Cyber Security Analyst jobs at Huntington Ingalls Industries - 71 jobs
Information Assurance Engineer - Majestic - 26731
Huntington Ingalls Industries 4.3
Cyber security analyst job at Huntington Ingalls Industries
Search by Keyword (use Keyword for Remote Positions)
Select how often (in days) to receive an alert:
Information Assurance Engineer - Majestic - 26731
Required Travel: 0 - 10%
Employment Type:Full Time/Salaried/Exempt
Anticipated Salary Range:$75,791.00-$140,000.00
Security Clearance:TS/SCI
Level of Experience:Mid
This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems.
HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII's Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you.
HII's Mission Technologies division is dedicated to delivering cutting‑edge solutions that advance national security and defense objectives. This position is part of our Cyber and Intelligence division, which plays a critical role in supporting Enterprise‑Level Security and Modernization efforts across IT infrastructure, cybersecurity, physical facilities, and personnel operations.
The selected candidate will contribute to a high‑impact government program focused on enhancing and securing mission‑critical systems and environments. The program is scheduled to launch in early 2026 and due to the classified nature of the mission and the sensitivity of the operational environment, an active TS/SCI security clearance will be required.
Information Assurance Engineer 1: $71,735 - $101,106
Information Assurance Engineer 2: $85,371 - $118,529
Information Assurance Engineer 3: $104,519 - $140,599
Information Assurance Engineer 4: $120,472 - $172,103
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter‑espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).
Assesses and mitigates system security threats and risks throughout the program life cycle.
Validates system security requirements definition and analysis.
Implements security designs in hardware, software, data, and procedures.
Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities.
Supports secure systems operations and maintenance.
Minimum Qualifications
Information Assurance Engineer 1: 0 years experience with Bachelors in related field; or High School Diploma or equivalent and 4 years relevant experience.
Information Assurance Engineer 2: 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience.
Information Assurance Engineer 3: 5 years relevant experience with Bachelors in related field; 3 years relevant experience with Masters in related field; or High School Diploma or equivalent and 9 years relevant experience.
Information Assurance Engineer 4: 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; or High School Diploma or equivalent and 13 years relevant experience.
Relevant industry certifications (as applicable)
Prior experience in defense, aerospace, or government contracting
Proficiency with specialized tools or software aligned to the role
Demonstrated ability to work collaboratively in multidisciplinary teams
Active TS/SCI government security clearance required to start, candidate must willing to obtain and maintain a CI poly
Physical Requirements
Job performance will normally require only minor lifting and carrying of boxes of records or equipment.
The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.
Together we are working to ensure a future where everyone can be free and thrive.
All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Do You Need Assistance?
If you need a reasonable accommodation for any part of the employment process, please send an e‑mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
#J-18808-Ljbffr
$120.5k-172.1k yearly 2d ago
Looking for a job?
Let Zippia find it for you.
Cyberspace Defensive Analyst 1
Huntington Ingalls Industries 4.3
Cyber security analyst job at Huntington Ingalls Industries
Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $73,193.00 - $85,319.00 Security Clearance: TS/SCI with Poly Level of Experience: Entry Level This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems.
HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII's Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you.
To learn more about Mission Technologies, click here for a short video: ***************************
Job Description
Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today's rapidly changing, multi-domain global security threats, and anticipate emerging threats.
Our cyber professionals are on the cutting edge of cyberspace operations, delivering cyberspace options and effects for our nation in an ever-changing threat environment. Our experts provide a full range of expertise and capabilities across the spectrum of cyberspace operations. We are an integral part of an important mission -- we go to work every day with the knowledge and pride that our accomplishments make a difference.
Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst in support of an exciting new effort supporting one of our clients that is responsible for unifying the direction of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertise.
This is a pipeline requisition intended to gather interest from candidates with this skill set for future opportunities. While there may not be an active opening at this time, we encourage you to apply so we canreach out when a matching role becomes available.
Minimum Qualifications
Bachelor's Degree in Information Systems Management, Computer Science, or related discipline.
This role may involve a non-traditional work schedule. Candidates must demonstrate flexibility and be prepared to work off-shift hours, including evenings, weekends, and holidays, to support 24/7 operations.
Must possess an active TS/SCI/Polygraph for consideration
Preferred Requirements
3 years of experience to include but not limited to:
+ Coordinating network defense operations with DOD Component Commands/Services/Agencies/Field Activities or Intelligence Agencies or Law Enforcement, or U.S. Government organizations.
+ Performing research and analysis of cybersecurity capabilities to satisfy data protection requirements.
+ Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities including web content filters, and email security.
+ Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports.
+ Engaging with FCC or DIB on network protection.
The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.
Together we are working to ensure a future where everyone can be free and thrive.
All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Do You Need Assistance?
If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
$73.2k-85.3k yearly 35d ago
Computer Network Defense Analyst (CNDA) Level 2
Aerovironment 4.6
Jessup, MD jobs
The primary role of the Computer Network Defense Analyst (CNDA) level 2 is to be on the front lines of protecting critical systems, applying your expertise in cybersecurity, network defense, and traffic analysis to detect, respond, and prevent threats.
Position Responsibilities
Design and develop computer or information systems, including programming and network/cybersecurity solutions.
Conduct vulnerability analysis, penetration testing, computer forensics, and information assurance.
Perform systems engineering and network/system administration.
Analyze data from multiple sources (intrusion detection systems, firewalls, traffic logs, host system logs) to: Identify potential vulnerabilities, Respond to active cyber events, and Defend against emerging threats
Basic Qualifications (Required Skills & Experience)
Bachelor's in Computer Science, Network Engineering, Information Technology or related STEM discipline or equivalent combination of education, and experience
Minimum 5+ years of relevant experience
An active TS/SCI with polygraph
Salary Range: $95,000 - $130,000
The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
Clearance Level
Top Secret with Poly
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
U.S. Citizenship required
$95k-130k yearly Auto-Apply 36d ago
Cyber Security Operations Analyst
Explorer Pipeline 4.1
Tulsa, OK jobs
The CyberSecurity Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.)
DUTIES AND RESPONSIBILITIES
The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary.
1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action.
2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies.
3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team.
4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking.
5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting.
6. Assists with internal and external audits by collecting necessary documentation and evidence.
7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles.
8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs.
9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance.
10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists.
11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions.
12. Participates in a scheduled on-call rotation for after-hours and weekend security support.
REQUIREMENTS
· Associate's degree or the equivalent in experience in CyberSecurity, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress).
Knowledge, Skills and Abilities
· Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company.
· Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements.
· Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration.
· Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools.
· Knowledge of TSA security requirements and regulations.
· Knowledge of identity management processes and procedures.
· Skill in project management.
· Ability to manage, track and analyze information.
· Ability to effectively work and cooperate with supervisors, co-workers, and vendors.
· Ability to follow corporate policies and the directions of supervisors.
· Ability to refrain from causing or contributing to the disruption of the workplace.
$87k-113k yearly est. 51d ago
Cyber Security Operations Analyst
Explorer Pipeline Corporation 4.1
Tulsa, OK jobs
The CyberSecurity Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.)
DUTIES AND RESPONSIBILITIES
The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary.
1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action.
2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies.
3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team.
4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking.
5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting.
6. Assists with internal and external audits by collecting necessary documentation and evidence.
7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles.
8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs.
9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance.
10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists.
11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions.
12. Participates in a scheduled on-call rotation for after-hours and weekend security support.
REQUIREMENTS
* Associate's degree or the equivalent in experience in CyberSecurity, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress).
