Post job

Information security analyst jobs in Hagerstown, MD

- 180 jobs
All
Information Security Analyst
Cyber Security Analyst
Security System Engineer
Information Systems Security Officer
Senior Security Analyst
Security Engineer
  • Cyber Security Analyst

    Dunhill Professional Search & Government Solutions

    Information security analyst job in Germantown, MD

    Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate data and cyber security risks. Develops acceptance criteria for cybersecurity architecture. Investigates computer and information security incidents to determine extent of compromise to national security information and automated information systems. Assists with defining security objectives and system-level performance requirements. Researches and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities. Configures and validates secure systems, tests security products/systems to detect computer and information security weaknesses. Maintains the computer and information security incident, damage and threat assessment programs. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Involved in the periodic conduct of a review of each system's audits and monitors corrective actions until all actions are closed. Supports the development of integrated system solutions ensuring proprietary/confidential data and systems are protected. Involved in the establishment of strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Minimum Qualifications Bachelor's Degree in Computer Science or a related field or equivalent experience. 2-4 years of experience in systems security. Other Job Specific Skills Must be able to communicate effectively and clearly present technical approaches and findings. Exercises a limited degree of latitude in determining technical objectives of assignments. Excellent attention to detail. Must be able to balance multiple tasks simultaneously. #cjpost
    $74k-101k yearly est. 2d ago
  • Application Security Engineer

    Vivsoft

    Information security analyst job in Herndon, VA

    Title: Application Security Engineer Clearance Required: Public Trust Position Type: Full-Time About the company: At VivSoft, we aim to solve complex federal problems using emerging and open technologies in a collaborative and rewarding environment. VivSoft is a diverse team of strategists, engineers, designers, and creators experienced in building high performance effective softwares, with impactful organizational design and organizational dynamics for software delivery. We build secure Software Factories based on DoD reference designs and NIST Frameworks for Cloud and DevSecOps. These factories deliver AI/ML Applications, Data Science Platforms, Blockchain and Microservices for DoD, Healthcare and Civilian Agencies Job Summary: We are seeking an Application Security Engineer to support the modernization of a large-scale enterprise software development platform. This role focuses on securing CI/CD pipelines, enforcing DevSecOps best practices, and implementing automated security testing throughout the SDLC. The engineer will work closely with development and platform engineering teams to embed security into reusable templates, GitHub Actions, and deployment workflows, ensuring applications are built and deployed securely across environments. Key Responsibilities: Using GitHub Advanced security, review security findings of the organization. Review, validate, and approve request to remediate security findings. Review, validate, and approve request to dismiss security findings. Collaborate with Federal POC and FDIC security team to create and implement application security processes and standards. Identify gaps and design solutions to improve application security at the FDIC. Provide guidance to FDIC developers in regard to remediating findings when needed. Required Skills: Bachelor's degree in Computer Science, Engineering, Information Technology, or related field, or equivalent professional experience. Proficiency in at least one or two major enterprise languages (e.g., Java, .Net, C#, JavaScript) to effectively review code and understand development context. Experience integrating security tools (SAST/DAST/SCA) into CI/CD pipelines to automate vulnerability scanning. Proficient in conducting and interpreting results from SAST (Static Analysis Security Testing) DAST (Dynamic Analysis Security Testing) Manual Code Review for security flaws Deep understanding of the OWASP Top 10 and other common application security attack vectors (e.g., injection, XSS, broken access control). Knowledge of security considerations for large, complex enterprise architectures, which may include Cloud Security (AWS, Azure, or GCP), API security, and microservices.
    $81k-112k yearly est. 3d ago
  • Information Security Analyst

    Select Cyber

    Information security analyst job in Gaithersburg, MD

    Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client: Information Security Analyst Be part of a cutting-edge Computer Incident Response Tea, (CIRT) for a fortune 500 client. The selected candidate will be responsible for identifying and mitigation of external and internal threats. Responsibilities: Perform the following functions as individual assignments or as part of a team: Respond to alerts from various monitoring systems and platforms Triage potentially malicious events to determine severity and criticality of the event Analyze network traffic using a variety of analysis tools in support of service objectives Analyze malicious artifacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement Identify, develop, and implement new detections and mitigations across the services platforms Communicate and collaborate with the analyst team for situational awareness Communicate threat information with clients accurately and professionally through formal and informal interactions Apply structured analytical methodologies to maximize threat intelligence growth and service efficacy. Requirements: Perform the following functions as individual assignments or as part of a team: 3-7 years of technical experience supporting enterprise-scale Secure Operations Centers Experience with log collection and analysis, network and host monitoring platforms, and various analysis tools including Splunk, Symantec Security Analytics, Wireshark, and Vortex. Experience analyzing logs for indicators of compromise, collected from various network monitoring devices such as firewalls, IDS/IPS, web proxies, email filters, etc. Experience defining and refining operational procedures, workflows, and processes to support analyst team in consistent, quality execution of defensive mission Functional knowledge of at least one scripting languages (Python, perl, bash, etc) Proficiency with Linux CLI tools (awk, sed, jq, etc)
    $77k-109k yearly est. 60d+ ago
  • Cyber Security SME

