Post job

Information security analyst jobs in Newport News, VA - 80 jobs

All
Information Security Analyst
Cyber Security Analyst
Data Security Analyst
Information Assurance Analyst
Security System Engineer
Information Systems Security Officer
Cyber Security Engineer
  • Information Systems Security Officer (ISSO) - Intermediate (Info. Systems &Cyber Security, Associate)

    The Mil Corporation 4.5company rating

    Information security analyst job in Norfolk, VA

    Clearance Required: Secret Education Required: BA/BS or HS/GED and Equivalent Work Experience US Citizenship: Required The MIL Corporation seeks an Information Systems Security Officer (ISSO) - Intermediate (Info. Systems & Cyber Security, Associate) to support cybersecurity operations for a Federal Government client in Norfolk, VA. The ISSO ensures cybersecurity for assigned systems, reporting to the Program Manager/System Owner (PM/SO). Responsibilities include feature deployment, security policy implementation, and RMF compliance. The ISSO may delegate tasks during Assessment and Authorization (A&A) but remains accountable. This position currently requires a hybrid schedule. This hybrid position may require schedule changes based on contract needs. Schedule is subject to change based on company/contract requirements. Responsibilities Collaborate with SOC stakeholders (systems administration, network, security, infrastructure teams, Enterprise Help Desk, program managers, and business unit sponsors). Ensure DoN Authorization to Operate (ATO) compliance Commander, Navy Installations Command (CNIC) operational IT boundaries per applicable directives. Provide expertise in RMF processes, guiding system owners through steps 1-5, including categorization, control selection, and eMASS documentation. Conduct continuous monitoring, vulnerability scanning, STIG/patch application, and manage findings in eMASS and VRAM. Maintain and update POAMs and configuration management plans, ensuring timely milestone completion. Evaluate threats, vulnerabilities, and security findings, providing recommendations to enhance IT resource protection. Ensure compliance with Department of Navy (DoN) and DoD cybersecurity policies, verifying user clearances and training. Assemble and submit Security Authorization Packages, registering and maintaining systems in eMASS. Execute annual security reviews, control testing, and contingency plan testing per FISMA requirements. Correlate non-RMF vulnerability assessment findings (e.g., penetration testing, CCORI) to RMF controls for holistic risk assessment. Travel Up to 10% annually, as required. Required Qualifications 7 years of relevant experience in cybersecurity or related fields Active Security+ Certification (IAT Level II) Expertise in RMF processes and tools (e.g., eMASS, VRAM, NESSUS) and compliance frameworks (e.g., CNSS 1253, FIPS 199, STIGs) Strong understanding of DoD, DoN, and CNIC cybersecurity directives, processes, and business rules Proven experience creating and maintaining RMF artifacts, managing vulnerabilities, and maintaining configuration management plans Strong communication skills for effective collaboration with team members Desired Qualifications CISSP Certification Hands-on experience with the U.S. Navy Risk Management Framework Process Guide (RPG) NAO process and procedures Education Bachelor's Degree in a relevant field from an accredited institution. Alternatively, an Associate's Degree with an additional 4 years of relevant work experience, or an additional 6 years of relevant work experience in lieu of a degree. Clearance All applicants for this position must possess a current Secret clearance; please note that the clearance process considers financial background aspects. Compensation The MIL Corporation values your contributions and offers a range of benefits to support your overall well-being. We are pleased to offer a comprehensive range of benefits to our full-time employees which include health, life, disability, and retirement plans, as well as paid time off, opportunities for professional growth and tuition assistance. Additional benefits and incentives may also apply, which will be communicated during the hiring process. For this position, the projected compensation range is $115,000 - $145,000 per year. This estimate represents the typical salary range and is just one part of MIL's complete compensation package. Final salary for this position is determined based on factors such as individual qualifications, education, experience, and contractual limitations. Learn more on the MIL Careers page. Why MIL? The MIL Corporation (MIL) is a dynamic workforce of industry professionals who deliver world-class solutions in cyber, engineering, financial management, and information technology - and we are looking for candidates like you! MIL offers opportunities for professionals at all stages of their careers, from early-career candidates to experienced industry professionals. We are known for a collaborative, people-first culture where employees are supported, valued, and encouraged to grow. This commitment to our people and our work is reflected in the industry and workplace awards MIL has received over the years. 2021 - 2024, Top Workplaces USA award (Energage) 2017 - 2025 Top Workplaces Award, Greater Washington Area (The Washington Post) 2018 - 2025 Certified Great Workplace, Great Place to Work 2021 - 2025, Best Workplaces in Consulting & Professional Services 2021 Fortune Best Workplaces for Millennials 2018 Fortune, Great Place to Work: Best Place to Work for Diversity 2017, 2020 - 2025 Top Workplace Award, South Carolina (Greenville Business Magazine, Columbia Business Monthly, and Charleston Business Magazine) 2025 Corporate Partnership Award, Association of Fundraising Professionals, Maryland Chapter 2025 Moxie Award, GovCon Category 2024 Patriot Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense 2022 Freedom Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense 2018, Above & Beyond Award, Employer Support of the Guard and Reserve (ESGR), Department of Defense If your goal is to help the federal government deploy leading technologies, improve financial management, or defend the nation in cyberspace, MIL welcomes you. Become a part of something greater, where you, the people, make the difference. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by state or federal law.
    $115k-145k yearly 7d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Lead Security Engineer - Cyber Security

    Relativity 4.7company rating

    Information security analyst job in Virginia Beach, VA

    Posting Type Remote As a Lead Cyber Security Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities. Job Description and Requirements Responsibilities: Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources. Assess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations. Develop and deploy detection and prevention signatures with response actions as part of a layered defensive strategy leveraging multiple technologies and data types. Build automation to search through collected telemetry to detect and isolate advanced threats that evade existing security solutions. Create Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards. Automate incident handling processes. Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment. Serve as a subject matter expert in the mechanism and analysis of observed malicious activity. Clearly document and communicate investigation findings to both technical and executive stakeholders. Identify and automate away technical burden. Build automation to deploy, operate and connect multiple cyber security tools and applications. Preferred Qualifications: 7+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team for Cloud applications and corporate networks Exposure to threat detection development and tuning Experience in software design and development DevSecOps experience Ability to perform threat hunting, threat emulation, and/or purple teaming exercises Familiarity with industry standard security devices and their configuration Experience in reverse engineering malicious code to explore infection and propagation mechanisms Experience with threat intelligence tools and processes Certifications: One or more of the following certifications are preferred (GCFA, GCIA, GCIH, GNFA, GREM, OSCP, OSEP, OSED, OSWE, OSDA, OSCE3, CompTIA Security+, CCNA CyberOps, or CEH) 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Minimum Qualifications: 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Ability to leverage programming and scripting languages to build automations and develop SOAR playbooks Relativity is committed to competitive, fair, and equitable compensation practices. This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives. The expected salary range for this role is between following values: $150,000 and $226,000 The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position. Suggested Skills: Cybersecurity, Infrastructure Security, Network Security, Penetration Testing, Security Architecture Design, Security Audit, Security Information, Security Information and Event Management (SIEM), Security Operations, Vulnerability Management
    $79k-102k yearly est. 5d ago
  • Systems Security Engineer (ISSE)

