Post job

Information security analyst jobs in District of Columbia

- 337 jobs
  • Chief Information Security Officer

    The Planet Group 4.1company rating

    Information security analyst job in Washington, DC

    Chief Information Security Officer (CISO) The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system. Position Details Salary: $250-2750k Type: Full-time, direct hire Location: Washington DC, onsite 3 days a week Strategic Direction & Executive Leadership Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission. Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams. Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices. Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management. Risk Oversight & Regulatory Alignment Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks. Maintain adherence to all regulatory requirements applicable to both sectors: Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules. University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing. Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment. Operational Security Management Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection). Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities. Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects. Communication, Influence & Education Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams. Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals. Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture. Required Qualifications Education: Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred). Professional Background: At least 10 years of progressive cybersecurity experience. Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity). Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments. Certifications: One or more required-CISSP, CISM, or equivalent. Key Skills & Core Competencies Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques. Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model. Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution. Demonstrated success in leading security incident response efforts and handling high-pressure situations. Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
    $126k-174k yearly est. 3d ago
  • Cyber Threat Analyst

    Us Government Other Agencies and Independent Organizations 4.2company rating

    Information security analyst job in Washington, DC

    Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Summary Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Overview Help Accepting applications Open & closing dates 10/01/2025 to 09/30/2026 Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15 Location Many vacancies in the following location: Washington, DC Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted Promotion potential None Job family (Series) * 0132 Intelligence Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No Announcement number 23-11942190-6868/AHD Control number 722102800 This job is open to Help The public U.S. Citizens, Nationals or those who owe allegiance to the U.S. Federal employees - Competitive service Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales. Federal employees - Excepted service Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria. Videos Duties Help As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community. You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings. Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government. Requirements Help Conditions of employment * You must be physically in the United States or one of its territories when you submit your resume via MyLINK. * You must be registered for the Selective Service, if applicable. * You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible). * You must be willing to move to the Washington, DC area. * You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation. * For further information, please visit: **************************************** Qualifications Minimum Qualifications Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin. A mix of international and technical studies, to include a bachelor's or master's degree in the following fields: * International Relations, Foreign Affairs, or Security Studies * Cyber Security * Computer Science * Digital Forensics * Telecommunications * Information Assurances * Interest in international affairs * Awareness of U.S. national security interests * At lease a 3.0 GPA on a 4-point scale is preferred * Ability to work under tight deadlines * Excellent analytic abilities and relevant experience * Strong critical thinking, problem solving skills, and ability to think creatively * Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation Desired Qualifications * Foreign language proficiency * Strong verbal presentation skills * Demonstrated ability to write clear, concise text * Research experience in international affairs * Ability to work in a team environment * Interest in a career that requires regular writing assignments Education * Bachelor's or master's degree in one of the following fields: * Computer Science * Computer Engineering * Digital Forensics * Cyber Security * Telecommunications * Information Assurances * Security Studies * A mix of international and technical studies * At least a 3.0 GPA on a 4-point scale is preferred Additional information Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution. Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. How you will be evaluated You will be evaluated for this job based on how well you meet the qualifications above. For further information about this position, please visit: ***************************** Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. Required documents Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating. How to Apply Help This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself. Agency contact information Central Intelligence Agency Website *********************** Next steps After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information. Fair and transparent The Federal hiring process is set up to be fair and transparent. Please read the following guidance. Criminal history inquiries Equal Employment Opportunity (EEO) Policy Financial suitability New employee probationary period Privacy Act Reasonable accommodation policy Selective Service Signature and false statements Social security number request Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
    $63.3k-156.8k yearly 34d ago
  • Cyber Security Analyst - Government Publishing Office (GPO)

    Tln Worldwide Enterprises, Inc.

    Information security analyst job in Washington, DC

    Requirements - Bachelor's degree in Cybersecurity, Information Technology, or a related field is preferred. - Relevant certifications (CISSP, CEH, etc.) are a plus. - Previous experience in a cybersecurity role, especially within government or federal organizations, is desired. Salary Description 100,000 - 120,000
    $82k-111k yearly est. 60d+ ago
  • Mid Cyber Analyst