    Precision Solutions 4.1company rating

    Information security analyst job in Sterling, VA

    Overview Cyber Security SME Hybrid | 2-3 days on-site in Washington D.C. Current TS/SCI required The Cyber Security Subject Matter Expert (SME) will play a key role in ensuring the security and compliance of enterprise production applications within a cloud-based environment. The SME will work closely with the Development, Cloud, and DevSecOps teams, as well as the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and Security Control Assessor (SCA), to support the full lifecycle of system authorization activities-including achieving and maintaining Authority to Operate (ATO) or Authority to Connect (ATC). The ideal candidate will provide expert guidance on cybersecurity architecture, coordinate CONOPS and design reviews, drive remediation of security findings, and develop cybersecurity standards and frameworks across the program-rooted in Zero Trust principles. Responsibilities ATO/ATC Support: Lead and coordinate efforts to obtain and maintain ATO/ATC for production systems, ensuring compliance with applicable security frameworks. Collaboration Across Teams: Partner with Development, Cloud, and DevSecOps teams to integrate security throughout the SDLC and CI/CD pipelines, ensuring secure-by-design implementations. Architecture & CONOPS Coordination: Review and contribute to system architectures, data flows, and Concept of Operations (CONOPS) documents to ensure alignment with Zero Trust principles and organizational security policies. Security Findings Management: Support and track the remediation of vulnerabilities and deficiencies identified through scans, assessments, and audits; create and manage Plans of Action & Milestones (POA&Ms) as required. Cybersecurity Standards Development: Develop and maintain enterprise cybersecurity standards, guidelines, and best practices to ensure consistent implementation of security controls across all program systems. Continuous Monitoring: Support ongoing assessment and authorization (A&A) activities, including risk assessments, configuration management, and continuous monitoring reporting. Zero Trust Implementation: Guide teams in applying Zero Trust Architecture (ZTA) principles-identity-centric access control, micro-segmentation, least privilege, and continuous validation-to all system designs and processes. Requirements 5+ years of progressive experience in cybersecurity, with at least 3 years supporting federal ATO/ATC processes. In-depth knowledge of NIST RMF, FedRAMP, and Zero Trust Architecture frameworks. Experience collaborating with ISSOs, ISSMs, SCAs, and engineering teams. Familiarity with AWS cloud environments and DevSecOps pipelines. Strong technical understanding of network security, IAM, encryption, and vulnerability management. Excellent communication and coordination skills. Preferred Qualifications CISSP, CISM, CAP, or equivalent cybersecurity certification. Experience with containerized applications, infrastructure as code (IaC), and continuous compliance tools. Clearance Requirements Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Must have a current TS/SCI Education/Certification Requirements A Bachelor's degree in Computer Science, Information Systems, or a related field is required for this position Other DutiesPlease note that this job description is not intended to be a comprehensive listing of all activities, duties, or responsibilities required of the employee in this role. Duties, obligations, and activities are subject to change at any time, with or without notice.
    $75k-104k yearly est. Auto-Apply 34d ago
  • Mid-Level EAD Cyber Threat Analyst - KOREAN

    Lis Solutions 3.7company rating

    Information security analyst job in Herndon, VA

    LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements. Job Description LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues. In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better. Responsibilities: • Direct and conduct all-source analysis and targeting to identify, monitor, and assess • Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings • Apply demonstrated subject matter expertise • Apply knowledge of regional topics • Analyze and report on trends and activity Qualifications Qualifications: • Korean Language proficiency at ILR-3 level • Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments • Possess a good understanding of Intelligence Community (IC) guidelines and directives • Experience conducting all-source analysis of cyber topics • Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and Terminology Management Databases • Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work. Requirements: • U.S. Citizenship • Active Government Investigation Additional Information Benefits • Medical, Vision, Dental • Employee Assistance Program (EAP) • Evacuation • Long Term Disability • Term Life All your information will be kept confidential according to EEO guidelines.
    $74k-101k yearly est. 1d ago
  • Cyber Host Forensic Analyst IV