    Solvere Technical Group

    Information security analyst job in Suffolk, VA

    Solvere Technical has an immediate need for an ONSITE Information Systems Security Engineer (ISSE) at Navy Information Warfighting Development Center (NIWDC) based in Norfolk, Virginia. MUST be a US CITIZEN, live close to NORFOLK, VA, have an ACTIVE TOP SECRET CLEARANCE, with active IAT II CERTIFICATION. Job Description Supports our customer providing system Risk Management Framework (RMF) ATO security engineering services and documentation. Support the Government to ensure core security engineering principles are implemented into assigned programs information systems architecture. Determine client security control requirements and support security categorization of the system. Implement security controls utilizing eMASS and Xacta 360 support tools. Conduct certification and testing in accordance with the Risk Management Framework (RMF) and National Institute of Standards and Technology (NIST) policy; identify deficiencies and providing recommendations of risk mitigation to customer. Perform Risk Assessments and develop Concepts of Operations (CONOPS), Security Policies, Cybersecurity Strategy, Test Plans, System Security Plans and CYBERSAFE related documentation. Maintain the Plan of Action and Milestones (POA&M) to ensure documentation and traceability which outlines a plan to address identified security weaknesses or vulnerabilities within an organization's systems. Perform cybersecurity hardening and security monitoring on network infrastructures (STIGs, patching, ACAS scanning, etc.). Ability to develop and interpret security architectures, data flow diagrams, and publications that depict the system(s) architecture. Ability to be able to identify risk areas of non-compliance and propose solutions to design to full-fill operational requirements and meet cybersecurity requirements simultaneously. Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts). Provide support to security/certification test and evaluation activities. Job Qualifications: MUST be a US Citizen MUST have an active Security Clearance - Top Secret MUST reside in Norfolk, Virginia or surrounding areas and able to commute onsite daily. MUST have at least five (5) years of experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government. MUST have an active CompTIA Security+ CEU or equivalent certification (CISSP, SSCP, CSA+, or equivalent). MUST have an Active DoD 8570 IAT II certification. MUST have a Bachelor's degree in Cybersecurity, Information Assurance, Computer Science, or equivalent 5+ years experience. Must be Proficient in Microsoft Office tools. (Power Point, Word, Visio, etc.). Must have excellent technical writing, reporting and communication skills. Desired Qualifications: Experience conducting security assessments and working with Security Control Assessors (SCAs) and applying standard auditing techniques during systems security control assessments, including the proper interpretation of the control requirements, determining if the artifacts provided are sufficient and recommending remedial action to Government customer to ensure compliance. Knowledge of Department of Defense Architecture Framework (DoDAF) views facilitating integration and promoting interoperability across capabilities and among integrated architectures. Experience with modern networks, operating systems, databases, and virtual computing. Expert knowledge of security engineering, design concepts and principles. Exceptional verbal and written communication skills, with the ability to collaborate across teams and organizations, including senior level management. Proven ability to multi-task and deliver on-time with the highest quality. Experience with the NAVY RMF ATO process. Experience working with Navy EMASS and Xacta 360. Experience with Cloud Systems Masters degree in Cybersecurity, Information Assurance, Computer Science, or equivalent 9+ years experience. Security Requirements: Must already have an Active DoD Top Secret security clearance. Travel Requirements: Occasional travel might be required Physical Requirements: Repeating motions that may include the wrists, hands and/or fingers. Light work that includes moving objects up to 20 pounds BENEFITS Solvere offers a comprehensive and generous benefits package. The Solvere benefits package includes medical, dental, and vision insurance for the employee and/or families. Solvere also includes basic life insurance plus short- and long-term disability for the employee. Employees may elect to enroll in our company's 401k plan. Employees will also accrue paid time off and holidays. Additional voluntary options include supplemental insurance plans. About the Company Visit: ************************ Solvere Technical Group is committed to non-discrimination and equal employment opportunity. All qualified applicants will receive consideration for employment without discrimination based on disability, protected veteran status or any other characteristics protected by law.
    $79k-110k yearly est. 7d ago
  • Cyber Analyst, SME

    Peraton 3.2company rating

    Information security analyst job in Hampton, VA

    Responsibilities We are seeking a highly skilled and experienced Cyber Analyst to join our team at Joint Base Langley-Eustis (JBLE), supporting the Air Combat Command (ACC) Intelligence Directorate (A2). The Cyber Analyst will play a critical role in cryptologic support, cybersecurity operations, and system administration to protect mission-critical systems and networks. This position requires expertise in cyber threat analysis, cryptologic operations, and the ability to work in a fast-paced, mission-driven environment. Key Responsibilities: * Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems. * Conduct cyber threat analysis to identify vulnerabilities, assess risks, and recommend threat mitigation. * Support the development and implementation of cyber defense measures to protect against emerging threats. * Monitor, analyze, and respond to cyber incidents, ensuring timely resolution and reporting. * Provide system administration support, including configuration, maintenance, and troubleshooting of enterprise and local network devices. * Collaborate with cross-functional teams to integrate cybersecurity measures into ISR operations. * Ensure compliance with all security protocols, policies, and regulatory requirements. * Travel may be required (Up to 15%) Qualifications Required Qualifications: * Experience Level: Masters Degree and 15 plus years or have a bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related expert experience, for a total of 20 years, as a substitute to the master's degree. * Technical Expertise: * Expertise in cryptologic support, cybersecurity operations, and proficiency in system administration. * Familiarity with cyber defense tools, network security, and incident response methodologies. * Strong understanding of cyber threat analysis and mitigation strategies. * Skills: * Exceptional analytical and problem-solving skills. * Strong written and verbal communication skills for producing reports and collaborating with teams. * Ability to work effectively in a high-pressure, mission-critical environment. * Security Clearance: Active Top Secret/SCI clearance is required. * This role may require CI Polygraph eligibility. Preferred Qualifications: * Experience supporting Air Force Major Command (MAJCOM) Intelligence Directorate or similar military organization. * Knowledge of cryptologic systems, tools, and methodologies. * Familiarity with Air Force cybersecurity policies and procedures. * Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent. * DOD 8/140 Compliance based on functional role: Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification. * Active CI Polygraph. Why Join Us? * Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations. * Work in a dynamic and collaborative environment at Joint Base Langley-Eustis, a hub for Air Force intelligence and cyber defense excellence. * Access to professional development opportunities and career growth within the intelligence and cybersecurity community. #AFACC Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $135k-216k yearly Auto-Apply 24d ago
  • YourLiebherrCareer: Information Security Specialist (Regional)