    Job Listingsilluminate Mission Solutions

    Information security analyst job in Washington, DC

    Cyberspace Solutions, a Crimson Phoenix company seeks an exceptionally qualified Mid Cyber Analyst with a TS/SCI clearance to support an ongoing government customer. Crimson Phoenix supports the US national security community and its allies with a wide range of analytic and cyber effect solutions that accelerate informed decision made in the telephony, IP messaging, cyber, and multi-source arenas. Our customers require insight from the endless volume and variety of data to make critical, high integrity decisions at mission speed. We are an innovative solutions company striving to be a global leader in multi-source data collection, predictive analysis and mobile/network surveillance (4G/5G) and assurance, from the Edge of Collection to the Core of Exploitation, Tactical to Strategic, Endpoint to the Enterprise. Responsibilities The contractor shall provide on-site functional and technical intelligence support to the DIA Intelligence Integration Centers including the collection, analysis, and production of all-source intelligence pertaining to foreign national Cyber MILCAP and foreign use of the Cyberspace Domain in compliance with DIA's SOP for the Cyber FPA, DIA ADO, ICD 203 and 206 sourcing, analysis, production, and DIA tradecraft standards. Qualifications Clearance: Top Secret//SCI Polygraph: Counterintelligence (CI) polygraph HS Diploma or GED and 7+ years of experience with analysis or Bachelor's degree and 3+ years of experience with analysis Experience with all-source intelligence analysis and production on foreign national cyber military capabilities and foreign use of cyberspace, including but not limited to doctrine, intent, operations, supporting services and infrastructure, and vulnerabilities Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings Preferred Qualifications: Experience with authoring current DoD product lines and utilizing ICD 203 tradecraft standards Experience with producing vector map products and conducting network analysis using geo enabled processes Experience with data analytics, analysis, and visualization Knowledge of the intelligence cycle Knowledge of one of the following AORs: the Americas, the Asia-Pacific, Eurasia, or the Middle East Equal employment opportunity employer: All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Crimson Phoenix is committed to providing veteran employment opportunities to our service men and women.
    $82k-111k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Csv-Taurean

    Information security analyst job in Washington, DC

    Clearance: T5/6C High Risk Public Trust (required) Summary:Provide continuous monitoring, vulnerability assessment, incident response, and compliance documentation for OIG systems. Ensure compliance with NIST 800-53, FedRAMP, and FISMA standards. Key Duties: Monitor network activity with SIEM tools; investigate and report security incidents. Conduct vulnerability scans; implement patches and remediation. Support POA&Ms, ATO documentation, and FedRAMP compliance. Assist with contingency planning and incident response exercises. Qualifications: Bachelor's degree in Cybersecurity, IT, or related field. 8+ years of cybersecurity experience. Certifications: CISSP, CEH, CCSP, or equivalent.
    $82k-111k yearly est. 60d+ ago
  • Cyber Security Analyst

    Zone It Solutions

    Information security analyst job in Washington, DC

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $82k-111k yearly est. Easy Apply 3d ago
  • Cyber Analyst - Mid

    Nalley Consulting

    Information security analyst job in Washington, DC

    Join the Nalley Consulting team as a Cyber Analyst at DIA HQ. Cyber Analyst LCAT: Mid Clearance requirement: TS/SCI clearance; CI poly or willingness to take a polygraph Required experience/education: 3+ years of experience and a bachelor's degree OR 7+years of equivalent experience without a degree Position Description Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments specific to the cyber domain. Provides analytic support to collections, operations, investigations, and other defense intelligence analytic requirements. Basic Qualifications Experience in IT, in cybersecurity, or in cyber-focused intelligence analysis Knowledge of computer and IT infrastructure Understanding of computer network vulnerabilities and access vectors Knowledge of the IC and Combatant Command environment Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings Additional Qualifications Experience with CENTCOM AOR Knowledge of the intelligence cycle Experience with authoring DoD product lines and utilizing ICD 203 tradecraft standards Experience with data analytics, analysis, and visualization ABOUT NALLEY CONSULTING Nalley Consulting is a Service Disabled Veteran Owned Small Business working with prime partners to staff Department of Defense and Intelligence Community positions. Created by a U.S. Navy intelligence veteran, Nalley Consulting has grown to include multiple IDIQ vehicles in several states. Nalley Consulting fringe benefits include: Excellent medical, dental, and vision benefits PTO 11 paid federal holidays Tuition assistance Paid military-reserve leave Paid parental leave for birth or adoption 401k matching up to 5 percent of the base salary Flex time Company-paid short-term disability, long-term disability, and life insurance.
    $82k-111k yearly est. Auto-Apply 60d+ ago
  • Cyber Systems SSO

