and defense tools (e.g., Splunk, Elastic) and analyzing associated alerts.
Knowledge of advanced threat actor tactics and software exploits.
Ability to analyze packed and obfuscated code.
If you are passionate about cybersecurity and eager to make a difference in a dynamic environment, we invite you to apply today and join our team at AMS Technologies!
Talent @ AMS
AMS Technologies
Please contact us with any questions:
Email:
******************************
$80k-99k yearly est. Easy Apply 60d+ ago
SOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)
Akira Technologies Inc. 4.1
Norfolk, VA jobs
Akira Technologies is seeking a CyberAnalyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $75,000 to $100,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
$75k-100k yearly Auto-Apply 15d ago
SOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)
Akira Technologies Inc. 4.1
Norfolk, VA jobs
Akira Technologies is seeking a CyberAnalyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $75,000 to $100,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
$75k-100k yearly Auto-Apply 60d+ ago
SOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)
Akira Technologies Inc. 4.1
Norfolk, VA jobs
Job Description
Akira Technologies is seeking a CyberAnalyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $75,000 to $100,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
$75k-100k yearly 26d ago
Network Security Analyst / Network Engineer/ System Admin
Collabera 4.5
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
$83k-112k yearly est. Easy Apply 19h ago
Network Security Analyst / Network Engineer/ System Admin
Collabera 4.5
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
$83k-112k yearly est. Easy Apply 60d+ ago
Network Security Analyst
Collabera 4.5
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network SecurityAnalyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
$75k-101k yearly est. 19h ago
Network Security Analyst
Collabera 4.5
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network SecurityAnalyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
$75k-101k yearly est. 60d+ ago
Network Sniffer Analysis
E*Pro 3.8
McLean, VA jobs
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-115k yearly est. 19h ago
Network Sniffer Analysis
E Pro Consulting 3.8
McLean, VA jobs
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email: [email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-115k yearly est. 60d+ ago
Network Security Analyst with CCIE and Juniper (L2 Support)
Tekskills 4.2
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
$63k-91k yearly est. 19h ago
Network Security Analyst with CCIE and Juniper (L2 Support)
Tekskills 4.2
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
$63k-91k yearly est. 60d+ ago
Sr. Information Assurance Analyst
Dkw Communications Inc. 4.6
California jobs
Come Join Our Team! DKW Communications, Inc. (DKW) is a government contractor providing professional and technical services to various government agencies i.e. defense, law enforcement and security. We are currently looking for an
Senior Information Assurance Analyst
to join our winning team. The individual hired for this position will provide support for our government customers located in the Greater San Diego area. This is an onsite position.
Overview
The IA Analyst will support our NAVY SWMFTS contract, and be responsible for duties such as (but not limited to):
Collect and maintain data needed to meet system cybersecurity reporting
Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
Participate in an information security risk assessment during the Security Assessment and Authorization process.
Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
Recognize a possible security violation and take appropriate action to report the incident, as required
Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
Provide technical documents, incident reports, and findings from computer examinations, summaries, and other situational awareness information to higher headquarters
Develop and maintain RMF Assess and Authorize documentation required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS)
Run vulnerability assessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe
Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM)
Qualifications/Requirements
MUST have or be able to obtain an active Secret Security Clearance.
Minimum of Bachelor's Degree in Computer Science, Information Systems or a relevant technical discipline.
An Associate's degree + 3 years of experience may be substituted for degree requirement.
3-5 years of cybersecurity experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of computer/network security mechanisms.
Must have an IAT Level II Certification or higher.
**All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.**