    Liebherr 4.6company rating

    Information security analyst job in Newport News, VA

    The Information Security Specialist is responsible for Information Security within the Americas region. Duties include designing, implementing, and improving security controls, incident response strategies, and risk mitigation measures to safeguard IT systems and sensitive data. *This position is office-based in Newport News, VA.* Responsibilities Designs and implements security solutions to protect IT infrastructure Develops and enforces security policies, standards, and risk mitigation strategies Conducts penetration testing, vulnerability scanning, and security audits Investigates and responds to security incidents, performing forensic analysis Ensures compliance with regulatory frameworks (GDPR, NIS2, ISO 27001) Evaluates and integrates new security tools and technologies Automates security processes and threat mitigation where possible Works with IT, DevOps, and risk management teams Engages with regulatory bodies and compliance auditors Coordinates with external cybersecurity partner Competencies Education and Experience: Bachelor's degree in Cybersecurity, Computer Science, Information Technology or related discipline and 4 years of IT experience focused on Information Security relevant technologies; or combination of equivalent education, training, certification, and 8 years relevant experience. Information Security certifications (such as CISSP: Certified Information Systems Security Professional; CEH: Certified Ethical Hacker; CISM: Certified Information Security Manager; GIAC: Global Information Assurance Certification) can be accepted in lieu of bachelor's degree. Security+ preferred. Knowledge of Information Security engineering principles (least privilege, zero trust) Knowledge of IAM solutions (Active Directory, Okta, SSO, MFA) Knowledge of threat modeling and risk analysis techniques Knowledge of Information Security automation tools (Ansible, PowerShell, Python) Knowledge of Compliance frameworks (NIST CSF, CIS Controls, ISO 27001) Skilled in designing and implementing security architectures Skilled in automating security processes and threat mitigation Skilled in managing security operations and improving response efficiency Ability to work independently and take ownership of security initiatives Strong problem-solving skills in high-pressure situations Excellent teamwork and collaboration in cross-functional security projects Clear and concise communication to bridge technical and non-technical audiences Travel domestically and internationally occasionally. Ability to obtain and maintain a valid driver license and passport. Our Offer An interesting and ambitious role in a successful international company. We offer a secure work environment with a comprehensive benefits package that includes major medical, dental and vision insurance, 401K plan with company match, paid vacation and personal days and competitive salary. Referral Bonus: Tier III Have we awoken your interest? Then we look forward to receiving your online application. If you have any questions, please contact Thomas Steele. Liebherr-America, Inc. and its US affiliates are Equal Opportunity Employers. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. If you are a California resident, please visit Liebherr USA, Co. Privacy Statement for more information regarding how Liebherr-America, Inc. and its US affiliates collect and process your personal information. One Passion. Many Opportunities. The company In line with its international growth, Liebherr's venture into the United States began in 1970. Within a couple of years, the company expanded and completed its production facilities in Newport News, Virginia, for its product line of hydraulic excavators. It was later converted into Liebherr's manufacturing facility for mining trucks and remains home to Liebherr Mining Equipment Newport News, Co. In addition to its production facility, Liebherr markets a wide variety of products and technologies through its companies located across the United States. The companies are Liebherr-Aerospace Saline, Inc., Liebherr Gear Technology, Inc., Liebherr Automation Systems, Co., and Liebherr USA, Co., the umbrella company for 12 product segments that are positioned across the United States. Location Liebherr USA Co. 4800 Chestnut Avenue 23607 Newport News, VA United States (US) Contact Thomas Steele ************************ [Not translated in selected language]
    $89k-119k yearly est. Easy Apply 60d+ ago
  • 3016 - Information Systems Security Analyst

    AlakaʻI Services and Poe'Hana Group, Inc.

    Information security analyst job in Norfolk, VA

    Provide cybersecurity expertise supporting enterprise environments, including risk management, incident response, threat/vulnerability mitigation, and security architecture considerations. Key Responsibilities Assess/mitigate cybersecurity threats and vulnerabilities; apply risk management processes. Support encryption, access controls, intrusion detection, traffic analysis, and incident response/handling. Apply secure system/software lifecycle concepts and security architecture/enterprise reference models. Support continuity planning (backup/recovery, disaster recovery, COOP). Apply program/project management principles in support of information security program needs. Qualifications (Citizenship, Education, Experience, Skills) Certification required: DoD 8140.03 / 8570.01-M compliant commercial certification meeting IAT Level II. Documentation evidencing current IAT Level II status is required in addition to the resume. Experience: 4+ years in Cybersecurity. Skills (examples explicitly called out): Encryption algorithms: IPSEC, AES, GRE, IKE, MD5, SHA, 3DES. Incident response/handling; intrusion detection; penetration testing; emerging threats. Network protocols and models (TCP/IP, OSI), traffic analysis, access control mechanisms (e.g., ACLs). System/application threat knowledge (e.g., buffer overflow, XSS, SQL injection). Cloud service/deployment models (SaaS/IaaS/PaaS) and cloud security strategy/architecture. Data security standards including PII/PCI/PHI. Required DoD Systems, Tools, and Framework Experience Office tools: Ability to document, track, and report cyber work products Scheduling/Tracking systems: Experience supporting enterprise incident response programs/roles and performing analysis/reporting Security/Information handling: Knowledge of cybersecurity laws/regulations/policies/ethics; risk management; secure acquisition/supply chain risk concepts. We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
    $79k-110k yearly est. 28d ago
  • OPTEVFOR- Cyber OT&E Exploitation Analyst