    Nightwing

    Information security analyst job in Sterling, VA

    Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The DHS's Hunt and Incident Response Team (HIRT) secures the Nation's cyber and communications infrastructure. HIRT provides DHS's front line response for cyber incidents and proactively hunting for malicious cyber activity. Nightwing, as a prime contractor to DHS, performs HIRT investigations to develop a preliminary diagnosis of the severity of breaches. Nightwing provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. Nightwing is seeking Host Forensics Analysts to support this critical customer mission. **Responsibilities:** - Assists with leading and coordinating forensic teams in preliminary investigations - Plans, coordinates and directs the inventory, examination and comprehensive technical analysis of computer related evidence - Distills analytic findings into executive summaries and in-depth technical reports - Serves as technical forensics liaison to stakeholders and explains investigation details to include forensic methodologies and protocols Tracks and documents on-site incident response activities and provides updates to leadership throughout the engagement - Evaluates, extracts and analyzes suspected malicious code - Acquire/collect computer artifacts (e.g., malware, user activity, link files) in support of onsite engagements - Triage electronic devices and assess evidentiary value - Correlate forensic findings to network events in support of developing an intrusion narrative - Collect and document system state information (e.g. running processes, network connections) prior to imaging, as required - Perform forensic triage of an incident to include determining scope, urgency and potential impact - Track and document forensic analysis from initial participation through resolution - Collect, process, preserve, analyze and present computer related evidence - Conduct analysis of forensic images, and available evidence in support of forensic write-ups for inclusion in reports and written products - Assist to document and publishing Computer Network Defense (CND) guidance and reports pertaining to incident findings **Required Skills/Clearances:** - U.S. Citizenship - Active TS/SCI clearance - Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability -5+ years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools - Ability to create forensically sound duplicates of evidence (forensic images) - Ability to author cyber investigative reports documenting digital forensics findings - Proficiency with analysis and characterization of cyber attacks - Proficiency with proper evidence handing procedures and chain of custody protocols - Skilled in identifying different classes of attacks and attack stages - Understanding of system and application security threats and vulnerabilities - Understanding of proactive analysis of systems and networks, to include creating trust levels of critical resources - Able to work collaboratively across physical locations - Proficiency with common operating systems (e,g, Linux/Unix, Windows) **Desired Skills:** - Proficiency with two or more of the following tools: --- EnCase --- FTK --- SIFT --- X-Ways --- Volatility --- WireShark --- Sleuth Kit/Autopsy --- Splunk --- Snort --- Other EDR Tools (Crowdstrike, Carbon Black, etc) - Proficiency conducting all-source research. **Required Education:** BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma & 7-9 years of host or digital forensics experience. **Desired Certifications:** _At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients._ _Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team._ _Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class._
    $74k-100k yearly est. 60d+ ago
  • Cyber Host Forensic Analyst IV

    Nightwing Intelligence Solutions

    Information security analyst job in Sterling, VA

    Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The DHS's Hunt and Incident Response Team (HIRT) secures the nation's infrastructure. HIRT provides DHS's front-line response for cyber incidents and proactive hunting for malicious cyber activity. Nightwing provides support for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Nightwing provides HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. Personnel perform investigations to characterize the level of severity of breaches and develop mitigation/remediation plans. Nightwing is seeking Incident Response Experts to support this critical customer mission. This position will require physical presence in the National Capital Region (NCR) for at least 1 week for training and orientation. Subsequent work will be primarily supported outside the NCR. Responsibilities: - Serves as hunt and incident response subject matter expert (SME), possessing in-depth knowledge on subjects relating to the conduct, activities, or operation of NCCIC HIRT in a surge capacity - Distills analytic findings into executive summaries and in-depth technical reports - Provide expert support, analysis, and research with only broad direction into exceptionally complex problems and processes relating to the subject matter as it relates to hunt and incident response activities - Serves as technical expert on high-level incident response teams providing technical direction, interpretation, and alternatives - Exercises considerable latitude in determining technical objectives of an assignment or task at hand - Independently develops technical solutions to complex problems that require the regular use of ingenuity and creativity - Guides the completion of hunt and incident response activities Required Skills: - U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - 8+ years of directly relevant experience in the area of expertise - Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]) - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code) - Must be able to travel domestically on short notice - Ability to think independently - Demonstrates superior written and oral communication skills - Must be able to work collaboratively across physical locations - Skilled in identifying different classes of attacks and attack stages - Understanding of system and application security threats and vulnerabilities - Understanding of proactive analysis of systems and networks, to include creating trust levels of critical resources - Proficiency with common operating systems (e,g, Linux/Unix, Windows) Desired Skills: - Experience leading and mentoring technical teams - Knowledge of Computer Network Defense policies, procedures and regulations - Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]) - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code) - WireShark - Splunk - Snort Required Education: BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10+ years of technical experience in the area of expertise. Desired Certifications: One or more - DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst - DoD 8140.01 GCIA, GCIH, CSSP Analyst/CSSP Incident Responder - DoD 8140.01 CEH, CSSP Analyst - SANS GIAC GNFA preferred - SANS GRID, GICSP, or GCIP a plus At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team. Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
    $74k-100k yearly est. Auto-Apply 50d ago
  • Cyber Incident Response Tier III Analyst

    Pingwind

    Information security analyst job in Martinsburg, WV

    PingWind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX. Required Clearance: Ability to obtain Tier 4 / High Risk Background Investigation Certifications: Must currently have or be willing to obtain one of the following certifications (or equivalent):• GIAC Certified Incident Handler• EC-Council's Certified Incident Handler (ECIH)• GIAC Certified Incident Handler (GCIH)• Incident Handling & Response Professional (IHRP)• Certified Computer Security Incident Handler (CSIH)• Certified Incident Handling Engineer (CIHE)• EC-Council's Certified Ethical Hacker Required Education • Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience) Required Experience: • 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) Responsibilities • In-depth forensics and root cause analysis for alerts and incidents• Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations and or appropriate next steps.• Perform post incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.• Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents.• Updating playbooks based on findings of the incident trends and outcomes of auditing tasks.• Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time• Create dashboards/reports based on these trends or searches to provide clarity of information being defined.• Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings.• Support mentoring and training of junior analysts on alerts, playbooks, and tools.• Stay informed of latest cybersecurity threats and best practices.• Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR• Make accurate determination of what alerts are false positives or require further investigation and prioritization • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences• Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks• Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders• Identify and action opportunities for tuning alerts to make the incident response team more efficient • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy• Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions• Support the mentoring and training of more junior IR staff• Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities Requirements • Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM• A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment• Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools• Experience with enterprise ticketing systems like ServiceNow• Excellent analytical and problem-solving skills• Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight• Ability to learn and function in multiple capacities and learn quickly• Strong verbal and written communication skills Preferred Qualifications • Ability to investigate Indicators of Compromise (IOCs) using Splunk by correlating logs from multiple sources to detect, trace, and assess threat activity across the enterprise• Experience leveraging Microsoft Defender for Endpoint (MDE) to perform endpoint investigations, analyze process trees, and validate IOCs during active threat scenarios• Ability to remediate phishing incidents, including analysis of email headers, links, and attachments, identifying impacted users, and executing containment actions such as user lockouts, email quarantine, and domain blacklisting• Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms About PingWind PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. **************** Our benefits include: • Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program • through Sun Life Financial EAP Guidance Resources Veterans are encouraged to apply PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
    $68k-92k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Information security analyst job in Herndon, VA