Knowledge, Skills and Abilities
* Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company.
* Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements.
* Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration.
* Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools.
* Knowledge of TSA security requirements and regulations.
* Knowledge of identity management processes and procedures.
* Skill in project management.
* Ability to manage, track and analyze information.
* Ability to effectively work and cooperate with supervisors, co-workers, and vendors.
* Ability to follow corporate policies and the directions of supervisors.
* Ability to refrain from causing or contributing to the disruption of the workplace.
$87k-113k yearly est. 7d ago
Senior Information Systems Security Officer
Aerovironment 4.6
Jessup, MD jobs
The Senior Information Systems Security Officer will provide aid to the program, organization, system, or enclave's information assurance program. In this position the individual will lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
Position Responsibilities:
Assist security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF).
Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
Manage changes to system and assesses the security impact of those changes.
Perform vulnerability/risk assessment analysis to support certification and accreditation.
Provide configuration management (CM) for information system security software, hardware, and firmware.
Prepare and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
Basic Qualifications (Required Skills & Experience):
Bachelor's degree in an IT-related or similar relevant field is required or equivalent combination of education, training, and experience
Twelve (12) years of related work experience - at least 7 years of experience as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity
DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate)
An active TS/SCI with polygraph
Salary Range: $120,000 - $175,000
The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
Clearance Level
Top Secret with Poly
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
U.S. Citizenship required
$120k-175k yearly Auto-Apply 36d ago
Cyber Security Engineer
The McPherson Companies 4.4
Trussville, AL jobs
As a CyberSecurity Engineer working in tandem with an outsourced segment of the SOC providing incident response, and event management you will be responsible for analyzing and responding to incidents; executing incident response plans, preparing incident reports; communicating findings to management; evaluating security technologies to support cutting edge security monitoring and response; working closely with all departments to ensure policies and procedures are effectively implemented and utilized. Providing cybersecurity engineering, administration, configuration, hardening, operation, monitoring, documentation, and remediation of cybersecurity systems, corporate infrastructure, endpoints, and processes. This position reports directly to the Director of IT/CSO.
Primary Responsibilities and Duties:
Identify, validate, and remediate security vulnerabilities detected in The McPherson Companies corporate infrastructure and endpoints
Support and monitor The McPherson Companies current endpoint and network security platforms (HIPS, HIDS, on-premises firewalls, Anti-Virus/Anti-Malware, Email security, Mobile Device Management, etc.)
Support and monitor the external outsourced SOC platform.
Assist IT staff in the procurement, testing, implementation, and configuration of new security controls
Assist IT staff in updating and security patching to corporate infrastructure and endpoints
Assist with responding to, and managing, any Security Information Gathering (SIG) questionnaires, any required compliance audits and/or maturity assessments from 3rd parties.
Educate end users on cybersecurity best practices and manage our cybersecurity awareness training and phishing assessment programs
Compile reports as needed detailing current operational status of security measures utilized by company
Investigate potential security violations and breaches and provide recommendations to management. Perform analysis to determine root causes of any incident
Assist IT staff in testing and updates of the Business Continuity Plan
Assist with the design, development, documentation, and enforcement of new and existing information security processes, procedures, and policies
Provide computer system audits to ensure the highest level of security and data protection
Maintain up-to-date knowledge on current security practices and tools
Position Requirements:
You have at least 3+ years experience in an endpoint security, network security, or general security-focused IT support role
BS in Computer Science or Information Security preferred
Experience with planning, researching and developing security policies, standards and procedures
Experience working within ITIL frameworks with specific knowledge of Change Management standards and procedures
Proven experience with the following:
Windows administration
Active Directory and Group Policy
Management of firewall hardware platforms
Applications used for network management and/or monitoring
Security orchestration and automation tools and technologies
Server/client communications, data center architecture, and network topology
Proven experience with incident response technologies and methodologies
Knowledge of configuration and operation of the Windows/Linux Operating systems.
Application whitelisting and enterprise anti-malware (Configuration/management/rule writing)
SIEM log analysis and correlation
Ability to analyze forensic and static malware
Must have strong research/analysis skills
Understanding of the MITRE ATT&CK framework preferred
Demonstrated ability to create complex scripts, develop tools, or automate processes
Security certifications (ex: GSEC, OSCP, CISSP, Security+) is a plus
Position Competencies:
Ability to work independently as well as with a team.
Ability to work in a fast-paced environment, performing multiple duties/tasks within defined deadlines.
Proven experience identifying problems of varying complexities and finding effective solutions with few guidelines.
Responsive to the needs of customers internal and external.
Sense of urgency and commitment with strong follow up skills.
Proven precision and attention to detail with a high level of accuracy.
Demonstrate a professional and positive attitude in all internal and external customer interactions.
Excellent interpersonal skills, written and verbal communication, and listening skills.
Self-driven and motivated individual with excellent planning and organizational skills.
Display proficiency with Microsoft Office Word, Outlook, PowerPoint, etc.
Working Environment:
The work of this position is performed in an environmentally controlled office environment. This position requires the ability to work under pressure and communicate with a diverse population including other employees, customers, vendors, etc. This position also requires prolonged periods of sitting in a regular seated position as well as the use of general office equipment including phones, printers, computers, (mouse, keyboard etc.)
The job description of the CyberSecurity Engineer is not inclusive and is subject to changes, additions, and deletions as determined by the supervisor.
The McPherson Companies, Inc. is an Equal Opportunity Employer M/F/Vets/Disabled.
$77k-96k yearly est. 9d ago
Cyber Security Engineer
The McPherson Companies 4.4
Trussville, AL jobs
As a CyberSecurity Engineer working in tandem with an outsourced segment of the SOC providing incident response, and event management you will be responsible for analyzing and responding to incidents; executing incident response plans, preparing incident reports; communicating findings to management; evaluating security technologies to support cutting edge security monitoring and response; working closely with all departments to ensure policies and procedures are effectively implemented and utilized. Providing cybersecurity engineering, administration, configuration, hardening, operation, monitoring, documentation, and remediation of cybersecurity systems, corporate infrastructure, endpoints, and processes. This position reports directly to the Director of IT/CSO.
Primary Responsibilities and Duties:
Identify, validate, and remediate security vulnerabilities detected in The McPherson Companies corporate infrastructure and endpoints
Support and monitor The McPherson Companies current endpoint and network security platforms (HIPS, HIDS, on-premises firewalls, Anti-Virus/Anti-Malware, Email security, Mobile Device Management, etc.)
Support and monitor the external outsourced SOC platform.
Assist IT staff in the procurement, testing, implementation, and configuration of new security controls
Assist IT staff in updating and security patching to corporate infrastructure and endpoints
Assist with responding to, and managing, any Security Information Gathering (SIG) questionnaires, any required compliance audits and/or maturity assessments from 3rd parties.
Educate end users on cybersecurity best practices and manage our cybersecurity awareness training and phishing assessment programs
Compile reports as needed detailing current operational status of security measures utilized by company
Investigate potential security violations and breaches and provide recommendations to management. Perform analysis to determine root causes of any incident
Assist IT staff in testing and updates of the Business Continuity Plan
Assist with the design, development, documentation, and enforcement of new and existing information security processes, procedures, and policies
Provide computer system audits to ensure the highest level of security and data protection
Maintain up-to-date knowledge on current security practices and tools
Position Requirements:
You have at least 3+ years' experience in an endpoint security, network security, or general security-focused IT support role
BS in Computer Science or Information Security preferred
Experience with planning, researching and developing security policies, standards and procedures
Experience working within ITIL frameworks with specific knowledge of Change Management standards and procedures
Proven experience with the following:
Windows administration
Active Directory and Group Policy
Management of firewall hardware platforms
Applications used for network management and/or monitoring
Security orchestration and automation tools and technologies
Server/client communications, data center architecture, and network topology
Proven experience with incident response technologies and methodologies
Knowledge of configuration and operation of the Windows/Linux Operating systems.