    Rigid Tactical

    Information security analyst job in Norfolk, VA

    Rigid Tactical is actively seeking a Subject Matter Expert (SME) Exploitation Analyst to join our mission-focused team as Key Personnel supporting OPTEVFOR Cyber Operational Test & Evaluation (OT&E). This is an advanced proficiency role centered on offensive cyberspace operations planning and execution. The successful candidate will utilize intelligence and technical knowledge to deconstruct complex Navy IT systems, determine system access points, and develop detailed exploitation strategies and test objectives for the supporting Red Team. Your work will directly inform cyber survivability assessments and enhance the readiness of systems supporting the warfighter. Qualifications and Requirements Education/Experience: Bachelor's degree in Computer Science, Cybersecurity, or a related technical field OR a minimum of five (5) years of experience in DoD offensive cyberspace operations planning or exploitation analysis. Technical Proficiency: Demonstrated ability to decompose complex computer systems and networking configurations to support system exploitation analysis. Software Skills: Proficiency in Microsoft Office Applications (MS Visio, Project, Excel, PowerPoint, etc.). Communication: Excellent written and oral communication skills required for briefing senior leadership (O6 / GS-15 or higher). Clearance: Active TS/SCI clearance. PREFERRED Experience & Certifications (Additional KSATs): Ability to perform detail-oriented work with Quality Assurance / Quality Control (QA/QC) prior to delivery to the government. Preferred Certifications: Offensive Security Certified Professional (OSCP) GIAC Certified Penetration Tester (GPEN) Certified Ethical Hacker (CEH) Practical (or Master) Cisco Certified Network Professional (CCNP Security) GIAC Exploit Developer (GXPN) Certified Red Team Expert (CRTE) Key Responsibilities This Key Personnel role has an advanced focus on planning and executing offensive cyber operations within the DoD Cyber OT&E environment. 1. Exploitation Planning & Strategy Strategy Development: Serve as the SME to develop or oversee detailed exploitation plans for the OPTEVFOR Red Team, including using intelligence to deconstruct complex systems and determine access points. Test Objective Design: Develop cyber survivability test plans and coordinate with warfare divisions and Red Team operators to ensure test objectives are comprehensive, executable, and adequately resourced. Requirements Management: Identify capability gaps, review test requirements, and coordinate with DoD, academia, and industry to acquire necessary cyber capabilities and tools. 2. Test Execution Leadership Test Lead: Lead preparation and execution of Cyber OT&E events, including coordination with all site personnel, program office SMEs, and Red Teams. Deconfliction & Safety: Ensure all deconfliction requirements are met prior to test execution (following JFHQ-DODIN guidance) and verify that tests are conducted safely per OPTEVFOR policies. Briefing: Conduct Pre-Execution Briefs to 01D leadership and provide daily hot washes and summary reports throughout the test phase. 3. Reporting, Policy, and Process Oversight Final Report Generation: Lead the generation of final report products, ensuring technical accuracy and adherence to OPTEVFOR procedures. This involves drafting the Data Analysis Summary and reviewing Blue/Gold Sheets from Red Team operators. Process Oversight: Support cyber survivability policy and process oversight to warfare divisions and maintain 01D Standard Operating Procedures (SOPs) and OPTEVFOR test planning documents. Post-Test Analysis: Participate in post-test processes (e.g., 01D Review Board, SERB) to ensure traceability between test objectives, collected data, and final deliverables. Training: Support the development and maintenance of Cyber Survivability Test Planning templates and instruct associated courses. 4. Required Technical Expertise Networking & OS Knowledge: Utilize deep knowledge of network architectures, protocols (TCP/IP), Linux/Unix concepts, and common networking devices to support system deconstruction and analysis. Targeting & Intelligence: Analyze and synthesize large quantities of data into high-quality, fused targeting/intelligence products, using expert knowledge of attack methods and malicious activity concepts. This position is contingent upon award of the relevant contract or funding. Furthermore, employment is subject to the successful completion of all stages within the company's hiring pipeline. At Rigid Tactical, we offer a role that places you at the tip of the spear in DoD Cyber OT&E. If you are an advanced Exploitation Analyst who thrives on deconstructing complex defense systems and translating technical vulnerabilities into actionable Red Team strategies, this is your opportunity to drive mission assurance. You will be a Key Personnel member, utilizing your deep technical expertise and planning skills to directly enhance the cyber survivability of the U.S. Navy warfighter. If you possess the TS SCI eligibility and the offensive cyber acumen required to be a strategic planner in this mission-critical environment, we urge you to apply and join our tactical force.
    $74k-101k yearly est. 60d+ ago
  • SOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)

    Akira Technologies Inc. 4.1company rating

    Information security analyst job in Norfolk, VA

    Akira Technologies is seeking a Cyber Analyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage. This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role. An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Job Responsibilities Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. Asses Security Technical Implementation Guides (STIGs) compliance and completion. Utilize asset mapping tools to verify connected inventory. Handle Information Assurance Vulnerability Management (IVAM) notifications. Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences. Job Qualifications Active Secret security clearance or higher. At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis. Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations. Preferred Skill Sets Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS) Strong analytical and troubleshooting skills Able to provide expert content development in Splunk Enterprise Security using tstats and data models Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases Familiar with the operations and functions of Nessus or security center management Can assist and provide technical input to research, discover, implement hardware and software Understands importance and fundamentals of logistics and evidence handling Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Salary Range: $75,000 to $100,000 Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. General Description of Benefits Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement. Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees. About Akira Technologies Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers. Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
    $75k-100k yearly Auto-Apply 33d ago
  • Information Assurance Analyst

    Delphinus Engineering 3.8company rating

    Information security analyst job in Norfolk, VA

    GENERAL SUMMARY: Seeking full-time Network Engineer to join the Cyber Readiness Team supporting the Atlantic Surface Fleet in Norfolk, Virginia. An applicant that can demonstrate expert knowledge in the design, configuration, deployment and management of Aruba EdgeConnect SD-WAN solutions will fill this position. The candidate may be required to travel between 5-10% to assist forward-deployed units. LOCATION: Norfolk, VA. SPECIFIC DUTIES & RESPONSIBILITIES: Provide SD-WAN orchestration and management using Aruba Orchestrator for provisioning, deployment, configuration, monitoring, and troubleshooting EdgeConnect SD-WAN solutions. Manage user authentication, authorization, role-based access control, RADIUS/TACACS+, policy management, and captive portal using Aruba ClearPass Policy Manager (CPPM) and ClearPass Guest. Deploy, provision, manage, and monitor Aruba Instant APs using Aruba Instant UI, Aruba Central and/or Aruba Mobility Controller capabilities. DESIRED SKILLS AND ABILITIES: HPE Aruba SD-WAN Certifications Cisco Certified Network Associate (CCNA) Experience with Aruba and/or Cisco wireless controllers, access points, switches and routers Understanding of DoD Cybersecurity policies and programs Experience implementing DISA Security Technical Implementation Guides (STIGs) REQUIREMENTS: In-depth knowledge of current SD-WAN concepts, industry standards, security, and best practices. At least five years' hands-on experience with any SD-WAN technologies to include at least two years' experience with Aruba EdgeConnect SD-WAN solutions. Hands-on experience using Aruba ClearPass Policy Manager (CPPM), ClearPass Guest, and Aruba Orchestrator in the management of EdgeConnect SD-WAN solutions. Active Secret Security Clearance Current US Passport 8570 Information Assurance Technician (IAT) level II or IAM/ISSM level I Certification Bachelor's Degree or 5 years' experience in related field
    $61k-86k yearly est. 60d+ ago
  • Cyber Analyst Mid level w/ Secret clearance