    Janus Research Group Inc. 4.3company rating

    Information security analyst job in Washington, DC

    is Subject to Contract Award JANUS Research Group is currently seeking a Cyber Systems SSO for a contract to support the Deputy Chief of Staff (DCS, G8. The DCS G-8 is the principal military advisor to the Chief of Staff, Army (CSA) and the Assistant Secretary of the Army, Financial Management and Comptroller (ASA(FMC)) for the Programming phase of the Planning, Programming, Budgeting, and Execution (PPBE) process. The DCS, G-8 coordinates with the Assistant Secretary of the Army, Acquisition, Logistics, and Technology (ASA(ALT)) on all proposed programming and process recommendations related to ongoing and future acquisition programs and science and technology initiatives. The DCS, G-8 coordinates with Army Futures Command (AFC) for program funding for all elements of the future force materiel modernization enterprise. Position Description: Manages Army cyber capability development within the Intelligence Division. Provides analytical and technical expertise on cyber defense, network operations, and offensive cyber modernization. Develops information papers, briefings, and SPAR/POM inputs addressing capability gaps, performance, and operational integration. Coordinates with ASA(ALT), T2COM, ARCYBER, INSCOM, and ARSTAF to align cyber initiatives with Army and Joint modernization strategies. Relevant Competencies / Skill Levels: A Bachelor's Degree in Engineering and/or Business A minimum of four (4) years of experience and expertise in Force Development duties Demonstrates expert analytical and technical skills in cyber systems architecture, network defense, and offensive cyber capabilities. Proficient in evaluating system performance, security posture, and modernization impacts to ensure resilient and adaptive cyber operations. Possesses advanced analytical and communication abilities to deliver clear, data-driven assessments that enhance Army cyber capability development and operational readiness Benefits: 401(k), Paid Time Off (PTO), Paid Holidays, Medical and Dental Plans, Life and Disability insurance, Education Assistance (and more). JANUS strives to provide opportunities for career growth through training and development. We also offer an attractive comprehensive benefit package to include health and welfare plans and financial products. As part of a total rewards program, employees can benefit from our referral bonus program, and other various employee awards. JANUS Research Group takes pride in our benefit package and rewards program which has earned us the certification of a Great Place to Work JANUS Research Group provides reasonable accommodation so that qualified applicants with a disability may participate in the selection process. Please advise us of any accommodations you request to express interest in a position by e-mailing: Judy Pagac, Chief Human Resources Officer at **************************** or calling **************. Please state your request for assistance in your message. Only reasonable accommodation requests related to applying for a specific position within JANUS Research Group will be reviewed at the e-mail address and phone number supplied. Thank you for considering a career with JANUS Research Group. JANUS Research Group participates in the Electronic Employment Verification Program. Please click the E-Verify link below for more information. E-Verify JANUS Research Group is an equal opportunity/ affirmative action employer. It is company policy to provide equal opportunity in all areas of employment practice without regard to race, color, religion, sex, sexual orientation, national origin, age, marital status, veteran status, citizenship, or disability. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment qualified individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability.
    $87k-120k yearly est. 26d ago
  • Information Assurance Analyst 2