    MANTECH seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team **onsite** in **Herndon, VA or Reston, VA** in support of a high-priority mission at one of our National Intelligence Customers **.** **Responsibilities include but are not limited to:** + Responsible for supporting the acceptance of an Authorization to Operate (ATO) for the new Modern Data Platform (MDP) transformation + Support the documenting and navigating the customer's accreditation process for ATO + Work closely with Security Engineers to ensure security solutions are meeting customer accreditation requirements and following security controls + Will use RMF (Risk Management Framework) NIST 800-53, NISPOM, and ICDs for cybersecurity and information security protocols to drive tasking and ensure compliance + ISSE/ISSO tasking in support of documenting and navigating the customer's accreditation process for ATO **Minimum Qualifications:** + Bachelor's degree in a related field OR additional equivalent work experience + 5+ years of experience relevant to this position + Experience with Software Development Lifecycle, application security, Cloud principles and engineering + Expert in System Accreditation process and protocols within the Intelligence Community + Experience with NIST 800-53 and implementing Risk Management Framework + Understanding of vulnerability assessment tools like Rapid7 or Nessus + Knowledge of User Access Monitoring and Identity Access Management + Experience creating and reviewing system design documents and workflows **Preferred Qualifications:** + Experience with Terraform, SIEM and AI/ML Governance + Knowledge of cross-domain solutions, Zero Trust, and/or IDP (Identity Provider) integration skills + DoD 8570-compliant certification (e.g., Security+, CYSA+, CEH, or CISSP) + Experience with security tools such as Splunk, CrowdStrike, or Wireshark + Familiarity with SCAP tools, STIGs, or automated compliance reporting + Knowledge of incident response and digital forensics processes **Clearance Requirements:** + Must have active TS/SCI with Polygraph **Physical Requirements:** + Must be able to remain in a stationary position 50% of the time + Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. + Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $69k-90k yearly est. 60d+ ago
  • Information System Security Officer (ISSO)

    T-Rex Solutions 4.1company rating

    Information security analyst job in Ashburn, VA

    Job Description T-Rex Solutions is seeking a results-driven Information System Security Officer (ISSO) to support our U.S. Customs and Border Protection (CBP) Network Operations Center (NOC). The program objective is to provide ongoing support for CBP's NOC and Wireless Network Operations Center (WNOC), which are critical components within the Office of Information and Technology. These centers perform real-time monitoring, proactive maintenance, incident detection and response, problem resolution, and network performance reporting across CBP's nationwide enterprise. They ensure network stability, availability, and the rapid escalation and resolution of technical issues. This is a 24x7x365 operation with work performed on-site in Ashburn, VA. Responsibilities: The ISSO shall ben assigned to one or more existing FISMA Systems of Record as well as new IT Systems that are slated as new work products to develop an Authority to Operate (ATO) and follow-on Continuous Monitored system. Develop and maintain all required FISMA system documentation. Ensure systems adhere to Technical Reference Architecture (TRA) foundational and supplemental documents as additional security specifications, when applicable (available upon request). Use approved security tools for continuous monitoring and management of security baselines. Implement audit tools or processes for auditing and reporting services that support Continuous Diagnostics and Monitoring (CDM). Provide engineering services and participation in Continuity of Operations Planning (COOP) and Disaster Recovery (DR) planning and exercises. Develop and implement Configuration Management and Change Management plans when necessary. Perform or participate in threat and vulnerability management for applicable FISMA systems. Perform POA&M management. Requirements: Bachelor's degree in related technical field such as Management Information Systems, Computer Science, Engineering, IT, Networking and Telecommunications. A minimum of ten (10) plus years of related experience Certifications, such as Network+ and Security +, CISSP and Security auditing are recommended. Proficient in network and information system security principles and best practices. In-depth knowledge of the Risk Management Framework (RMF), the NIST publications, and the DHS 4300A Policy Directive. Experience with implementing the NIST 800-53 Security Controls in an Assessment & Authorization (A&A) process. Experience reviewing Nessus scans, managing vulnerability mitigation and the information security process in an Enterprise environment. Basic understanding of Enterprise networking concepts. Ability to work well within a team environment and build reports with government and customer organizations. US citizenship required Ability to obtain and maintain a CBP public trust clearance Desired Skills: Experience directly supporting DHS, CBP or ICE Network Operations Active CBP clearance, or DOD Secret clearance or higher T-Rex Overview Established in 1999, T-Rex Solutions, LLC is a proven mid-tier business providing data-centric mission services to the Federal government as it increasingly tries to secure and leverage the power of data. We design, integrate, secure, and deploy advanced technical solutions for our customers so they can efficiently fulfill their critical objectives. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering. T-Rex is constantly seeking qualified people to join our growing team. We have built a broad client base through our devotion to delivering quality products and customer service, and to do that we need quality individuals. But more than that, we at T-Rex are committed to creating a culture that supports the development of every employee's personal and professional lives. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training and educational reimbursement, Transamerica 401(k) and Cigna healthcare benefits. T-Rex is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, sex (including pregnancy and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors. In compliance with pay transparency guidelines, the annual base salary range for this position is $120,000 - $160,000. Please note that the salary information is a general guideline only. T-Rex considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as market and business considerations when extending an offer. T-Rex offers a diverse and collaborative work environment, exciting opportunities for professional growth, and generous benefits, including: PTO available to use immediately upon joining (prorated based on start date), paid parental leave, individual and family health, vision, and dental benefits, annual budget for training, professional development and tuition reimbursement, and a 401(k) plan with company match fully vested after 60 days of employment among other benefits.
    $120k-160k yearly 12d ago
  • Senior Security (SOC) Analyst, Secret Clearance Required