    Connect Talent Solutions

    Information security analyst job in Hampton, VA

    The Cyber Analyst, Mid-Level, applies expertise and work experience executing cyber risk assessments. The ideal candidate will provide a broad range of information assurance activities and has a strong knowledge of systems, operating environments, system security, and networking. *This position requires onsite work Duties Determines system vulnerabilities and residual risk based on analysis of technical artifacts, interviews, and evaluation of current system state Evaluates effectiveness of proposed mitigations Contributes toward recommendations on technical/policy changes, processes and methodologies to assess and mitigate cybersecurity risk on information technology within the SCA's appointed authorization boundary Works with other Cyber Analysts, Subject Matter Experts (SMEs), and SCARs to ensure that all cybersecurity analysis and cybersecurity risk assessments are completed with time and quality standards established by Division leadership and Task Lead Supports program and projects with security and information assurance requirements elicitation based on customer and SME communication and independent research Performs all other duties, as assigned Requirements Bachelor's degree in Cybersecurity, Computer Science, Information Technology, Information Systems required. Equivalent work experience may be substituted for Bachelor's degree. Master's degree preferred. IAM Level II Certification in accordance with the Department of Defense (DoD) approved 8140 baseline certifications required Must have at least 5 years of experience in cyber risk assessment in cyber risk assessment or experience with technologies utilized in AFNET or DoD systems Proficiency with eMASS preferred Must have familiarization with NIST SP 800-53, AFI 17-130, and DODI 8510.01 Strong planning, organization, and analytical skills, with attention to detail required Must be able to take initiative and be self-motivated Quick learner; passionate about technology and able to learn new technology areas as directed Ability to elicit, identify, and research information assurance requirements and perform as a member of an assessment review team Effective team player with good interpersonal skills Must be able to work independently with minimal supervision Excellent written and verbal communication skills required Must be able to display professionalism in all situations Knowledge in emerging technologies including cloud, AI and virtualization, networking, systems engineering, identity management, web technologies, system administration, and system security is preferred This position requires onsite work. Must be flexible to be able to work in the office, as assigned. Must have an active DoD security clearance
    $74k-101k yearly est. 60d+ ago
  • TSSCI Cyber Analyst

    Insight Global

    Information security analyst job in Hampton, VA

    Insight Global is seeking a qualified TSSCI Cyber Analyst in support of one of are large federal clients in Hampton, Virginia. Their day to day will include but is not limited to: - Coordinate with AF Inspection Systems FAM on cyberspace/ISR training, standardization, and evaluation programs. - Support development and employment of cyberspace weapon systems, capabilities, and related programs. - Assist in creating, reviewing, and coordinating cyberspace operational guidance, including instructions, technical orders, AFIs, policies, and manuals. - Help manage training, readiness, and manning for cyberspace career fields. - Contribute to developing weapon‑system‑specific instructions, manuals, and multi‑service TTPs in accordance with AF, DoD, and Joint policies. - Provide support for cyberspace operations training events, exercises, and conferences (e.g., WEPTAC, Weapons School, flag exercises). - Aid in developing academic training, documenting deficiencies, and recommending corrective actions. - Support COMACC's AFFOR responsibilities and cyberspace operations across the DoD. - Assist with ACC's Organize, Train, and Equip (OT&E) functions for cyberspace forces. - Support GFM activities, including preparation of SORTS/DRRS reports, UTC development, DOC statements, METs, GFMAP, DEPORDs, and related tasks. - Contribute to preparing and coordinating cyberspace taskings, CONOPs, CONEMPs, enabling concepts, roadmaps, contingency plans, and TTPs. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements - Experience within both Offensive and Defensive cyber - Strong experience creating Tactics, Techniques and Procedures (TTPs) - Prior experience working with Unit Wings or Squadrons to understand Information Warfare (IW) threats - Experience with/understanding of budgets for maintaining services and capabilities that support functional requirements. - Knowledge of network security and network management o Difference of layer 1 and layer 2 o OSI model o Encapsulation/Decapsulation o Multi Authenticator - Active TSSCI Security Clearance
    $74k-101k yearly est. 2d ago
  • Cyber Security Analyst

    Pingwind

    Information security analyst job in Virginia Beach, VA

    Location: Virginia Beach VA Required Clearance: Secret - Top Secret SCI Certifications: DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level I, Level II or Level III depending on position hired to fill Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines Required Experience: Two (2) Years for Level I, five (5) Years for Level II and ten (10) years for Level III Position Description: PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. Depending on the position hired to fill, you will be ensuring the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems. Primary Responsibilities: Level: I Two (2) years and Level II: Five (5) years of full-time professional experience performing system hardening with demonstrated experience in the following areas: • Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool;• Experience with Security Management policy guidance and directives; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems.Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);• Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. Required Qualifications: • Secret - Top Secret SCI • DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level I, Level II or Level III depending on position hired to fill• Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines• Two (2) Years for Level I, five (5) Years for Level II and ten (10) years for Level III Desired Qualifications/Experience: • Navy experience a plus • DoD 8570.01-M CSSP certification• RMF experience About PingWind PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia. **************** Our benefits include: Ā· Eleven Federal HolidaysĀ· Paid Time Off accrued each pay periodĀ· Parental LeaveĀ· Three medical plan choices with generous employer contributionĀ· Dental and Vision InsuranceĀ· Company paid Short-Term and Long-Term DisabilityĀ· Company paid Life and AD&D InsuranceĀ· 401k with competitive matching and vesting schedule Ā· Continuing education assistanceĀ· Short Term / Long Term Disability & Life InsuranceĀ· Medical, Dependent Care and Commuter Flexible Spending AccountsĀ· Employee Assistance Program Ā· Wellness benefits include Calm Health app and WellHub gym subsidy (formerly GymPass)Ā· 529 College Savings PlanĀ· Legal Insurance Ā· Pet Insurance Veterans are encouraged to apply PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
    $74k-101k yearly est. Auto-Apply 60d+ ago
  • Intel Systems Cyber Security Analyst

    Knight Federal 3.9company rating

    Information security analyst job in Suffolk, VA

    Requirements Bachelor's degree from an accredited university (preferable IT/CompSci/Cyber related)/college or 5-7 years applicable technical field experience. An active Top Secret clearance. Read and thoroughly understand network topologies. Professional understanding and work experience with Network vulnerability and compliance scanning tools (Tenable ACAS, HBSS/Trellix ePO). Understanding and work experience with DIACAP and DoW Risk Management Framework (RMF) Assessment and Accreditation processes. Understanding and work experience with C2/Cyber/Intelligence Systems. Understanding and work experience with DISA STIG/SRA process, IAVA, STIGViewer, Security Compliance Application Protocol (SCAP) tools and reports, Candidate must meet certification requirements for DoW Information Assurance Technical (IAT) Level II. Desired Bachelor's Degree from an accredited university/college. Knowledge of command and control, intelligence, and modeling and simulations systems used by the US military. Prior experience using the Xacta 360 Cyber and/or DISA eMASS Vulnerability, Security Controls, Compliance, Remediation and Risk Management systems. Professional knowledge and experience using both the Window and Redhat Operating Systems in an Enterprise environment. Experience working with VMWare Virtual Servers. Experience in Communications Security (COMSEC) management. Knight Federal Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, sex, gender identity, sexual orientation, pregnancy, age, national origin, physical or mental disability, military or veteran status, genetic information or any other protected classification.
    $77k-104k yearly est. 5d ago
  • Data Security Analyst, Senior