    C2 Labs

    Information security analyst job in Washington, DC

    C2 Labs, Inc. - ************** C2 Labs partners with clients on their IT transformation journey via data-driven IT strategic planning, application rationalization and redevelopment, and innovative research and development of new industry standards and technologies. C2 Labs provides specialized products and services that allow our clients to innovate with speed and scale seamlessly while maintaining a robust and effective security posture. C2 has a unique approach to client success enablement that is empowered by ART (Application Rationalization and Transformation) and SCIENCE (Strategic Client Interview and Engineering to assess, design, and implement Cloud Ecosystems) to couple creative new approaches/technologies with proven methodologies that deliver rapid results. Must be a US Citizen and capable of passing a Public Trust background investigation. Job Summary: As aInformation Assurance Analyst 2n at C2 Labs you will work with a team of security analysts and engineers to implement regulatory frameworks such as the Federal Information Security Modernization Act (FISMA), the Federal Risk Authorization Management Program (FedRAMP) and the State Risk Authorization Management Program (StateRAMP). You will leverage GRC tools to develop security authorization package documentation such as the System Security Plan (SSP), Security Assessment Plan (SAP), Security Assessment Report (SAR), and the Plan of Actions & Milestones (POA&M) in human readable and machine-readable formats. You will draft security control implementation statements with enough detail to facilitate the testing of the controls and will develop supporting documentation including the Contingency Plan (CP), Incident Response Plan (IRP), and Configuration Management Plan (CMP). As a GRC Analyst 3 your primary responsibility will be to ensure the timely development of the security authorization package in accordance with C2 Labs quality standards. Must be a US Citizen and capable of passing a Public Trust background investigation. Job Responsibilities: Categorize systems in accordance with Federal Information Processing Standards (FIPS) 199 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60. Select and tailor security controls by applying scoping guidance in accordance with NIST SP 800-53 and FedRAMP specific guidance. Document the implementation characteristics for security controls with enough detail to permit the testing of the security control by an independent assessor/Third Party Assessment Organization (3PAO). ● Develop, review, and update security authorization package documentation to include the System Security Plan (SSP), Security Assessment Plan (SAP), Security Assessment Governance Risk and Compliance (GRC) Analyst 3 Report (SAR), and Plan of Actions and Milestones (POA&M). ● Develop, review, and update supporting documentation including the Contingency Plan (CP), Incident Response Plan (IRP), and Configuration Management Plan (CMP). ● Conduct Security Impact Assessments (SIAs) on changes to information systems. ● Create the Control Implementation Summary (CIS)/Customer Responsibility Matrix (CRM) workbook outline Cloud Service Provider (CSP) and customer responsibilities. ● Develop, review, and update policies and procedures to support the implementation of the NIST 800-53 control families. ● Leverage the next generation of Governance Risk and Compliance (GRC) tools to automate the creation of the SSP. ● Review current security assessment and authorization processes and provide recommendations for improvement. ● Develop Risk Assessment Reports (RAR). ● Provide guidance on NIST 800-53, FedRAMP, and StateRAMP control requirements. ● Develop and deliver training to educate stakeholders on the various tasks and activities associated with the RMF. Qualifications: ● Minimum 3-5 years' experience in IT consulting specializing in Governance, Risk, and Compliance using the RMF. ● CISSP, CISM, or CAP certification is preferred ● Excellent communication and interpersonal skills, with the ability to build a rapport and trust with clients. ● Knowledge of the cybersecurity industry to include regulatory frameworks such as the National Institute of Standards in Technology (NIST) Risk Management Framework (RMF), Federal Risk Authorization Management Program (FedRAMP), Department of Defense (DoD) Impact Levels (2-6), and the State Risk Authorization Management Program (StateRAMP). Governance Risk and Compliance (GRC) Analyst 3 ● Possesses an in-depth understanding of the FedRAMP authorization process and associated templates and deliverables. ● Must have experience creating security authorization package documentation (i.e., SSP, SAP. SAR, & POA&M) and managing system authorization artifacts for a FedRAMP authorized cloud environment. ● Candidates must be United States citizens and able to successfully complete and maintain a Public Trust security clearance. ● Background check and unannounced drug testing required. ● This position is onsite in Washington, DC, with occasional travel (up to 25%) for client meetings and work assignments. Working knowledge of: ● NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations ● FedRAMP Security Controls Baselines (i.e., Low, Moderate, High, and Li-SaaS) ● StateRAMP Security Control Baselines (i.e., Low Impact Ready, Low Impact Authorized, Moderate Impact Ready, Moderate Impact Authorized) ● NIST SP 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems ● Must have strong technical writing skills. ● Must be able to work independently under only general direction. ● Must be able to interpret and provide consulting expertise on FedRAMP security requirements. ● Must have extensive knowledge in reviewing, analyzing, and documenting the secure implementation of logical controls, physical controls, environmental controls, personnel security, and incident handling. ● Experience preparing monthly continuous monitoring deliverables (e.g., vulnerability scans, POA&Ms, and asset inventory) for submission to the FedRAMP PMO. EOE STATEMENT: We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen.
    $64k-91k yearly est. 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Washington, DC

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 17h ago
  • Information Systems Security Analyst

    Qmulos

    Information security analyst job in Washington, DC

    Qmulos is recruiting cybersecurity specialists who want to challenge themselves by working with brilliant people to solve some of today's most important cybersecurity problems. As an emerging cybersecurity software and consulting company in the heart of Washington D.C., we need highly motivated individuals who think of big ideas, work well with others, and can help solve game-changing problems. We need creative people whose intelligence is matched only by their grit. Among only a small group of Silicon Valley-style startups in D.C., Qmulos you'll work with industry trailblazers and global private-sector and public-sector clients to help solve national security problems. Job Description Research, verify and document information security controls using the Federal Certification and Accreditation (C&A) processes. Propose, communicate, and enforce security policies, procedures and methodologies. Collect, compile, and report IA and CND metrics relating to Connection Approval Process, Certification and Accreditation Compliance, Information Assurance Vulnerability Management Compliance, Inspection Compliance Status, and FISMA Compliance. Analyze reports from vulnerability assessment scanners, patch management tools, and emerging threat information to advise on the risk and remediation of security issues. Develop Plan of Action and Milestones (POA&Ms) for identified vulnerabilities to initiate, coordinate and track the patching and remediation of security weaknesses. Conduct reviews: security authorization documents, event logs, security incidents. Report on security status and security incidents. Coordinate Authorization packages. Qualifications Bachelor's Degree (Preferable: Computer Science, Information Systems, Software Engineering or other related analytical, scientific, or technical disciplines) 5+ years experience in IT security, including Certification and Accreditation and/or IT security risk analysis/advice, preferably in support of the Federal government. Knowledge of Federal government C&A practices and policies (Preferable: ICS 503, FISMA, NISP SP 800-53, and DHS 4300) 5+ years experience with information assurance tools preferred 5+ years experience working directly with a federal client Ability to work independently and also collaborating closely with project managers, engineers, and others Working knowledge of Ongoing Authorization with in the NIST Framework Excellent written and oral communication skills Clearance Requirements: Active Top Secret Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-111k yearly est. 17h ago
  • Safety and Security Data Analyst

    AHU Technologies Inc.