Application whitelisting and enterprise anti-malware (Configuration/management/rule writing)
SIEM log analysis and correlation
Ability to analyze forensic and static malware
Must have strong research/analysis skills
Understanding of the MITRE ATT&CK framework preferred
Demonstrated ability to create complex scripts, develop tools, or automate processes
Security certifications (ex: GSEC, OSCP, CISSP, Security+) is a plus
Position Competencies:
Ability to work independently as well as with a team.
Ability to work in a fast-paced environment, performing multiple duties/tasks within defined deadlines.
Proven experience identifying problems of varying complexities and finding effective solutions with few guidelines.
Responsive to the needs of customers internal and external.
Sense of urgency and commitment with strong follow up skills.
Proven precision and attention to detail with a high level of accuracy.
Demonstrate a professional and positive attitude in all internal and external customer interactions.
Excellent interpersonal skills, written and verbal communication, and listening skills.
Self-driven and motivated individual with excellent planning and organizational skills.
Display proficiency with Microsoft Office Word, Outlook, PowerPoint, etc.
Working Environment:
The work of this position is performed in an environmentally controlled office environment. This position requires the ability to work under pressure and communicate with a diverse population including other employees, customers, vendors, etc. This position also requires prolonged periods of sitting in a regular seated position as well as the use of general office equipment including phones, printers, computers, (mouse, keyboard etc.)
The job description of the CyberSecurity Engineer is not inclusive and is subject to changes, additions, and deletions as determined by the supervisor.
The McPherson Companies, Inc. is an Equal Opportunity Employer - M/F/Vets/Disabled.
$77k-96k yearly est. 8d ago
Cyber Security Engineer
The McPherson Companies, Inc. 4.4
Trussville, AL jobs
General
As
a
CyberSecurity
Engineer
working
in
tandem
with
an
outsourced
segment
of
the
SOC
providing
incident
response
and
event
management
you
will
be
responsible
for
analyzing
and
responding
to
incidents;
executing
incident
response
plans
preparing
incident
reports;
communicating
findings to management; evaluating security technologies to support cutting edge security monitoring and response; working closely with all departments to ensure policies and procedures are effectively implemented and utilized Providing cybersecurity engineering administration configuration hardening operation monitoring documentation and remediation of cybersecurity systems corporate infrastructure endpoints and processes This position reports directly to the Director of ITCSO Primary Responsibilities and Duties Identify validate and remediate security vulnerabilities detected in The McPherson Companies corporate infrastructure and endpoints Support and monitor The McPherson Companies current endpoint and network security platforms HIPS HIDS on premises firewalls Anti VirusAnti Malware Email security Mobile Device Management etc Support and monitor the external outsourced SOC platform Assist IT staff in the procurement testing implementation and configuration of new security controls Assist IT staff in updating and security patching to corporate infrastructure and endpoints Assist with responding to and managing any Security Information Gathering SIG questionnaires any required compliance audits andor maturity assessments from 3rd parties Educate end users on cybersecurity best practices and manage our cybersecurity awareness training and phishing assessment programs Compile reports as needed detailing current operational status of security measures utilized by company Investigate potential security violations and breaches and provide recommendations to management Perform analysis to determine root causes of any incident Assist IT staff in testing and updates of the Business Continuity PlanAssist with the design development documentation and enforcement of new and existing information security processes procedures and policies Provide computer system audits to ensure the highest level of security and data protection Maintain up to date knowledge on current security practices and tools Position Requirements You have at least 3 years experience in an endpoint security network security or general security focused IT support role BS in Computer Science or Information Security preferred Experience with planning researching and developing security policies standards and procedures Experience working within ITIL frameworks with specific knowledge of Change Management standards and procedures Proven experience with the following Windows administration Active Directory and Group PolicyManagement of firewall hardware platforms Applications used for network management andor monitoring Security orchestration and automation tools and technologies Serverclient communications data center architecture and network topology Proven experience with incident response technologies and methodologies Knowledge of configuration and operation of the WindowsLinux Operating systems Application whitelisting and enterprise anti malware Configurationmanagementrule writing SIEM log analysis and correlation Ability to analyze forensic and static malware Must have strong researchanalysis skills Understanding of the MITRE ATT&CK framework preferred Demonstrated ability to create complex scripts develop tools or automate processes Security certifications ex GSEC OSCP CISSP Security is a plus Position Competencies Ability to work independently as well as with a team Ability to work in a fast paced environment performing multiple dutiestasks within defined deadlines Proven experience identifying problems of varying complexities and finding effective solutions with few guidelines Responsive to the needs of customers internal and external Sense of urgency and commitment with strong follow up skills Proven precision and attention to detail with a high level of accuracy Demonstrate a professional and positive attitude in all internal and external customer interactions Excellent interpersonal skills written and verbal communication and listening skills Self driven and motivated individual with excellent planning and organizational skills Display proficiency with Microsoft Office Word Outlook PowerPoint etc Working Environment The work of this position is performed in an environmentally controlled office environment This position requires the ability to work under pressure and communicate with a diverse population including other employees customers vendors etc This position also requires prolonged periods of sitting in a regular seated position as well as the use of general office equipment including phones printers computers mouse keyboard etc The job description of the CyberSecurity Engineer is not inclusive and is subject to changes additions and deletions as determined by the supervisor The McPherson Companies Inc is an Equal Opportunity Employer MFVetsDisabled
$77k-96k yearly est. 11d ago
Cyber Security Engineer/Information Systems Security Officer (ISSO)
Aerovironment 4.6
Redstone Arsenal, AL jobs
AV is looking for a highly talented CyberSecurity Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA).
Job Description:
Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages.
Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems.
Ensure that system security artifacts are developed, reviewed, and updated as needed.
Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS).
Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions.
Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts.
Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed.
Perform vulnerability/risk analysis of systems using expertise in relevant information systems security.
Track and monitor Plan of Action and Milestones (POA&M).
Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings.
Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle.
Track deliverables (i.e., artifacts, schedules, metrics).
Required:
Bachelor's degree and 7+ years of related professional experience.
Active Secret clearance.
DoD 8570 compliant IAM Level II certification is required (Security +)
Experience with DoD's RMF and SSP processes
Desired:
Experience with MDA specific RMF and SSP processes
Self-Motivated
Customer-oriented
Clearance Level
Secret
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
$61k-79k yearly est. Auto-Apply 10d ago
Cybersecurity Intrusion Detection Analyst
UIC Alaska 4.7
Vicksburg, MS jobs
Bowhead is seeking a Lead Cybersecurity Intrusion Detection Analyst to join our team in Vicksburg, MS.
The Cybersecurity Intrusion Detection Analyst use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cybersecurity state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night on a Panama schedule.
Responsibilities
Provides leadership and supervision to the incident response staff and performs highly technical customer support to organization users.
Manages the incident response and threat detection function.
Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
Participates in the development and monitoring of policies and procedures for department or department operations.
Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes.
Receive and distribute AS&W information
Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
Maintain internal and external source location information)
Coordinate AS&W information from other sources to aid in analysis of alerts.
Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
Collect intrusion artifacts (e.g., source code, malware, and trojans)
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
Provide a 24/7x365 event/incident handling and analysis capability;
Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
Analyze detected cyber events to identify incidents;
Categorize and characterize cyber incidents;
Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
Analyze cyber incidents to develop specific responses;
Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
Mitigate operational and/or technical impact due to cyber incidents;
Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.
Qualifications
Must possess Bachelor's degree or equivalent experience.
Must have at least 5 years intrusion detection experience.
Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience
Must have the certifications for DOD 8570 IAT Level II minimally.
Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
Must have the ability to earn DoD 8570 computing environment certification within 6 months.
Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
Ability to demonstrate strong knowledge of computer security concepts
Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
Advanced knowledge of network technologies and protocols
Advanced understanding of current threats and trends present in the Information Security and Technology field
Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.
SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
• Must be able to lift up to 25 pounds
• Must be able to stand and walk for prolonged amounts of time
• Must be able to twist, bend and squat periodically
#LI-MN1
$65k-97k yearly est. Auto-Apply 13d ago
Cybersecurity Intrusion Detection Analyst
Ukpeagvik Inupiat Corporation 4.7
Vicksburg, MS jobs
Bowhead is seeking a Lead Cybersecurity Intrusion Detection Analyst to join our team in Vicksburg, MS. The Cybersecurity Intrusion Detection Analyst use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cybersecurity state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night on a Panama schedule.
Responsibilities
* Provides leadership and supervision to the incident response staff and performs highly technical customer support to organization users.
* Manages the incident response and threat detection function.
* Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
* Participates in the development and monitoring of policies and procedures for department or department operations.
* Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes.
* Receive and distribute AS&W information
* Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
* Maintain internal and external source location information)
* Coordinate AS&W information from other sources to aid in analysis of alerts.
* Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
* Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
* Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
* Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
* Collect intrusion artifacts (e.g., source code, malware, and trojans)
* Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
* Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
* Provide a 24/7x365 event/incident handling and analysis capability;
* Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
* Analyze detected cyber events to identify incidents;
* Categorize and characterize cyber incidents;
* Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
* Analyze cyber incidents to develop specific responses;
* Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
* Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
* Mitigate operational and/or technical impact due to cyber incidents;
* Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.
Qualifications
* Must possess Bachelor's degree or equivalent experience.
* Must have at least 5 years intrusion detection experience.
* Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience
* Must have the certifications for DOD 8570 IAT Level II minimally.
* Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
* Must have the ability to earn DoD 8570 computing environment certification within 6 months.
* Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
* Ability to demonstrate strong knowledge of computer security concepts
* Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
* Advanced knowledge of network technologies and protocols
* Advanced understanding of current threats and trends present in the Information Security and Technology field
* Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.
SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands: • Must be able to lift up to 25 pounds • Must be able to stand and walk for prolonged amounts of time• Must be able to twist, bend and squat periodically
#LI-MN1
$65k-97k yearly est. 13d ago
Information System Security Officer - ISSO
General Atomics 4.7
San Diego, CA jobs
General Atomics (GA), and its affiliated companies, is one of the world's leading resources for high-technology systems development ranging from the nuclear fuel cycle to remotely piloted aircraft, airborne sensors, and advanced electric, electronic, wireless and laser technologies.
We have an exciting opportunity for an ISSO to join our Security Classified Systems team. This position is located in San Diego (Rancho Bernardo) CA.
DUTIES AND RESPONSIBILITIES:
* Interprets regulations as they apply to information systems, platforms, and IT operating processes, practices, and procedures.
* Participates in the development or modification of the computer environment information assurance security program plans and requirements.
* Participates in the development, distribution, and maintenance of System Security Plans, instructions, guidance, and standard operating procedures.
* Participates in audits of IT, platforms, and operating procedures; analyzes results.
* Participates in identifying risks and makes recommendations for improvements; may participate in corrective measures when incidents or vulnerabilities are discovered.
* Maintains knowledge of applicable policies, regulations, and compliance documents related to classified computing assets and environments.
* May represent the organization as a primary contact with internal representatives.
* Maintains the strict confidentiality of sensitive information.
* Performs other duties as assigned.
* Responsible for observing all laws, regulations, and other applicable obligations wherever and whenever business is conducted on behalf of the Company.
* Expected to work in a safe manner in accordance with established operating procedures and practices.
We recognize and appreciate the value and contributions of individuals with diverse backgrounds and experiences and welcome all qualified individuals to apply.
Job Category
Information Technology
Travel Percentage Required
0% - 25%
Full-Time/Part-Time
Full-Time Salary
State
California
Clearance Level
Secret
Pay Range Low
89,180
City
San Diego
Clearance Required?
Yes
Pay Range High
155,825
Recruitment Posting Title
Information System Security Officer - ISSO
Job Qualifications
* Typically requires a bachelors degree in a related discipline and six or more years of progressive professional experience in information assurance or a related field. Equivalent professional experience may be substituted in lieu of education
* Must possess an active Secret clearance and have the ability to obtain and maintain a TS (with SAP & SCI eligibility)
* Must be able to meet the requirements to obtain and maintain a Department of Energy (DOE) Q clearance
* Must maintain DoD 8570 IAM Level I (e.g. Security +) professional certification as required by customers or contractual obligations.
* Security + certification required.
* Experience with DoD policy such as Risk Management Framework and Joint SAP Implementation Guide.
* Operational experience with installing, troubleshooting, and auditing Windows desktop & server operating systems.
* Experience with DISA STIGs, SCAP tool, ACAS.
* Experience installing and troubleshooting common x86-based computer hardware.
* Must demonstrate a general understanding of information assurance principles, theories, concepts and techniques. Must have experience organizing, planning, scheduling, conducting, and coordinating work assignments to meet project milestones or established completion dates.
* Must possess the ability to understand new concepts quickly and apply them in an evolving environment while contributing to the development of new processes.
* Must be customer focus and possess:
* The ability to identify issues, analyze data and develop solutions to a variety of problems.
* Good analytical, verbal and written communication skills to accurately document, report, and present findings.
* Good interpersonal skills enabling an effective interface with other professionals; and good computer skills.
* Ability to work independently or in a team environment is essential as is the ability to work extended hours as required.
US Citizenship Required?
Yes
Experience Level
Mid-Level (3-7 years)
Relocation Assistance Provided?
No
Workstyle
Onsite
$86k-118k yearly est. 42d ago
Electronic Security Analyst (NOT Cybersecurity) - Southeast Area of GA
Southern Company 4.5
Savannah, GA jobs
Electronic SecurityAnalyst
Please Note: This position will be based in the Southeast Area of Georgia (GA) in an agreed upon location b/t the successful new team member & hiring mngt.
Please review the Fleet/Driving verbiage at the bottom of this job description carefully prior to applying.
Partial Relocation assistance may be offered if needed and if you qualify.
** You must already live in…OR…be willing to relocate to an agreed upon location in “Southeast GA” if you are the successful candidate.
This position is responsible for analysis, strategic planning, project implementation, support, and technical expertise service of electronic security technology for Georgia Power Company.
Primary responsibilities include supporting and maintaining applications through all stages of the application lifecycle including analysis, design, construction, implementation, testing, commissioning, and other related project management responsibilities.
This position interfaces closely with system/application developers and TO administrators to design, implement, tune, and troubleshoot system and database solutions for new projects, enhancements to existing solutions, and implementation of purchased vendor packages. Significant coordination is required with key stakeholders and various infrastructure support groups for operating system upgrades, software upgrades, migrations, and hardware replacements.
DESCRIPTION:
This position is responsible for analysis, strategic planning, project implementation, support, and technical expertise service of electronic security technology for Georgia Power Company and other Southern Company business units including Southern Company Services, Southern Company Gas, and Southern Linc.