    Ultraviolet Cyber

    Information security analyst job in Herndon, VA

    Make a difference here. UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams. By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. UltraViolet Cyber is seeking a Senior Security (SOC) Analyst who will monitor and analyze security events and alerts reported by the SIEM on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The Security Analyst will work with a large to team that rotates 3x12 or 4x12 hour shifts. The position requires a US Government issued Secret Clearance, and requires 5 days onsite per week in Herndon, VA. The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.). The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC incident and tracking application. Must be legally allowed to work in the US, and the work must be done in the US. No third-party candidates will be considered What You Have: Active US Secret Security Clearance 5+ years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks. Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.) Familiarity with adversarial tactics, techniques, and procedures (TTPs) Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS) Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS) Additional: proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow) Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP) Additionally: network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.) Education, Certification & Clearance Requirements: 8570 Certification(s): Security+ or equivalent Clearance Requirements: Secret Clearance High school diploma needed Preferred Skills: Certification(s): Security+, GCIH, CEH, or CYSA+ is desired Experience with Splunk query language Experience with IDS/IPS/firewall/security configurations and signature development Experience with PCAP analysis Experience with Tanium threat response Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents Excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components Conceptual understanding of Windows Active Directory is also desired Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment Experience in collecting and maintaining information pertinent to security; investigations and incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts Benefits at UltraViolet Cyber! 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment) Group Term Life, Short-Term Disability, Long-Term Disability Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness Participation in the Discretionary Time Off (DTO) Program 11 Paid Holidays Annually We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable. UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. If you want to make an impact, UltraViolet Cyber is the place for you!
    $87k-118k yearly est. Auto-Apply 11d ago
  • Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Information security analyst job in Sterling, VA

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation (drawings, BOMs, solution design summaries). Provide technical support for in-office and on-site team members. Support management in the process of creating documentation for implementing new technology with new and existing customers. Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications A minimum of 3-7 years previous experience in the industry. Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. Experience in the design and planning of access control and video systems. Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Other Eligibility Requirements Ability to manage time and multiple tasks without supervision. Organizational skills & detail oriented. Good analytical and problem-solving skills. Excellent presentation, writing skills, verbal, and written customer communication skills. Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws. #PhysicalSecurity #SecurityEngineer #ElectronicSecurity #SecurityDesign #AccessControl #ClosedCircuitTelevision #SecuritySystems #SecurityIntegration #SecurityJobs #SecurityCareers #SecurityTechnology #LenelSystems #GenetecSecurity #CureSecurity #AvigilonSystems #AxisCommunications #BoschSecuritySystems #MilestoneSystems #AutoCAD #Bluebeam #RevitSoftware #MicrosoftVisio #ProjectManagement #C-Cure #ccure #softwarehouse #genetec
    $100k-140k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Systems Engineer - Full Performance

    Beyond SOF

    Information security analyst job in Herndon, VA

    Cyber Security Systems Engineer - Full Performance Cyber Security Systems Engineers work on all systems and/or projects within the Sponsors organization responsible for providing Network Defense. Duties, Tasks, and Responsibilities • Beta testing when directed by COTR Conduct proof of concept testing • Conduct tier III support of current infrastructure • Design, test, and integrate new security products as directed by COTR • Ensure all Network Defense capabilities are kept current, patched, and securely configured and management informed of status, working with O&M. • Full time engineering support for all primary systems such as network based Intrusion Detection and Protection Systems (IDPS). • Integration of security products, including designs for all Agency networks • Maintain a network diagram for each Instruction Detection, CIRT capability and sensors and make available to all Sponsor personnel. • Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined and agreed to by the program management • Provide engineering documentation and interaction with Analysts and O&M to ensure a complete and functioning system that meets requirements • Software testing (patches, other updates) Knowledge, Skills, and Abilities • Familiarity with network security applications, protocols and associated hardware Good interpersonal, organizational, writing, communications and briefing skills. • Strong analytical and problem solving skills. Minimum Certifications • Depending on the duties the incumbent may require Agency Certified Tempest Test Engineer. • Depending on the duties the incumbent may require CISSP certification Minimum Education • A bachelor's degree in electrical engineering, computer engineering, computer science, or other closely related discipline. Minimum Experience • Some Linux experience • Minimum of five years of progressively responsible experience in network engineering with emphasis in design, implementation, operations and maintenance of a variety of Windows Servers, Application and Database servers, relevant Network Security appliances and Endpoint Security products.
    $80k-112k yearly est. 60d+ ago
  • Cyber Security Systems Engineer (ISSE)-TS/SCI Full Scope Polygraph Only!