    Information security analyst job in Washington, DC

    Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities Gather and accurately organize safety and security data collected from various internal and external sources. Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets. Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas. Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes. Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data. Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data. Qualifications Minimum Requirements Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting). Demonstrable experience with data collection, maintenance, and basic reporting. Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records. Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment. Unwavering ability to maintain confidentiality and protect sensitive data. Preferred Skills Familiarity or exposure to basic data visualization techniques. Working knowledge of or familiarity with programming languages such as Python and SQL. Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries. Prior exposure to or experience with safety, security, or transportation-related data.
    $66k-95k yearly est. 9d ago
  • Senior Information Assurance Analyst

    Serviss LLC

    Information security analyst job in Washington, DC

    Job Description About SERVISS At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional. Position Summary We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise-able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks. Key Responsibilities · Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management. · Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements. · Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). · Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP). · Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications. · Conduct system security assessments, gap analyses, and continuous monitoring activities. · Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities. · Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes. · Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas. Required Qualifications · 10+ years of experience in information assurance, cybersecurity engineering, or GRC. · In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP). · Strong technical foundation with the ability to understand complex systems, architectures, and security configurations. · Excellent verbal and written communication skills, including experience preparing formal security documentation and reports. · Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams. · Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate's degree with 2+ years of additional relevant experience. Preferred Qualifications · Prior experience supporting U.S. federal agencies or DoD environments. · Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+. · Experience with security automation tools and continuous compliance approaches. · Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture. Why Join SERVISS Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way. Freedom to Thrive. · Be part of an exciting company with ground floor opportunities to include equity · Highly competitive compensation and best in class benefits · Opportunities for annual performance bonuses, growth incentives, and profit-sharing · 100% of medical, vision, dental, and life insurance premiums covered by SERVISS · 401(k) retirement plan with company match for the first 6% Note: This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025. Powered by JazzHR IeT9pwcqIE
    $92k-123k yearly est. 26d ago
  • Incident Detection Analyst

    Tyto Athene 4.2company rating

    Information security analyst job in Washington, DC

    Tyto Athene is searching for a **Incident Detection Analyst** to support our customer in Washington, DC. **Responsibilities:** + Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC needs. + Conduct Incident Triage to prioritize newly identified security incidents for follow-on action. Identify all relevant data sources for initial collection to determine prioritization and resource application based on the criticality of the incident. Conduct immediate actions to evaluate and contain threats as necessary in accordance with the Judiciary Security Operations Center Incident Response Plan (JSOCIRP), Incident Response Operations Guide, and any other published SOC operations guides and manuals. Please see SLA SOC3. + Perform deep dive analysis (manual and automated) of malicious links and files. + Ensure efficient configuration and content tuning of shared SOC security tools to eliminate or significantly reduce false alert events. + Provide Executive Summary in accordance to IDT Operations Guide. + Provide 5W briefing slides for each event for leadership briefing. + Provide on demand time/trend/event based metric reports for SOC management. + Provide clear and actionable event notifications to customers. Notifications to customers will be clear and provide sufficient detail for a mid-level system or network administrator to understand what has occurred and what needs to take place to remediate the event. + Coordinate and provide direct support to local incident responders at the circuit, local court unit and program office levels. Provide notifications, guidance and end to end incident response support to local incident responders to ensure the appropriate actions are properly taken to detect, contain, eradicate and recover from identified security incidents. Coordinate with various other SOC teams to leverage the appropriate resources to enable local incident responders. Participate in course of action (COA) development and execution as necessary. + Document all communications and actions taken in response to assigned incidents in the SOC ticketing system. Ensure tickets are properly updated in a timely manner and all artifacts are included. Escalate any concerns or requests through the Contractor management as necessary. + Directly support the Judiciary Special Tactics and Active Response (JSTAR) team and provide incident response support for critical security incidents as they arise. + Perform appropriate event escalation for events, notifications, and non-responsiveness from customers. Contractors shall track all notifications in the SOC ticketing system and escalate tickets to Watch Officers or SOC management in cases where the customer is non-responsive or requires clarification that is outside the scope of the normal operations. Contractors will be familiar with the JSOCIRP escalation and reporting procedures. + Continuously review and update the Incident Handlers (IH) Guide and provide recommendations to annual updates for the JSOCIRP. All SOPs and Op Guides are federal government property. Contract staff provide recommendations in draft form for federal management review, approval and adoption. + Incident Responders must be able to perform the tasks and meet the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework for the role of Cyber Defense Incident Responder **Qualifications** **Required:** + 6 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and Network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs; + Ability to communicate clearly both orally and in writing. + Working experience with Splunk SIEM. + At least three years of experience working at a senior level, performing analytics examination of logs and console events and creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, in SIEM environments **Education/Certifications:** + Bachelor's degree in information systems, Computer Science or related field is preferred. // Splunk Fundamentals I & II certification. **Clearance:** + Public Trust **Hours of Operation/Shift:** + Monday-Friday 3PM EST - 1130PM EST **About Tyto Athene** **Compensation:** + Compensation is unique to each candidate and relative to the skills and experience they bring to the position. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range. **Benefits:** + Highlights of our benefits include Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave. Tyto Athene is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success. Our expertise spans four core technology domains-Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT-empowering our clients with cutting-edge solutions tailored to their evolving needs. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National Security, Civilian, Health, and Public Safety clients across the United States and worldwide. At Tyto Athene, we believe that success starts with our people. We foster a collaborative, innovative, and mission-driven environment where every team member plays a critical role in shaping the future of technology. Are you ready to join #TeamTyto? Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, [sexual orientation, gender identity,] national origin, disability, status as a protected veteran, or any characteristic protected by applicable law. Submit a Referral (******************************************************************************************************************************* **Location** _US-DC-Washington_ **ID** _2025-1522_ **Category** _Cybersecurity_ **Position Type** _Full-Time_
    $62k-88k yearly est. 60d ago
  • Senior Cloud Security Analyst