Primary responsibilities include supporting and maintaining applications through all stages of the application lifecycle including analysis, design, construction, implementation, testing, commissioning, and other related project management responsibilities.
This position interfaces closely with system/application developers and TO administrators to design, implement, tune, and troubleshoot system and database solutions for new projects, enhancements to existing solutions, and implementation of purchased vendor packages. Significant coordination is required with key stakeholders and various infrastructure support groups for operating system upgrades, software upgrades, migrations, and hardware replacements.
JOB RESPONSIBILITIES:
• Provide strategic direction and planning for best practices and implementation of initiatives for physical access control systems and video surveillance systems.
Knowledge of 12/24 volts circuits, as they relate to access control and relay theory is a plus. Understanding of electronic, electrical and mechanical systems are essential.
CCTV troubleshooting, and knowledge of correct network cable termination. Ability to IP address a camera or setup a local troubleshooting network with POE switch and laptop is a plus.
Function as primary point of contact for emergencies impacting the following but not limited to: Software House CCure application, Avigilon CCTV Systems, and Cool Compliance access management entities across the Georgia Power organization.
Conduct research on available and emerging system technologies to recommend, implement, and oversee all aspects for upgrades to including but not limited Software House CCure Security Access Controls, and Avigilon CCTV Systems and evaluation of potential new applications.
Coordinate with other Corporate Security team members, external security integrators and contractors, and other business units to effectively implement physical security solutions.
Manages and contributes to projects related to achieving enterprise-wide Corporate Security Modernization goals including but not limited to: CCURE integration, product selection and implementation of asset management, video surveillance user management.
Support software and databases related to Cool Compliance access management system requests.
Self-initiates tasks and projects to achieve strategic goals for Southern Company and Georgia Power Corporate Security and to ensure effective operation, compliance, standardization, health, and reliability of physical access control systems and video surveillance systems.
Anticipate, identify, and mitigate systems risk and exposures, and provide timely response when incidents occur.
Provide system administration for critical control and monitoring systems used by Corporate Security.
Candidates with the following preferred qualifications are encouraged to apply:
General Understanding of budgets and/or capable of learning about budgeting (capital & O&M) and accounting processes to ensure budget compliance. Must have a strong focus on teamwork, be a collaborator and build strong relationships with customers, suppliers and other TO organizations.
Working knowledge (design, implementation, programming, troubleshooting) of electronic security hardware and software systems including but not limited to Software House CCure access control and Avigilon surveillance solutions software.
Ability to respond to and resolve complex technical computer hardware and software performance failures.
Working knowledge of networking infrastructure.
Demonstrate strong ethics and discretion in handling sensitive or confidential information.
Education:
Desirable: Bachelor's degree in computer science, criminal justice, or another technical field.
An advanced degree is preferred however an equivalent combination of education, training, and prior experience that are directly correlated to job knowledge will be considered.
Minimum Education:
High School graduate with a minimum of 3 years related experience working with CCURE programing and naming conventions.
Certifications:
Desirable: ASIS Board Certification in Security Management (CPP), Physical Security (PSP), and/or Network Administrator certifications are preferred.
This position has been identified as a role that will require the use of a Georgia Power fleet vehicle. The following will be required if you are selected for this position:
Must have at least one year of verifiable driving experience (Must hold a valid driver's license for the class vehicle to be operated. Driving permits are not typically considered a valid driver's license).
Must have no revocation of driving privileges within the 36 months prior to application, no convictions of major traffic violations (DUI, hit and run, reckless driving, etc.) within the 12 months prior to application, or any pending charges for a major traffic violation at the time of application.
Must consent to a continuous monitoring of your Motor Vehicle Record
$77k-98k yearly est. Auto-Apply 2d ago
Network & Systems Security Analyst, Cisco Focus, Progression
TECO Energy 4.8
Tampa, FL jobs
Title: Network & Systems SecurityAnalyst, Cisco Focus, Progression Company: Tampa Electric Company State and City: Florida - Tampa Shift: 8 Hr. X 5 Days
Hiring Manager: David Cain
Recruiter: Mark E Koener
TITLE: Network & Systems SecurityAnalyst Progression
PERFORMANCE COACH: Mgr Network Engineering & CyberSecurity Operations
COMPANY: Tampa Electric
DEPARTMENT: High Performance Computing & BP Support
FOCUS Areas
- Cisco Networking
- Cisco Wireless
- Cisco ISE
- Networking Engineering Related Skills
POSITION CONCEPT
The Network & Systems SecurityAnalyst is responsible for planning/designing, implementing, and supporting new and existing network, server, storage infrastructure. This role is also responsible for ensuring all network security controls (i.e., firewalls, web application firewalls [WAF], proxies, network segmentation, NAC, ACLs, etc.) are implemented and managed per corporate information security standards. Additionally, responsibilities include assessing enterprise assets and critical assets for secure configurations and maintaining and enforcing regulations and standards such as NERC Critical Infrastructure Protection (CIP), Sarbanes-Oxley (SOX), and Payment Card Industry (PCI).
Responsible for the design, planning, operation, maintenance, and support of the TECO and NMGC network infrastructure. This includes primary accountability for network technologies such as route/switch, on-premise LAN/WAN, IPAM, Wi-Fi, ISP management, site-to-site VPNs, proxies (forward and reverse), perimeter firewall management, DNS, Azure cloud environments, automation, NAC/user access, hyperconverged infrastructure, and overall network security. Partners with the Telecommunication teams on establishing/upgrading existing circuits/communication links. Responsible for the NERC Cyber Infrastructure Protection and disaster recovery plans.
Responsible for VoIP, SIP, DHCP, DNS, TCP/IP routing and routing protocols such as OSPF and BGP, binary mathematics, NAT, PAT, IPsec and SSL VPN technologies, GRE tunneling, route redistribution, traffic shaping, port-level filtering, SD-WAN, MPLS and other communications related technologies. Responsible for the installation, configuration, and maintenance of all WAN and LAN connectivity which includes core and campus switches, routers, firewalls, wireless access points, WAN scalers and load balancer technologies. Responsible for the design, installation, configuration, and maintenance of DNP over IP and serial SCADA communications between the primary and backup control centers, power plants, solar sites, and substations. Responsible for the configuration and maintenance of Smart GRID communication hardware switches and routers between the primary and backup control centers.
NETWORK & SYSTEMS SECURITYANALYST I (LEVEL 1)
Monitors and troubleshoots server, network, and security controls related problems and failures; and installs and configures hardware/software. Works under direct supervision.
PRIMARY DUTIES AND RESPONSIBILITIES
1. Plan, design, and implement network, server, and storage infrastructure based on project requirements, capacity plans, and system support. (20%)
2. Problem solving involves basic troubleshooting following the OSI (Open Systems Interconnection) model, making or calling for equipment repairs, and problem escalation. (20%)
3. Detection and correction of work stoppages and/or errors are accomplished by monitoring systems and changing configurations, as necessary. (20%)
4. Install and support network, server, and storage hardware and software. (10%)
5. Direct participation in the planning and designing, maintenance, testing and documentation of the company's disaster recovery plans are vital. (10%)
6. Provide and apply appropriate security consulting and support for IT infrastructure across multiple platforms (Firewalls, proxies, WAFs, ACLs, NAC, Operating Systems, NetScaler load balancers, DDoS protection, and other network devices). (10%)
7. Provide third-level technical support for security systems and authentication mechanisms on all operating system platforms. (10%)
QUALIFICATIONS
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
LICENSES/CERTIFICATIONS
Required: Has obtained at least one related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Certified Ethical Hacker (CEH), GIAC Certifications, Certified Information Systems Security Professional (CISSP).