    5Ipro

    Information security analyst job in Herndon, VA

    We are actively seeking a Cyber Security System Engineer (ISSE) with a minimum of 16 years of experience. Bachelor's or Master's Degrees are preferred in one or more of the disciplines described below where specific skills may include the following: Engineering for Cyber engineering and integration services including security, authentication, identity management, authorization, and access control engineering. We engineer a large Splunk Data Lake, providing tools for software design, development, and test. This is an information technology-centric program supporting a large government customer in Information Technology Analytics. This is a fast-paced, challenging, and career-rewarding experience in one of the most complex and high-profile programs within the government. Splunk SME preferred but willing to consider a right candidate with familiarization, A&A, Windows and Linux OS, ISSE\Security Engineer experience, scanning tools such as Nessus and Rapid7, Xacta, GUI, and Front end support self-starter able to work independently and build relationships with technical reps across divisions, comfortable with cyber security and able to brief issues to the customer over 5 years of experience engineering data analytics solutions with an emphasis on Splunk data lake infrastructure and producing Enterprise IT situational awareness for a top tier US Intelligence Agency. Experience in one or more software products associated with cyber system engineering for data analytics including SQL security, TANIUM Endpoint Management Software, Powershell, MacAfee, App Blocker, Splunk ITSI.Experience with one or more software development environments supporting commercial or open-source tools including but not limited to: Linux, Python, C, Bash Scripting, Perl, SQL, Splunk Phantom, UBA, and UIPathExperience in one or more cloud computing services and technologies including but not limited to: AWS/C2S, Microsoft Azure, Nutanix, VMware.Over 5 years of experience working on Intelligence Agency enterprise infrastructure and engineering programs, including Agile development and SecDevOps methodologies including on-site customer engagement.Preferred Education, Experience, & Skills : Security Development and Operations (SecDevOps) Various security tools and processes such as Splunk, Nessus Security Center, WebInspect, XactaCloud security controls and implementation PKI implementation STIG compliance and vulnerability management virtualization experience (VDI & VMWare) Public, private and hybrid Cloud experience (AWS, Microsoft Azure, etc.) CISSPAWS Certified Security SpecialtyMicrosoft Office365
    $80k-112k yearly est. 60d+ ago
  • Cyber Security Systems Engineer - CSE21-1R

    Datasync Technologies Inc. 3.3company rating

    Information security analyst job in Herndon, VA

    We're looking for a Cyber Security Systems Engineer who will work on all systems and/or projects within the customer organization responsible for providing Network Defense. Cyber Security Engineer Responsibilities: Ensure all Network Defense capabilities are kept current, patched, and securely configured and management informed of status, working with O&M. Full time engineering support for all primary systems such as network based Intrusion Detection and Protection Systems (IDPS). Integration of security products, including designs for all customer networks Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined and agreed to by the program management Cyber Security Engineer Requirements: Bachelor's degree in electrical engineering, computer engineering, computer science, or other closely related discipline. Experience with network security applications, protocols and associated hardware Good interpersonal, organizational, writing, communications and briefing skills. Strong analytical and problem solving skills. CISSP certification preferred ONLY CANDIDATES WITH ACTIVE GOVERNMENT SECURITY CLEARANCES AND APPROPRIATE POLY WILL BE CONSIDERED. MUST BE A U.S. CITIZEN. _______________________ Interested in Joining Our Team? - Check out this YouTube video! Be a part of an award-winning, employee friendly company in Northern VA and have the satisfaction of helping keep America safe. DataSync Technologies, Inc is a veteran owned small business providing consulting excellence and real time solutions for customers with complex information technology needs within Intelligence Community. Our cleared consultants bring real world experience with a common sense approach to their jobs whether they are creating complex analytic dashboards, architecting new cloud technology infrastructures, securing sensitive data or streamlining business processes for efficiency. Equal Employment Opportunity DataSync is an EEO and Affirmative Action Employer of Female/Minorities/Veterans/Individuals with Disabilities. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Information about Equal Employment Opportunity (EEO) and Employee Polygraph Act (EPPA) provisions in addition to other Federal labor laws can be found at the Department of Labor's Website. DataSync is committed to providing veteran employment opportunities to our service men and women.
    $79k-109k yearly est. Auto-Apply 60d+ ago
  • Mid-Level EAD Cyber Threat Analyst - KOREAN