    Adnet Accountnet

    Information security analyst job in Washington, DC

    About Us: AdNet/AccountNet, Inc. is an 8(a), WOSB, LGBTE, and WBE owned management consulting firm founded in 1990. We blend the best in people with the ongoing demands of the workplace by providing high-quality staffing and executive search services. All applicants for this position must be DC-based - no exceptions. IT Department Overview Our mission is to collaborate and deliver secure, stable, and reliable IT solutions that meet organizational needs, with a focus on high-end user satisfaction and cost-effectiveness. The IT Department is a dedicated team of collaborative professionals committed to providing world-class support and driving innovation for a primarily U.S.-based staff. We leverage modern and, in some cases, cutting-edge tools and technologies to support our mission. Position Summary: Senior Cloud Security Analyst The Senior Cloud Security Analyst plays a key role in advancing the organization's cybersecurity initiatives. This individual will lead and contribute to multiple security-focused projects, working closely with the broader IT team to assess and strengthen the organization's cloud security posture. Responsibilities include identifying and remediating configuration vulnerabilities across cloud platforms, infrastructure, and services. The role also involves enhancing the organization's advanced threat detection and incident response capabilities through real-time intelligence, threat research, automation, and innovative solutions. In addition, the analyst will support projects related to the organizations compliance with the NIST Cybersecurity Framework (CSF), including risk mitigation efforts. This position may also include special project management responsibilities as assigned. Reports To: Director of Cybersecurity Qualifications/Skills: The candidate must possess the following skills and educational achievements: Must be a strategic thinker, able to understand and act upon the organization's objectives. Excellent verbal and written communication skills. Strong problem solving and research skills. Event analysis expertise leveraging Security Information and Event Managment (SIEM) and cloud native tools. Incident investigation and response expertise, including the ability to interpret cloud platform alerts and events and parse through logs and analyze log data. Knowledge of current threat landscape, including knowledge of malware operation and indicators. Deep understanding of identity management and access security for cloud environments. Security and architecture experience with AWS, Azure, M365, and SaaS platforms with expertise in one or more platforms. Familiarity with cybersecurity standards and frameworks, and knowledge of audit requirements (e.g., NIST, PCI, HIPPA, etc.) Undergraduate or Master's Degree in Cybersecurity or related field or commensurate experience. Certification of one or more of the following, preferred: ISC2 CCSP, AWS Certified Security Specialty, MS Certified Azure Engineer Associate. 5+ years' experience in cybersecurity. Able to identify, select, track, and report on security metrics. Detailed Duties: Proactively hunt for abnormal configuration, permissions, workloads, user behaviors or other indicators of compromise. Identify and respond to cyber threats occurring within the company's cloud environments. Enhance security monitoring, alerting and automated response capabilities and improve existing threat hunting capabilities that align with the global direction. Monitor, investigate and analyze logs and security-related events utilizing existing tools in the environment. Improve the meaningfulness of alerts and reduce the instances of false positives by calibrating the alert thresholds. Creating and maintaining playbooks and automated response capabilities. Stay up to date with current threat actors and the TTPs used by actively researching emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our networks. Fulfill responsibilities as it relates to POAMs generated from risk assessments. Lead time-sensitive projects tied to risk remediations, including ensuring completion of such projects per agreed upon schedule.
    $81k-110k yearly est. 60d+ ago
  • Information Systems Security Officer - TS Clearance