    Looper Consulting

    Information security analyst job in Norfolk, VA

    Job Title: Data Security Analyst, Senior Company: Trimitron Corporation Position Type: Full-Time Equivalent (FTE) Trimitron Corp is seeking a highly experienced Data Security Analyst, Senior to lead data protection, cybersecurity analysis, and information assurance activities in support of the Naval Information Warfare Center (NIWC) Pacific's Positioning, Navigation, and Timing (PNT) Division. This senior-level role is responsible for overseeing all phases of data security, ensuring the confidentiality, integrity, and availability of sensitive PNT-related information that supports critical Navy missions. The ideal candidate brings deep technical expertise, strong analytical capabilities, and proven experience designing and implementing data security protocols in complex, high-sensitivity environments. Key Responsibilities: Oversee the development, refinement, and implementation of data security requirements for mission-critical systems. Determine what data can be safely stored in vulnerable or distributed environments, applying advanced risk-based decision-making. Design and document complex data protection procedures, accounting for system capacity, performance limitations, operational constraints, and mission needs. Analyze data structures and information flows to create sensitivity-based data segregation protocols, ensuring secure access by designated individuals or program processes. Lead all phases of data security, including planning, implementation, monitoring, and continuous improvement. Conduct quality assurance evaluations of data security controls, identifying gaps and driving corrective actions. Assess vulnerabilities related to malware, cyberattacks, unauthorized access, and internal misuse. Review and validate data access rules for departments, managers, and technical teams. Analyze access footprints, including user behavior, access times, and access locations, to identify anomalies or potential security risks. Serve as a senior data security advisor to NIWC Pacific's PNT Division, ensuring secure handling, storage, and transmission of PNT-related data, models, and technical artifacts. Collaborate with PNT engineers, program managers, cybersecurity teams, and Navy stakeholders to ensure data security requirements align with DoD, Navy, and NIWC cybersecurity frameworks. Lead the development and maintenance of PNT-specific data protection protocols, ensuring compliance with mission, operational, and classification requirements. Provide expert-level input during PNT program reviews, technical discussions, and risk assessments. Support incident response activities related to PNT data systems, including advanced analysis, documentation, and remediation recommendations. Guide junior analysts and cross-functional team members in applying best practices for data security within PNT environments. Required Qualifications: Six (6) to nine (9) years of directly applicable experience in data security, cybersecurity, or information assurance. Master's degree in Computer Science, Information Systems, Engineering, Business, or a related field. An advanced degree may substitute for two years of experience. Advanced understanding of data classification, access control, vulnerability assessment, and cybersecurity best practices. Demonstrated experience designing and implementing complex data protection protocols. Strong analytical, problem-solving, and communication skills. Ability to lead technical efforts and collaborate with multidisciplinary teams in mission-driven environments. Preferred Qualifications: Experience supporting DoD, Navy, or NIWC programs, especially in research, engineering, or operational environments. Familiarity with cybersecurity frameworks such as RMF, NIST 800-53, DoD 8500-series, or Navy cybersecurity policies. Experience working with mission-critical or high-sensitivity data systems. Leadership experience mentoring junior analysts or guiding cross-functional teams. Why Join Trimitron Corp.? This position offers the opportunity to contribute to mission-critical defense projects, work alongside highly skilled professionals, and engage in challenging systems engineering tasks that directly impact national security operations. Benefits: We offer competitive pay and generous benefits including comprehensive medical insurance package, 401k with company match, employee assistance program and company paid benefits.
    $70k-101k yearly est. 14d ago
  • Information Assurance Analyst

    Falconwood, Inc. Headquarters 4.1company rating

    Information security analyst job in Suffolk, VA

    Falconwood is a woman-owned, veteran-owned company providing consultation and programmatic support to Department of Defense Information Technology (IT) initiatives and programs. We provide expert advice and consultation on a diverse range of IT subjects, focusing on acquisition, policy, cybersecurity, engineering, and process development. The Information Assurance Analyst will be responsible for performing duties associated with development and review of RMF packages in support of the Commander, Naval Information Forces (NAVIFOR) N6 Directorate. Responsibilities The candidate will support Assessment and Authorization efforts for NAVIFOR N6 directorate and subordinate commands through: Support program's authorization efforts throughout the Navy RMF process. Track to ensure quality and timeliness of RMF package artifacts and deliverables. Analyze general information assurance-related technical problems and provides recommendations and technical support in solving these problems. Assess and supports implementation of solutions that meet network security requirements. Review vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle. Perform duties associated with development and review of RMF packages. Support continuous improvement of strategies, processes, and procedures aligned with existing DoN Navy processes. Ensure the necessary planning, outreach, execution, and dissemination of lessons learned/after action reports. Qualifications Clearance: TS/SCI clearance required (a current SSBI within the five-year scope). Education: Bachelor of Science degree in Information Systems, Computer Science, Cybersecurity, Information Systems, Computer Engineering or related discipline. Certifications: Information Assurance Certification (GIAC) - Security Leadership Certification (GSLC), Certified Information system Security Professional (CISSP), or Certified Information Security Manager (CISM). Experience: At least one-year relevant experience performing Navy IA or cybersecurity functions. Preferred: Experience in an IT operational capacity (e.g., operations/project support, helpdesk). Strong analytical, problem-solving, and project management skills. Familiarity with U.S. Navy culture, processes, command organizations, and IT infrastructures. Ability to analyze general information assurance-related technical problems and provides recommendations and technical support in solving these problems. Be able to assess and support implementation of solutions that meet network security requirements. Experience with vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle. Advanced technical writing skills for developing documentation, reports, and training materials. The candidate must be: Familiar with the Navy RMF process. Capable of performing effectively individually and as part of a team. Technically savvy and possess excellent communication skills. Have effective critical thinking and problem-solving skills. Self-motivated and able to successfully deliver with minimal supervision. Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook. This position is fast paced and high demand that is a hybrid position (onsite and remote) in Suffolk, VA. Limited to no travel is anticipated. Pay Range Base pay is $85,000-$95,00, subject to skill level, qualifications, and location. Benefits Highlights: 401k, Tuition Reimbursement, Health/Dental/Vision Insurance, PTO, Federal Holidays, Performance Increases, Reserve Duty Compensation and more!
    $85k-95k yearly Auto-Apply 60d+ ago
  • OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track )