Preferred: ITIL v3, CCNA, MCSA, VCP, Security+, CISSP
EXPERIENCE
Required: Minimum four (4) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, or Cisco Networking.
In lieu of some experience listed above, may consider three (3) years of related experience with an Associate's Degree or two (2) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
KNOWLEDGE/SKILLS/ABILITIES (KSA)
• Working knowledge of network, server, and security controls infrastructure regardless of the complexity
• Working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cybersecurity best practices, and networking/hardware installation and maintenance
• Working knowledge with packet analysis and denial of service protection
• Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written)
• Ability to present issues and topics of a complex technical nature to non-technical audiences
• Excellent interpersonal and organizational skills
• Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI
WORKING CONDITIONS
Normal working conditions with occasional extended hours during the week and weekends.
PHYSICAL DEMANDS/REQUIREMENTS
Normal physical demands related to an office and operational (Power Plant, Solar, Control Center) workplace environment. Must be able to lift 50-pound boxes and ascend/descend a ladder to service network access points.
NETWORK & SYSTEMS SECURITYANALYST II (LEVEL 2)
In addition to the duties & responsibilities of the Level 1 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead and mentor Level 1 Analyst. Works under general supervision.
ADDITIONAL DUTIES AND RESPONSIBILITIES
1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (30%)
2. Installs and configures server and network related hardware/software which meet the company's security standards. (40%)
3. Design and planning required for small projects. (20%)
4. Project leadership, consulting, or cross-train peers. (10%)
QUALIFICATIONS
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
LICENSES/CERTIFICATIONS
Required: Has obtained at least two related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP).
Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP
EXPERIENCE
Required: Minimum six (6) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider four (4) years of related experience with an Associate's Degree or three (3) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
QUALIFICATIONS
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
LICENSES/CERTIFICATIONS
Required: Has obtained at least two related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP).
Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP
EXPERIENCE
Required: Minimum six (6) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider four (4) years of related experience with an Associate's Degree or three (3) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
KNOWLEDGE/SKILLS/ABILITIES (KSA)
• Intermediate knowledge of network, server, and security controls infrastructure regardless of the complexity
• Good working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cybersecurity best practices, and networking/hardware installation and maintenance
• Good working knowledge with packet analysis and denial of service protection
• Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written)
• Ability to present issues and topics of a complex technical nature to non-technical audiences
• Excellent interpersonal and organizational skills
• Good working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI
NETWORK & SYSTEMS SECURITYANALYST III (LEVEL 3)
In addition to the duties & responsibilities of the Level 2 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead, cross-train peers, and mentor Analysts. Works under general direction.
ADDITIONAL DUTIES AND RESPONSIBILITIES
1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (20%)
2. Installs and configures server and network related hardware/software which meet the company's security standards. (20%)
3. Design and planning required for small projects. (40%)
4. Project leadership, consulting, or cross-train peers. (20%)
QUALIFICATIONS
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS).
LICENSES/CERTIFICATIONS
Required: Has obtained at least three or two, with the condition to obtain a third certification within one year of hire for this position, related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA).
Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP
EXPERIENCE
Required: Minimum eight (8) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider six (6) years of related experience with an Associate's Degree or four (4) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
KNOWLEDGE/SKILLS/ABILITIES (KSA)
• Expert knowledge of network, server, and security controls infrastructure regardless of the complexity
• Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cybersecurity best practices, and networking/hardware installation and maintenance
• Thorough working knowledge with packet analysis and denial of service protection
• Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written)
• Ability to present issues and topics of a complex technical nature to non-technical audiences
• Excellent interpersonal, mentoring, and organizational skills
• Good working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI
NETWORK & SYSTEMS SECURITY ARCHITECT (LEVEL 4)
In addition to the duties & responsibilities of the Level 3 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead on larger projects, cross-train peers, and mentor all levels of Analysts. Works under general direction.
ADDITIONAL DUTIES AND RESPONSIBILITIES
1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (10%)
2. Installs and configures server and network related hardware/software which meet the company's security standards. (10%)
3. Design and planning required for small and large projects. (40%)
4. Project leadership, consulting, or cross-train peers. (40%)
QUALIFICATIONS
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS).
LICENSES/CERTIFICATIONS
Required: Has obtained at least three related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA).
Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP
EXPERIENCE
Required: Minimum ten (10) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking.
In lieu of some experience listed above, may consider eight (8) years of related experience with an Associate's Degree or six (6) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
KNOWLEDGE/SKILLS/ABILITIES (KSA)
• Expert knowledge of network, server, and security controls infrastructure regardless of the complexity
• Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cybersecurity best practices, and networking/hardware installation and maintenance
• Thorough working knowledge with packet analysis and denial of service protection
• Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written)
• Ability to present issues and topics of a complex technical nature to non-technical audiences
• Excellent interpersonal, mentoring, consulting, and organizational skills
• Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI
LEAD NETWORK & SYSTEMS SECURITYANALYST (PERFORMANCE COACH)
In addition to the duties & responsibilities of the Level 3 Analyst, has increased responsibilities in leading and managing Level 1 through 3 Analyst. May serve as a project lead on larger projects, cross-train peers, and mentor all levels of Analyst. Works under general direction.
ADDITIONAL DUTIES AND RESPONSIBILITIES
1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (10%)
2. Installs and configures server and network related hardware/software which meet the company's security standards. (10%)
3. Design and planning required for small and large projects. (25%)
4. Project leadership, consulting, or cross-train peers. (25%)
5. Lead and manage the network analyst (Level 1, 2, and 3) team (30%)
QUALIFICATIONS
LICENSES/CERTIFICATIONS
Required: Has obtained at least three or two, with the condition to obtain a third certification within one year of hire for this position, related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA). Leadership/management certifications/certificates may be considered in lieu of professional certifications.
Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP
EDUCATION
Required: High School Diploma or GED
Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS).
EXPERIENCE
Required: Minimum ten (10) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking.
In lieu of some experience listed above, may consider eight (8) years of related experience with an Associate's Degree or six (6) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS).
KNOWLEDGE/SKILLS/ABILITIES (KSA)
• Expert knowledge of network, server, and security controls infrastructure regardless of the complexity
• Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cybersecurity best practices, and networking/hardware installation and maintenance
• Thorough working knowledge with packet analysis and denial of service protection
• Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written)
• Ability to present issues and topics of a complex technical nature to non-technical audiences
• Excellent interpersonal, mentoring, coaching, and organizational skills
• Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI
#LI-SC1
TECO offers a competitive Benefits package!!
Competitive Salary *401k Savings plan w/ company matching * Pension plan * Paid time off* Paid Holiday time * Medical, Prescription Drug, & Dental Coverage *Tuition Assistance Program * Employee Assistance Program * Wellness Programs * On-site Fitness Centers * Bonus Plan and more!
$70k-91k yearly est. 60d+ ago
Staff Infrastructure Security Engineer
Crusoe 4.1
San Francisco, CA jobs
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
We are seeking a highly skilled Staff Infrastructure Security Engineer to architect, deploy, and operationalize the foundational security services that will underpin our shift to a Zero Trust model.
In this strategic role, you will define and establish the "roots of trust" for our organization, serving as a technical leader in Secrets Management and Identity architecture. While your immediate focus is to serve as the Subject Matter Expert (SME) driving our enterprise HashiCorp Vault platform from Proof-of-Concept (PoC) to global production readiness, your long-term scope is far broader. You will be responsible for evolving our credentials management strategy, onboarding engineering teams to secure self-service workflows, and designing scalable trust patterns across our hybrid multi-cloud environment.