    Svd Solutions

    Information security analyst job in Washington, DC

    SVD Solutions is focused on providing comprehensive Information Security/Assurance advisory services to Senior Executives of government and commercial organizations. We are an intelligence-driven management consulting firm that leverages its expertise in security to ensure that executive, organizational, and technical goals and objectives are fully achieved. At SVD Solutions, our core competency is focused on all security matters; from IT Security Surveillance to Intelligence Handling, Incident Response to Forensics, and from Physical Security to Investigations, we handle it all. Job Description ***REQUIRES APPLICANT TO POSSESS CURRENT/ACTIVE TS CLEARANCE PRIOR TO APPLYING*** SVD Solutions is seeking a qualified security-focused professional that can help our federal client achieve mission success through expert level risk avoidance. The ideal candidate will have hands-on experience leading IT security efforts for federal clients and be able to foster a corporate culture of IT security acceptance through interdepartmental relationship building. The candidate will be challenged to apply defense-in-depth techniques, including both process and technical based, on a daily basis securing federal information systems. All work will be performed both on site in the D.C. Metro Area with limited/occasional local travel as necessary. This position may have the ability for some hybrid/remote options. Inquire for more details. Seeking Individuals with experience: Delivering high-quality client solutions to support the design of security architectures for federal clients Performing compliance monitoring, analysis, tracking and reporting Applying the NIST Risk Management Framework and NIST SP 800-53 security controls Analyzing and re-mediating weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation Configuring, designing, or analyzing security controls relevant to networked systems 10+ years of IT experience preferred Qualifications Must be able to obtain and maintain a Top Secret/SCI clearance Preference given to individuals with certifications like the CISSP, CISM, CISA, CEH, or Security+ Must be able to demonstrate integration of regulations and processes such as NIST 800 series special publications, Risk Management Framework (RMF), and Federal Information Security Act (FISMA) reporting for national security systems (NSS) Must have exceptional writing capabilities on technical and process security controls Must be able to articulate risk mitigation and answer IT Security questions in a professional manner Experience briefing Federal Executive Staff on IT Security matters is a plus BS in Computer Science Information Systems or related field is a plus Additional Information This is an immediate fill position. Interviews for qualified candidates are being conducted now. We offer great benefits, including medical, dental, vision, federal holidays observed, and paid time off.
    $70k-94k yearly est. 17h ago
  • Information System Security Officer / ISSO

    Nxtkey 3.9company rating

    Information security analyst job in Washington, DC

    NXTKey provides commercial and government entities with the horsepower to drive their business machine faster and more efficiently to successful outcomes. To support our customers needs; we excel at providing Cyber Security, Enterprise Information Management, ICT Consulting, Development, Project Management and Business Process Services and Solutions. Job Description Information System Security Officer / ISSO duties include: Perform Certification & Accreditation (C&A), System Assessment & Authorization (SA&A) as part of NIST SP 800-37 Risk Management Framework (RMF) system and application accreditation Prepare Vulnerability Scanning test plans, coordinate testing, and conduct scans using Nessus, Foundstone, WebInspect, Hailstorm and other scan applications Evaluation of the assigned information systems' security control compliance with the federal requirements and the client's monitoring strategy Management of emerging and defined risks associated with the administration and use of assigned information systems Coordination with the client's Cybersecurity Unit to achieve and maintain the information systems' compliance and authorization to operate (ATO) Ensuring systems are operated, maintained, and disposed of in accordance with policies outlined in the approved security authorization package Performing annual assessments to ensure compliance with the client's policies and standards Serve as a member of the Configuration Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented Ensuring information system security requirement are addressed during all phases of information systems lifecycle Establishing audit trails, ensuring their review, and making them available while retaining audit logs in accordance of DOJ and component policies Generate and interpret documentation needed to address the items detailed within the GRC tool Work within a team environment to provide technically sound guidance order to adhere to the cybersecurity industry best practices and the client's monitoring strategy Analyze collected information to identify vulnerabilities and potential for exploitation and effectively present the results and guidance derived from scans to system owners or other leadership, as required Effectively communicate orally and in writing to track and detail the demands, efforts, and shortcomings in meeting the goals of the client's information system monitoring strategy Support the integration/testing, operations, and maintenance of systems security Develops, updates, and maintains internal Standard Operating Procedures for all internal assigned functions Aligns business processes and information technology strategy with the conditions and circumstances of the functional environment and establishes effective performance measures Contributes to the definition and implementation of planning processes and/or systems at the enterprise level including both strategic and operational activities Provides system operation support, administers hardware and software inventory Qualifications Required Skills • B.A. or B.S. in Computer Science or a related field • System authorizations and configuration management • Experience creating or modifying information security documentation • Experience testing and documenting information security controls (NIST SP 800-53) Additional Information Active Public Trust clearance, adjudicated within past 5 years. Must have worked on US Federal Government Projects.
    $70k-93k yearly est. 17h ago
  • IAM and Security Systems Analyst