    Old Dominion University

    Information security analyst job in Suffolk, VA

    Posting Details Posting Details Job Title OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track ) Department RESILIENCE CLUSTER HIRE Number TBA Job Description The Office of Enterprise Research and Innovation (OERI) at Old Dominion University invites applicants for an annual 10-month position at Non-Tenure Track Assistant/Associate/Full Research Professor rank as part of a multi-position hiring cluster aiming for the Critical Infrastructure and Data Transformation to Advance National Security to begin in Fall 2026. This is an annual 12-month appointment that will begin July 25, 2026. The cluster, with faculty hires in School of Data Science, Batten College of Engineering and Technology and Office of Enterprise Research and Innovation, integrates interdisciplinary research in resilient infrastructure, infrastructure data transformation, and secure smart systems to address national security challenges in coastal regions. It explicitly addresses the Old Dominion University's Strategic Plan in research areas including Coastal Resilience and National Security. The research in this cluster will be supported by five interrelated, cross-cutting research domains, including Artificial Intelligence & Machine Learning, Computational & Data Science, Cybersecurity & Network Security, and Modeling & Simulation. The primary responsibilities for this position are as follows: Develop an interdisciplinary and externally funded research program in Critical Infrastructure and Data Transformation (CID) to Advance National Security. Collaborate with faculty hired in this cluster and other faculty at Old Dominion University. Opportunities for teaching graduate courses in the candidate's area of expertise will also be available with other departments in the BCET college or School of Data Science. Position Type FullTime Type of Recruitment General Public Type of Recruitment General Public Minimum required education and/or special licenses, registrations, trainings, or certifications A Ph.D. or equivalent terminal degree in engineering, computer science, or closely related field, complementary to the cluster's core areas of research, by May 2026. Candidates for research assistant professor should have a record of conducting research in modeling and simulation as evidenced by peer reviewed publications. Candidate for associate or full professor must have a demonstrated sustained track record of external federal funding and peer reviewed research publications. Minimum required level and type of experience, knowledge, skills, and abilities Candidate for associate research research professor must have a demonstrated sustained track record of external federal funding and peer reviewed research publications. A plan for developing an externally funded research program at ODU with expressed interest in leveraging complementary research expertise at ODU. Preferred Qualifications Non-Tenure Track (Research Assistant/Associate Professor) Office of Enterprise Research and Innovation (OERI): is seeking for faculty with the expertise aligned with the Center for Secure and Intelligent Critical Systems Digital Twin for distributed energy resources, Modeling and Simulation for efficient data center infrastructure. Cyber Resilient data center. Skill in working both independently and as part of an interdisciplinary team. Ability to transfer existing projects and plans for acquiring and sustaining sponsored research. Previous development and/or leadership experience with interdisciplinary, administrative, and/or academic initiatives. Successful record of grant funding. Conditions of Employment Location Suffolk, VA Job Open Date 09/15/2025 Application Review Date 11/15/2025 Open Until Filled Yes Application Instructions Interested candidates must complete the online application at************************************ including the following: A cover letter describing your relevant qualifications and indicating the rank you would like to be considered for. A curriculum vitae. A statement of research interests. Unofficial graduate transcripts. Contact information for 3 professional references. At the appropriate time in the Search process, these individuals will be contacted by the Search Committee. Applications should be submitted by November 15, 2025 for full consideration. The positions will remain open until filled. Questions about these positions should be directed to Dr. Murat Kuzlu (**************), Chair of the Critical Infrastructure and Data Transformation (CID) to Advance National Security Cluster Hire. Telework Friendly No Reasonable Accommodation Request If you are an individual with a disability and require reasonable accommodation, please contact the Division of Talent Management and Culture at *************. Pay Transparency Nondiscrimination Provision The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or consistent with contractor's legal duty to furnish information. About the College The Office of Enterprise Research and Innovation (OERI), within the Division of Research and Economic Development at Old Dominion University, unifies and focuses the advanced research of six distinct and diverse multidisciplinary applied research centers. From cybersecurity to maritime to modeling and simulation, OERI supports ODU's research infrastructure through innovation, workforce development, and industry engagement. OERI has evolved from the Virginia Modeling, Analysis, and Simulation Center (VMASC), which was established in 1997, and has been a secure and applied research and enterprise research facility of ODU. The continued success and growing recognition of VMASC as a global leader in the modeling and simulation sector has underscored the value of unifying research and commercial products. *************************************************************** About the Department
    $70k-100k yearly est. Easy Apply 60d+ ago
  • 3016 - Information Systems Security Analyst

    Alakai Services and Poe'Hana Group, Inc.

    Information security analyst job in Norfolk, VA

    Provide cybersecurity expertise supporting enterprise environments, including risk management, incident response, threat/vulnerability mitigation, and security architecture considerations. Key Responsibilities Assess/mitigate cybersecurity threats and vulnerabilities; apply risk management processes. Support encryption, access controls, intrusion detection, traffic analysis, and incident response/handling. Apply secure system/software lifecycle concepts and security architecture/enterprise reference models. Support continuity planning (backup/recovery, disaster recovery, COOP). Apply program/project management principles in support of information security program needs. Qualifications (Citizenship, Education, Experience, Skills) Certification required: DoD 8140.03 / 8570.01-M compliant commercial certification meeting IAT Level II. Documentation evidencing current IAT Level II status is required in addition to the resume. Experience: 4+ years in Cybersecurity. Skills (examples explicitly called out): Encryption algorithms: IPSEC, AES, GRE, IKE, MD5, SHA, 3DES. Incident response/handling; intrusion detection; penetration testing; emerging threats. Network protocols and models (TCP/IP, OSI), traffic analysis, access control mechanisms (e.g., ACLs). System/application threat knowledge (e.g., buffer overflow, XSS, SQL injection). Cloud service/deployment models (SaaS/IaaS/PaaS) and cloud security strategy/architecture. Data security standards including PII/PCI/PHI. Required DoD Systems, Tools, and Framework Experience Office tools: Ability to document, track, and report cyber work products Scheduling/Tracking systems: Experience supporting enterprise incident response programs/roles and performing analysis/reporting Security/Information handling: Knowledge of cybersecurity laws/regulations/policies/ethics; risk management; secure acquisition/supply chain risk concepts. We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
    $79k-110k yearly est. 26d ago
  • Cyber Analyst (Junior)

    Peraton 3.2company rating

    Information security analyst job in Hampton, VA

    Responsibilities We are seeking a skilled and motivated Cyber Analyst to join our team at Joint Base Langley-Eustis (JBLE), supporting the 363rd ISR Wing (363 ISRW). The Cyber Analyst will play a critical role in cryptologic support to the 363 ISRW's analysis & targeting mission. This position requires cyber threat analytical skills or cryptologic support experience, and the ability to work in a fast-paced, mission-driven environment. Key Responsibilities: * Conduct cyber threat analysis aligned with 363 ISRW analytical mission requirements and intermediate target development. * Provide non-kinetic analysis to include Cyber, EW and Technical ELINT to support 363 ISRW requirements and associated mission partners. * Collaborate with cross-functional teams to integrate cyber analysis into target development and operational planning. * Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems. * Ensure compliance with all security protocols, policies, and regulatory requirements. * Some travel may be required ( Qualifications Required Qualifications: * Experience Level: Minimum 3 years of experience conducting analysis relevant to the specific labor category, with at least a portion of the experience within the last 2 years. * Required Education: Associate's degree from a college or university accredited by an agency recognized by the U.S. Department of Education. An additional 2 years of experience in the specific labor category, for a total of 5 years of experience in the specific labor category, may be substituted for an associate's degree * Technical Expertise: * Familiarity in cryptologic support and cybersecurity operations. * Basic understanding of cyber threat analysis and mitigation strategies. * Skills: * Exceptional analytical and problem-solving skills. * Strong written and verbal communication skills for producing reports and collaborating with teams. * Ability to work effectively in a high-pressure, mission-critical environment. * Security Clearance: Active Top Secret/SCI clearance is required. * This role may require CI Polygraph Eligibility. Preferred Qualifications: * Experience supporting 363 ISRW or similar ISR organizations. * Knowledge of cryptologic systems, tools, and methodologies. * Familiarity with Air Force cybersecurity policies and procedures. * Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent. * DOD 8140 Compliance based on functional role: Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification. * Active CI Polygraph. Why Join Us? * Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations. * Work in a dynamic and collaborative environment at Joint Base Langley-Eustis, a hub for Air Force intelligence and cyber defense excellence. * Access to professional development opportunities and career growth within the intelligence and cybersecurity community. #AFACC Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $66,000 - $106,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $66k-106k yearly Auto-Apply 24d ago
  • Cyber Analyst Mid level w/ Secret clearance