    Lis Solutions 3.7company rating

    Information security analyst job in Herndon, VA

    LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements. Job Description LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues. In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better. Responsibilities: • Direct and conduct all-source analysis and targeting to identify, monitor, and assess • Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings • Apply demonstrated subject matter expertise • Apply knowledge of regional topics • Analyze and report on trends and activity Qualifications Qualifications: • Korean Language proficiency at ILR-3 level • Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments • Possess a good understanding of Intelligence Community (IC) guidelines and directives • Experience conducting all-source analysis of cyber topics • Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and Terminology Management Databases • Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work. Requirements: • U.S. Citizenship • Active Government Investigation Additional Information Benefits • Medical, Vision, Dental • Employee Assistance Program (EAP) • Evacuation • Long Term Disability • Term Life All your information will be kept confidential according to EEO guidelines.
    $74k-101k yearly est. 60d+ ago
  • Cyber Host Forensic Analyst IV

    Nightwing Intelligence Solutions

    Information security analyst job in Sterling, VA

    Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The DHS's Hunt and Incident Response Team (HIRT) secures the Nation's cyber and communications infrastructure. HIRT provides DHS's front line response for cyber incidents and proactively hunting for malicious cyber activity. Nightwing, as a prime contractor to DHS, performs HIRT investigations to develop a preliminary diagnosis of the severity of breaches. Nightwing provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. Nightwing is seeking Host Forensics Analysts to support this critical customer mission. Responsibilities: - Assists with leading and coordinating forensic teams in preliminary investigations - Plans, coordinates and directs the inventory, examination and comprehensive technical analysis of computer related evidence - Distills analytic findings into executive summaries and in-depth technical reports - Serves as technical forensics liaison to stakeholders and explains investigation details to include forensic methodologies and protocols Tracks and documents on-site incident response activities and provides updates to leadership throughout the engagement - Evaluates, extracts and analyzes suspected malicious code - Acquire/collect computer artifacts (e.g., malware, user activity, link files) in support of onsite engagements - Triage electronic devices and assess evidentiary value - Correlate forensic findings to network events in support of developing an intrusion narrative - Collect and document system state information (e.g. running processes, network connections) prior to imaging, as required - Perform forensic triage of an incident to include determining scope, urgency and potential impact - Track and document forensic analysis from initial participation through resolution - Collect, process, preserve, analyze and present computer related evidence - Conduct analysis of forensic images, and available evidence in support of forensic write-ups for inclusion in reports and written products - Assist to document and publishing Computer Network Defense (CND) guidance and reports pertaining to incident findings Required Skills/Clearances: - U.S. Citizenship - Active TS/SCI clearance - Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability -5+ years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools - Ability to create forensically sound duplicates of evidence (forensic images) - Ability to author cyber investigative reports documenting digital forensics findings - Proficiency with analysis and characterization of cyber attacks - Proficiency with proper evidence handing procedures and chain of custody protocols - Skilled in identifying different classes of attacks and attack stages - Understanding of system and application security threats and vulnerabilities - Understanding of proactive analysis of systems and networks, to include creating trust levels of critical resources - Able to work collaboratively across physical locations - Proficiency with common operating systems (e,g, Linux/Unix, Windows) Desired Skills: - Proficiency with two or more of the following tools: --- EnCase --- FTK --- SIFT --- X-Ways --- Volatility --- WireShark --- Sleuth Kit/Autopsy --- Splunk --- Snort --- Other EDR Tools (Crowdstrike, Carbon Black, etc) - Proficiency conducting all-source research. Required Education: BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma & 7-9 years of host or digital forensics experience. Desired Certifications: At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team. Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
    $74k-100k yearly est. Auto-Apply 7d ago
  • Cyber Host Forensic Analyst IV

    Nightwing

    Information security analyst job in Sterling, VA

    Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The DHS's Hunt and Incident Response Team (HIRT) secures the nation's infrastructure. HIRT provides DHS's front-line response for cyber incidents and proactive hunting for malicious cyber activity. Nightwing provides support for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Nightwing provides HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. Personnel perform investigations to characterize the level of severity of breaches and develop mitigation/remediation plans. Nightwing is seeking Incident Response Experts to support this critical customer mission. **This position will require physical presence in the National Capital Region (NCR) for at least 1 week for training and orientation. Subsequent work will be primarily supported outside the NCR.** **Responsibilities:** - Serves as hunt and incident response subject matter expert (SME), possessing in-depth knowledge on subjects relating to the conduct, activities, or operation of NCCIC HIRT in a surge capacity - Distills analytic findings into executive summaries and in-depth technical reports - Provide expert support, analysis, and research with only broad direction into exceptionally complex problems and processes relating to the subject matter as it relates to hunt and incident response activities - Serves as technical expert on high-level incident response teams providing technical direction, interpretation, and alternatives - Exercises considerable latitude in determining technical objectives of an assignment or task at hand - Independently develops technical solutions to complex problems that require the regular use of ingenuity and creativity - Guides the completion of hunt and incident response activities **Required Skills:** - U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - 8+ years of directly relevant experience in the area of expertise - Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]) - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code) - Must be able to travel domestically on short notice - Ability to think independently - Demonstrates superior written and oral communication skills - Must be able to work collaboratively across physical locations - Skilled in identifying different classes of attacks and attack stages - Understanding of system and application security threats and vulnerabilities - Understanding of proactive analysis of systems and networks, to include creating trust levels of critical resources - Proficiency with common operating systems (e,g, Linux/Unix, Windows) **Desired Skills:** - Experience leading and mentoring technical teams - Knowledge of Computer Network Defense policies, procedures and regulations - Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]) - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code) - WireShark - Splunk - Snort **Required Education:** BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10+ years of technical experience in the area of expertise. **Desired Certifications: One or more** - DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst - DoD 8140.01 GCIA, GCIH, CSSP Analyst/CSSP Incident Responder - DoD 8140.01 CEH, CSSP Analyst - SANS GIAC GNFA preferred - SANS GRID, GICSP, or GCIP a plus _At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients._ _Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team._ _Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class._
    $74k-100k yearly est. 48d ago
  • Information System Security Officer (ISSO)