    Year Up 3.8company rating

    Information security analyst job in Washington, DC

    About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection. This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response. Key Responsibilities Identity & Access Management (IAM) Manage and support identity platforms including Active Directory, Azure AD, and Okta. Implement RBAC, least privilege principles, and automated provisioning/deprovisioning. Conduct periodic access reviews and support access certification processes. Integrate IAM controls into application and cloud environments. Security Engineering & Tooling Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools. Manage SIEM tools including rule tuning, log ingestion, and correlation. Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST). Perform application security testing and contribute to threat modeling and risk evaluations. Lead cloud control monitoring, data protection measures, and compliance reporting. Threat Detection & Incident Response Conduct analysis of security alerts and lead incident response efforts. Leverage threat intelligence to update detection mechanisms and enhance response playbooks. Perform root cause analysis and evidence handling following incidents. Support red team/blue team exercises and penetration testing activities. Architecture, Process & SDLC Integration Review and evaluate system and application security architectures. Support integration of security controls across the SDLC and DevSecOps pipelines. Design and continuously improve security processes and documentation. Participate in security metrics and reporting efforts to track control effectiveness. Support SOC design discussions and contribute to its operational maturity. Collaboration & Compliance Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives. Assist with internal and external audits, control documentation, and evidence collection. Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001. Help run awareness training, phishing simulations, and risk assessments. This is a hybrid role that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC. Salary Range: $90,000-$110,000/annually Required Qualifications 3-5 years of experience in a security engineering or analyst role Strong experience with IAM platforms (Active Directory, Azure AD, Okta) Proficient in SIEM platforms, incident response, and Microsoft security tools Experience with automated security testing tools (SAST, DAST) Familiarity with cloud security (Microsoft 365, Azure) and application security principles Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus) Strong understanding of network protocols, system hardening, and endpoint defense Excellent problem-solving and communication skills Preferred Qualifications Familiarity with red teaming, penetration testing, and threat modeling Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001 Participation in SOC design or operations Experience with security metrics/reporting and risk assessments Why Join Us: You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains. #LI-HybridCOMPENSATION & BENEFITS: Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process. Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants. Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year. Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year) ** This is an exempt role (paid on a salaried basis). ** ORGANIZATION DESCRIPTION: Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington. Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission. COMMITMENT TO DIVERSITY: Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: *************************************************************** Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially. TO APPLY: Please submit a thoughtful cover letter and resume through our website. Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
    $33k-40k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Washington, DC

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 60d+ ago
  • Information Systems Security Analyst

    Qmulos

    Information security analyst job in Washington, DC

    Qmulos is recruiting cybersecurity specialists who want to challenge themselves by working with brilliant people to solve some of today's most important cybersecurity problems. As an emerging cybersecurity software and consulting company in the heart of Washington D.C., we need highly motivated individuals who think of big ideas, work well with others, and can help solve game-changing problems. We need creative people whose intelligence is matched only by their grit. Among only a small group of Silicon Valley-style startups in D.C., Qmulos you'll work with industry trailblazers and global private-sector and public-sector clients to help solve national security problems. Job Description Research, verify and document information security controls using the Federal Certification and Accreditation (C&A) processes. Propose, communicate, and enforce security policies, procedures and methodologies. Collect, compile, and report IA and CND metrics relating to Connection Approval Process, Certification and Accreditation Compliance, Information Assurance Vulnerability Management Compliance, Inspection Compliance Status, and FISMA Compliance. Analyze reports from vulnerability assessment scanners, patch management tools, and emerging threat information to advise on the risk and remediation of security issues. Develop Plan of Action and Milestones (POA&Ms) for identified vulnerabilities to initiate, coordinate and track the patching and remediation of security weaknesses. Conduct reviews: security authorization documents, event logs, security incidents. Report on security status and security incidents. Coordinate Authorization packages. Qualifications Bachelor's Degree (Preferable: Computer Science, Information Systems, Software Engineering or other related analytical, scientific, or technical disciplines) 5+ years experience in IT security, including Certification and Accreditation and/or IT security risk analysis/advice, preferably in support of the Federal government. Knowledge of Federal government C&A practices and policies (Preferable: ICS 503, FISMA, NISP SP 800-53, and DHS 4300) 5+ years experience with information assurance tools preferred 5+ years experience working directly with a federal client Ability to work independently and also collaborating closely with project managers, engineers, and others Working knowledge of Ongoing Authorization with in the NIST Framework Excellent written and oral communication skills Clearance Requirements: Active Top Secret Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-111k yearly est. 60d+ ago

Learn more about information security analyst jobs

Do you work as an information security analyst?

What are the top employers for information security analyst in DC?

Top 9 Information Security Analyst companies in DC

  1. Google via Artech Information Systems

  2. Booz Allen Hamilton

  3. Qmulos

  4. ADP

  5. JANUS Research Group

  6. NANA

  7. Year Up

  8. USM Business Systems

  9. Robert Half

Job type you want
Full Time
Part Time
Internship
Temporary

Browse information security analyst jobs in district of columbia by city

All information security analyst jobs

Jobs in District of Columbia