    Connect Talent Solutions

    Information security analyst job in Hampton, VA

    Job Description The Cyber Analyst, Mid-Level, applies expertise and work experience executing cyber risk assessments. The ideal candidate will provide a broad range of information assurance activities and has a strong knowledge of systems, operating environments, system security, and networking. *This position requires onsite work Duties Determines system vulnerabilities and residual risk based on analysis of technical artifacts, interviews, and evaluation of current system state Evaluates effectiveness of proposed mitigations Contributes toward recommendations on technical/policy changes, processes and methodologies to assess and mitigate cybersecurity risk on information technology within the SCA's appointed authorization boundary Works with other Cyber Analysts, Subject Matter Experts (SMEs), and SCARs to ensure that all cybersecurity analysis and cybersecurity risk assessments are completed with time and quality standards established by Division leadership and Task Lead Supports program and projects with security and information assurance requirements elicitation based on customer and SME communication and independent research Performs all other duties, as assigned Requirements Bachelor's degree in Cybersecurity, Computer Science, Information Technology, Information Systems required. Equivalent work experience may be substituted for Bachelor's degree. Master's degree preferred. IAM Level II Certification in accordance with the Department of Defense (DoD) approved 8140 baseline certifications required Must have at least 5 years of experience in cyber risk assessment in cyber risk assessment or experience with technologies utilized in AFNET or DoD systems Proficiency with eMASS preferred Must have familiarization with NIST SP 800-53, AFI 17-130, and DODI 8510.01 Strong planning, organization, and analytical skills, with attention to detail required Must be able to take initiative and be self-motivated Quick learner; passionate about technology and able to learn new technology areas as directed Ability to elicit, identify, and research information assurance requirements and perform as a member of an assessment review team Effective team player with good interpersonal skills Must be able to work independently with minimal supervision Excellent written and verbal communication skills required Must be able to display professionalism in all situations Knowledge in emerging technologies including cloud, AI and virtualization, networking, systems engineering, identity management, web technologies, system administration, and system security is preferred This position requires onsite work. Must be flexible to be able to work in the office, as assigned. Must have an active DoD security clearance
    $74k-101k yearly est. 19d ago
  • Data Security Analyst, Intermediate

    Looper Consulting, LLC

    Information security analyst job in Norfolk, VA

    Job DescriptionDescription: Job Title: Data Security Analyst, Intermediate Company: Trimitron Corporation Position Type: Full-Time Equivalent (FTE) Trimitron Corp is seeking an experienced Data Security Analyst (Intermediate) to provide cybersecurity, data protection, and information assurance support to the Naval Information Warfare Center (NIWC) Pacific's Positioning, Navigation, and Timing (PNT) Division. This role plays a critical part in safeguarding sensitive PNT-related data, ensuring compliance with Navy and DoD cybersecurity standards, and supporting mission-critical research, engineering, and operational activities. The ideal candidate brings strong analytical skills, deep knowledge of data security principles, and experience working in complex technical environments where data integrity and confidentiality are paramount Key Responsibilities: Develop, refine, and implement data security requirements to protect sensitive and mission-critical information. Determine what data can be safely stored in vulnerable or distributed environments, applying risk-based decision-making. Design and document data protection procedures that account for system capacity, performance limitations, and operational constraints. Analyze data flows and information structures to create sensitivity-based data segregation protocols, ensuring only authorized individuals or processes can access high-security information. Conduct quality assurance evaluations of data security controls, identifying gaps and recommending improvements. Assess vulnerabilities related to malware, cyberattacks, unauthorized access, and internal misuse. Review and validate data access rules for departments, managers, and technical teams. Analyze access footprints, including user behavior, access times, and access locations, to identify anomalies or potential security risks. Support NIWC Pacific's PNT Division by ensuring secure handling, storage, and transmission of PNT-related data, models, and technical artifacts. Collaborate with PNT engineers, program managers, and cybersecurity personnel to ensure data security requirements align with Navy and DoD cybersecurity frameworks. Assist in developing and maintaining PNT-specific data protection protocols, ensuring compliance with mission, operational, and classification requirements. Provide data security insights during PNT program reviews, technical discussions, and risk assessments. Support incident response activities related to PNT data systems, including analysis, documentation, and remediation recommendations. Required Qualifications: Six (6) years of directly applicable experience in data security, cybersecurity, or information assurance. Bachelor's degree in Computer Science, Information Systems, Engineering, Business, or a related field. An advanced degree may substitute for two years of experience. Strong understanding of data classification, access control, vulnerability assessment, and cybersecurity best practices. Experience analyzing data structures, access logs, and system behaviors to identify risks or anomalies. Ability to design and document technical procedures and data protection protocols. Strong analytical, problem-solving, and communication skills. Preferred Qualifications: Experience supporting DoD, Navy, or NIWC programs, especially in research, engineering, or operational environments. Familiarity with cybersecurity frameworks such as RMF, NIST 800-53, DoD 8500-series, or Navy cybersecurity policies. Experience supporting mission-critical or high-sensitivity data environments. Ability to collaborate with multidisciplinary teams, including engineers, analysts, and program leadership. Why Join Trimitron Corp.? This position offers the opportunity to contribute to mission-critical defense projects, work alongside highly skilled professionals, and engage in challenging systems engineering tasks that directly impact national security operations. Benefits: We offer competitive pay and generous benefits including comprehensive medical insurance package, 401k with company match, employee assistance program and company paid benefits. Requirements:
    $70k-101k yearly est. 14d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Newport News, VA?

The average information security analyst in Newport News, VA earns between $67,000 and $129,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Newport News, VA

$93,000

What are the biggest employers of Information Security Analysts in Newport News, VA?

The biggest employers of Information Security Analysts in Newport News, VA are:
  1. Liebherr Group
Job type you want
Full Time
Part Time
Internship
Temporary