Key Responsibilities
1. Strategic Architecture & Governance
Zero Trust Architecture: Architect a highly available, disaster-resilient, and scalable multi-cluster secrets management platform that serves as the foundation for the organization's Zero Trust strategy.
Technical Leadership: Drive consensus across Cloud Engineering, DevOps, and SRE teams to define standardized secret management workflows and integrate security patterns into the SDLC.
Compliance & Governance: Ensure the platform design meets rigorous internal policies and external compliance frameworks (e.g., SOX, ISO 27001).
Policy as Code: Design and implement advanced governance controls, including Sentinel Policy as Code, to automate security guardrails and access decisions.
2. Platform Engineering & Implementation
Infrastructure as Code (IaC): Lead the engineering of the Vault infrastructure using Terraform, ensuring all deployments are reproducible, version-controlled, and automated.
Identity Integration: Architect the integration between the secrets platform, Identity Providers (Okta), and workload identities (Kubernetes Service Accounts) to establish robust machine-to-machine authentication.
Advanced Secrets Capabilities: Configure and tune essential secrets engines (KV, Transit, KMIP) and Enterprise features (Performance Replication, Seal automation) to support diverse engineering use cases.
3. Operational Excellence & Developer Enablement
Vault as a Service (VaaS): Operationalize the platform by building self-service mechanisms, distinct "paved road" onboarding procedures, and documentation that allows engineering teams to easily consume security services.
Observability: Implement comprehensive monitoring, alerting, and audit logging to ensure platform health, provide visibility into usage patterns, and satisfy audit requirements.
Lifecycle Management: Own the full operational lifecycle of the production environment, including patching, version upgrades, backup/restore procedures, and incident response runbooks.
Required Qualifications
6+ years (or equivalent) hands-on experience in cloud security, DevOps, or infrastructure engineering.
Deep expertise and proven track record deploying and managing HashiCorp Vault in an enterprise environment (experience with the Enterprise edition is highly preferred).
Expert-level knowledge of Secrets Management, X.509 PKI (Public Key Infrastructure), Certificate Authority Operations, and Cryptography concepts.
Strong experience with Google Cloud Platform (GCP) and cloud native identity and access management (IAM).
Proficiency with Infrastructure as Code (IaC) tools, especially Terraform, for automating the deployment and configuration of Vault and its dependent infrastructure.
Technical Skills
Fluent in at least one programming language (ideally Go or Python).
Demonstrable experience with Kubernetes and container security principles, especially integrating secrets into microservices architectures.
Strong understanding of network security concepts (IP addressing, IP routing, firewalls, segmentation, Zero Trust).
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$126k-179k yearly est. Auto-Apply 45d ago
Staff Infrastructure Security Engineer
Crusoe 4.1
San Francisco, CA jobs
Job Description
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
We are seeking a highly skilled Staff Infrastructure Security Engineer to architect, deploy, and operationalize the foundational security services that will underpin our shift to a Zero Trust model.
In this strategic role, you will define and establish the "roots of trust" for our organization, serving as a technical leader in Secrets Management and Identity architecture. While your immediate focus is to serve as the Subject Matter Expert (SME) driving our enterprise HashiCorp Vault platform from Proof-of-Concept (PoC) to global production readiness, your long-term scope is far broader. You will be responsible for evolving our credentials management strategy, onboarding engineering teams to secure self-service workflows, and designing scalable trust patterns across our hybrid multi-cloud environment.
Key Responsibilities
1. Strategic Architecture & Governance
Zero Trust Architecture: Architect a highly available, disaster-resilient, and scalable multi-cluster secrets management platform that serves as the foundation for the organization's Zero Trust strategy.
Technical Leadership: Drive consensus across Cloud Engineering, DevOps, and SRE teams to define standardized secret management workflows and integrate security patterns into the SDLC.
Compliance & Governance: Ensure the platform design meets rigorous internal policies and external compliance frameworks (e.g., SOX, ISO 27001).
Policy as Code: Design and implement advanced governance controls, including Sentinel Policy as Code, to automate security guardrails and access decisions.
2. Platform Engineering & Implementation
Infrastructure as Code (IaC): Lead the engineering of the Vault infrastructure using Terraform, ensuring all deployments are reproducible, version-controlled, and automated.
Identity Integration: Architect the integration between the secrets platform, Identity Providers (Okta), and workload identities (Kubernetes Service Accounts) to establish robust machine-to-machine authentication.
Advanced Secrets Capabilities: Configure and tune essential secrets engines (KV, Transit, KMIP) and Enterprise features (Performance Replication, Seal automation) to support diverse engineering use cases.
3. Operational Excellence & Developer Enablement
Vault as a Service (VaaS): Operationalize the platform by building self-service mechanisms, distinct "paved road" onboarding procedures, and documentation that allows engineering teams to easily consume security services.
Observability: Implement comprehensive monitoring, alerting, and audit logging to ensure platform health, provide visibility into usage patterns, and satisfy audit requirements.
Lifecycle Management: Own the full operational lifecycle of the production environment, including patching, version upgrades, backup/restore procedures, and incident response runbooks.
Required Qualifications
6+ years (or equivalent) hands-on experience in cloud security, DevOps, or infrastructure engineering.
Deep expertise and proven track record deploying and managing HashiCorp Vault in an enterprise environment (experience with the Enterprise edition is highly preferred).
Expert-level knowledge of Secrets Management, X.509 PKI (Public Key Infrastructure), Certificate Authority Operations, and Cryptography concepts.
Strong experience with Google Cloud Platform (GCP) and cloud native identity and access management (IAM).
Proficiency with Infrastructure as Code (IaC) tools, especially Terraform, for automating the deployment and configuration of Vault and its dependent infrastructure.
Technical Skills
Fluent in at least one programming language (ideally Go or Python).
Demonstrable experience with Kubernetes and container security principles, especially integrating secrets into microservices architectures.
Strong understanding of network security concepts (IP addressing, IP routing, firewalls, segmentation, Zero Trust).
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$126k-179k yearly est. 15d ago
Staff Infrastructure Security Engineer
Crusoe 4.1
Sunnyvale, CA jobs
Job Description
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
We are seeking a highly skilled Staff Infrastructure Security Engineer to architect, deploy, and operationalize the foundational security services that will underpin our shift to a Zero Trust model.
In this strategic role, you will define and establish the "roots of trust" for our organization, serving as a technical leader in Secrets Management and Identity architecture. While your immediate focus is to serve as the Subject Matter Expert (SME) driving our enterprise HashiCorp Vault platform from Proof-of-Concept (PoC) to global production readiness, your long-term scope is far broader. You will be responsible for evolving our credentials management strategy, onboarding engineering teams to secure self-service workflows, and designing scalable trust patterns across our hybrid multi-cloud environment.
Key Responsibilities
1. Strategic Architecture & Governance
Zero Trust Architecture: Architect a highly available, disaster-resilient, and scalable multi-cluster secrets management platform that serves as the foundation for the organization's Zero Trust strategy.
Technical Leadership: Drive consensus across Cloud Engineering, DevOps, and SRE teams to define standardized secret management workflows and integrate security patterns into the SDLC.
Compliance & Governance: Ensure the platform design meets rigorous internal policies and external compliance frameworks (e.g., SOX, ISO 27001).