    T-Rex Solutions 4.1company rating

    Information security analyst job in Ashburn, VA

    T-Rex Solutions is seeking a results-driven Information System Security Officer (ISSO) to support our U.S. Customs and Border Protection (CBP) Network Operations Center (NOC). The program objective is to provide ongoing support for CBP's NOC and Wireless Network Operations Center (WNOC), which are critical components within the Office of Information and Technology. These centers perform real-time monitoring, proactive maintenance, incident detection and response, problem resolution, and network performance reporting across CBP's nationwide enterprise. They ensure network stability, availability, and the rapid escalation and resolution of technical issues. This is a 24x7x365 operation with work performed on-site in Ashburn, VA. Responsibilities: The ISSO shall ben assigned to one or more existing FISMA Systems of Record as well as new IT Systems that are slated as new work products to develop an Authority to Operate (ATO) and follow-on Continuous Monitored system. Develop and maintain all required FISMA system documentation. Ensure systems adhere to Technical Reference Architecture (TRA) foundational and supplemental documents as additional security specifications, when applicable (available upon request). Use approved security tools for continuous monitoring and management of security baselines. Implement audit tools or processes for auditing and reporting services that support Continuous Diagnostics and Monitoring (CDM). Provide engineering services and participation in Continuity of Operations Planning (COOP) and Disaster Recovery (DR) planning and exercises. Develop and implement Configuration Management and Change Management plans when necessary. Perform or participate in threat and vulnerability management for applicable FISMA systems. Perform POA&M management. Requirements: Bachelor's degree in related technical field such as Management Information Systems, Computer Science, Engineering, IT, Networking and Telecommunications. A minimum of ten (10) plus years of related experience Certifications, such as Network+ and Security +, CISSP and Security auditing are recommended. Proficient in network and information system security principles and best practices. In-depth knowledge of the Risk Management Framework (RMF), the NIST publications, and the DHS 4300A Policy Directive. Experience with implementing the NIST 800-53 Security Controls in an Assessment & Authorization (A&A) process. Experience reviewing Nessus scans, managing vulnerability mitigation and the information security process in an Enterprise environment. Basic understanding of Enterprise networking concepts. Ability to work well within a team environment and build reports with government and customer organizations. US citizenship required Ability to obtain and maintain a CBP public trust clearance Desired Skills: Experience directly supporting DHS, CBP or ICE Network Operations Active CBP clearance, or DOD Secret clearance or higher T-Rex Overview Established in 1999, T-Rex Solutions, LLC is a proven mid-tier business providing data-centric mission services to the Federal government as it increasingly tries to secure and leverage the power of data. We design, integrate, secure, and deploy advanced technical solutions for our customers so they can efficiently fulfill their critical objectives. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering. T-Rex is constantly seeking qualified people to join our growing team. We have built a broad client base through our devotion to delivering quality products and customer service, and to do that we need quality individuals. But more than that, we at T-Rex are committed to creating a culture that supports the development of every employee's personal and professional lives. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training and educational reimbursement, Transamerica 401(k) and Cigna healthcare benefits. T-Rex is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, sex (including pregnancy and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors. In compliance with pay transparency guidelines, the annual base salary range for this position is $120,000 - $160,000. Please note that the salary information is a general guideline only. T-Rex considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as market and business considerations when extending an offer. T-Rex offers a diverse and collaborative work environment, exciting opportunities for professional growth, and generous benefits, including: PTO available to use immediately upon joining (prorated based on start date), paid parental leave, individual and family health, vision, and dental benefits, annual budget for training, professional development and tuition reimbursement, and a 401(k) plan with company match fully vested after 60 days of employment among other benefits.
    $120k-160k yearly Auto-Apply 60d+ ago
  • Associate Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Information security analyst job in Sterling, VA

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities. Responsibilities Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries. Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements. Qualifications Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry. An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted. Experience in the design and planning of MEP systems. Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems. Ability to manage time and multiple tasks without supervision. Strong organizational skills and attention to detail. Excellent analytical and problem-solving skills. Exceptional presentation, writing, verbal, and written customer communication skills. Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws. #JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
    $100k-140k yearly est. Auto-Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Hagerstown, MD?

The average information security analyst in Hagerstown, MD earns between $66,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Hagerstown, MD

$92,000
Job type you want
Full Time
Part Time
Internship
Temporary