Policy as Code: Design and implement advanced governance controls, including Sentinel Policy as Code, to automate security guardrails and access decisions.
2. Platform Engineering & Implementation
Infrastructure as Code (IaC): Lead the engineering of the Vault infrastructure using Terraform, ensuring all deployments are reproducible, version-controlled, and automated.
Identity Integration: Architect the integration between the secrets platform, Identity Providers (Okta), and workload identities (Kubernetes Service Accounts) to establish robust machine-to-machine authentication.
Advanced Secrets Capabilities: Configure and tune essential secrets engines (KV, Transit, KMIP) and Enterprise features (Performance Replication, Seal automation) to support diverse engineering use cases.
3. Operational Excellence & Developer Enablement
Vault as a Service (VaaS): Operationalize the platform by building self-service mechanisms, distinct "paved road" onboarding procedures, and documentation that allows engineering teams to easily consume security services.
Observability: Implement comprehensive monitoring, alerting, and audit logging to ensure platform health, provide visibility into usage patterns, and satisfy audit requirements.
Lifecycle Management: Own the full operational lifecycle of the production environment, including patching, version upgrades, backup/restore procedures, and incident response runbooks.
Required Qualifications
6+ years (or equivalent) hands-on experience in cloud security, DevOps, or infrastructure engineering.
Deep expertise and proven track record deploying and managing HashiCorp Vault in an enterprise environment (experience with the Enterprise edition is highly preferred).
Expert-level knowledge of Secrets Management, X.509 PKI (Public Key Infrastructure), Certificate Authority Operations, and Cryptography concepts.
Strong experience with Google Cloud Platform (GCP) and cloud native identity and access management (IAM).
Proficiency with Infrastructure as Code (IaC) tools, especially Terraform, for automating the deployment and configuration of Vault and its dependent infrastructure.
Technical Skills
Fluent in at least one programming language (ideally Go or Python).
Demonstrable experience with Kubernetes and container security principles, especially integrating secrets into microservices architectures.
Strong understanding of network security concepts (IP addressing, IP routing, firewalls, segmentation, Zero Trust).
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$126k-178k yearly est. 14d ago
Product Security Engineer - AI
Crusoe 4.1
San Francisco, CA jobs
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
About This Role:
At Crusoe, the AI Security Engineer is central to ensuring the safety, integrity, and resilience of our rapidly evolving AI ecosystem. You will serve as the technical authority on securing Large Language Models (LLMs), AI-powered platforms, and the infrastructure that supports them-driving both strategy and execution for our next generation of secure AI systems.
What You'll Be Working On:
AI Security SME & Strategic Partner: Act as the technical leader and SME on the practical security of our AI and LLM ecosystem and define the long-term technical roadmap for AI security architecture and drive high-impact cross-functional initiatives.
LLM Architecture & Design Ownership: Lead the design and implementation of highly secure Generative AI solutions for security applications, focusing on architectural patterns like Retrieval-Augmented Generation (RAG)
AI-Powered Tooling & Automation: Architect and implement custom, AI-powered security tooling that automates threat detection, vulnerability analysis, and data access control, moving from proof-of-concept to production at scale.
Secure MLOps & Governance: Establish governance and processes for secure MLOps pipelines. Define standards for model versioning, deployment, and monitoring, ensuring they meet rigorous compliance and security requirements.
Threat Mitigation & Mentorship: Lead threat modeling exercises for novel AI systems. Apply advanced security and privacy best practices, and mentor senior engineers on secure development practices in the GenAI domain.
System-Level Ownership: Drive the entire lifecycle of critical AI security projects.
What You'll Bring to the Team:
3+ years of professional experience building and maintaining production systems, with strong Python programming skills and experience across the stack (backend/frontend).
Deep expertise in advanced Generative AI techniques, including implementing Retrieval-Augmented Generation (RAG), designing AI Agents and Multi-step Cognitive Processes (MCP), and building with workflow orchestration frameworks.
Proven ability to own the entire model lifecycle by designing and managing robust MLOps pipelines; experience with containerization (Docker), virtualization (VMs), and cloud platforms (AWS, GCP, Azure) is a plus.
Experience in designing, implementing, and fine-tuning custom LLMs, coupled with a strong understanding of NLP fundamentals, transformer architectures, PyTorch/TensorFlow, and data structures.
Strong curiosity about security, privacy, and threat modeling; a desire to safely "break" systems to secure them and apply best practices to AI pipelines and deployments.
Strong product sense for rapid iteration and refinement based on data, combined with a collaborative mindset to work closely with engineers, product managers, and securityanalysts in a fast-paced environment.
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Compensation:
Compensation will be paid in the range of $135,000 - $150,000. Restricted Stock Units are included in all offers. Compensation to be determined by the applicant's education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data.
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$135k-150k yearly Auto-Apply 52d ago
Product Security Engineer - AI
Crusoe 4.1
San Francisco, CA jobs
Job Description
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
About This Role:
At Crusoe, the AI Security Engineer is central to ensuring the safety, integrity, and resilience of our rapidly evolving AI ecosystem. You will serve as the technical authority on securing Large Language Models (LLMs), AI-powered platforms, and the infrastructure that supports them-driving both strategy and execution for our next generation of secure AI systems.
What You'll Be Working On:
AI Security SME & Strategic Partner: Act as the technical leader and SME on the practical security of our AI and LLM ecosystem and define the long-term technical roadmap for AI security architecture and drive high-impact cross-functional initiatives.
LLM Architecture & Design Ownership: Lead the design and implementation of highly secure Generative AI solutions for security applications, focusing on architectural patterns like Retrieval-Augmented Generation (RAG)
AI-Powered Tooling & Automation: Architect and implement custom, AI-powered security tooling that automates threat detection, vulnerability analysis, and data access control, moving from proof-of-concept to production at scale.
Secure MLOps & Governance: Establish governance and processes for secure MLOps pipelines. Define standards for model versioning, deployment, and monitoring, ensuring they meet rigorous compliance and security requirements.
Threat Mitigation & Mentorship: Lead threat modeling exercises for novel AI systems. Apply advanced security and privacy best practices, and mentor senior engineers on secure development practices in the GenAI domain.
System-Level Ownership: Drive the entire lifecycle of critical AI security projects.
What You'll Bring to the Team:
3+ years of professional experience building and maintaining production systems, with strong Python programming skills and experience across the stack (backend/frontend).
Deep expertise in advanced Generative AI techniques, including implementing Retrieval-Augmented Generation (RAG), designing AI Agents and Multi-step Cognitive Processes (MCP), and building with workflow orchestration frameworks.
Proven ability to own the entire model lifecycle by designing and managing robust MLOps pipelines; experience with containerization (Docker), virtualization (VMs), and cloud platforms (AWS, GCP, Azure) is a plus.
Experience in designing, implementing, and fine-tuning custom LLMs, coupled with a strong understanding of NLP fundamentals, transformer architectures, PyTorch/TensorFlow, and data structures.
Strong curiosity about security, privacy, and threat modeling; a desire to safely "break" systems to secure them and apply best practices to AI pipelines and deployments.
Strong product sense for rapid iteration and refinement based on data, combined with a collaborative mindset to work closely with engineers, product managers, and securityanalysts in a fast-paced environment.
Benefits:
Industry competitive pay
Restricted Stock Units in a fast growing, well-funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short-term and long-term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Compensation:
Compensation will be paid in the range of $135,000 - $150,000. Restricted Stock Units are included in all offers. Compensation to be determined by the applicant's education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data.
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
$135k-150k yearly 22d ago
Learn more about Huntington Ingalls Industries jobs