Information security analyst jobs in North Potomac, MD - 1,683 jobs
All
Information Security Analyst
Senior Security Engineer
Information Security Engineer
Cyber Security Analyst
Senior Systems Security Engineer
Security Engineer
Information Systems Engineer
Intrusion Detection Analyst
Information Assurance Engineer
Senior Information Security Engineer
Information Systems Security Officer
Cyber Security Engineer
Security Architect
Information Systems Security Manager
Senior Security Architect
Intrusion Detection Analyst - 2nd Shift
Govcio LLC
Information security analyst job in Washington, DC
GovCIO is currently hiring for a 2nd shift (3pm - 11:30pm) Intrusion Detection Analyst onsite in Washington, DC.
Responsibilities:
Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client
Provides timely and actionable sanitized intelligence to cyber incident response professionals
Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture
Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks
Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership
Qualifications:
Bachelor's with 8+ years of cyber security experience (or commensurate experience)
7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs
Working experience of Splunk SIEM. Contractor will have at least two years as a cyber security or security operations shift team leader
At least five years' experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $108,310.00 - USD $150,000.00 /Yr.
$108.3k-150k yearly Auto-Apply 5d ago
Looking for a job?
Let Zippia find it for you.
Lead Cyber Threat Analyst
Emergencymd
Information security analyst job in Washington, DC
Evolver Federal is seeking a Lead Cyber Threat Analyst to fulfil a requirement for a potential government client. The Lead Cyber Threat Analyst is responsible for identifying, analyzing, and mitigating advanced cyber threats targeting federal systems and critical infrastructure. This role focuses on proactive threat hunting, intelligence analysis, and developing strategies to detect and disrupt adversary tactics, techniques, and procedures (TTPs). The Lead Cyber Threat Analyst will lead a team of analysts, collaborate with SOC and incident response teams, and provide actionable intelligence to strengthen the organization's cybersecurity posture. This position requires deep expertise in threat analysis, malware research, and adversary emulation within highly regulated environments.
Responsibilities
Lead cyber threat analysis and intelligence operations to identify emerging threats and vulnerabilities.
Conduct proactive threat hunting across enterprise and cloud environments using advanced analytics.
Analyze adversary TTPs and develop detection strategies aligned with MITRE ATT&CK framework.
Oversee malware analysis, reverse engineering, and forensic investigations for complex incidents.
Integrate threat intelligence feeds into SOC workflows and detection platforms.
Leverage AI-driven threat detection techniques to enhance predictive and adaptive security capabilities.
Apply Zero Trust principles across detection, response, and access control strategies to strengthen enterprise resilience.
Implement cloud-native security solutions to safeguard workloads and data in multi-cloud environments.
Prepare and deliver executive-level threat reports, risk assessments, and strategic recommendations.
Collaborate with SOC, incident response, and engineering teams to enhance detection and response capabilities.
Maintain and update threat intelligence platforms and knowledge bases.
Support development of playbooks for threat hunting and incident response automation.
Ensure compliance with federal cybersecurity frameworks (NIST 800-series, RMF, TIC 3.0).
Mentor and coach junior analysts to develop technical expertise and career growth.
Manage cross-functional SOC projects, ensuring alignment between threat analysis, incident response, and engineering teams.
Drive process improvements and best practices across SOC operations to enhance efficiency and resilience.
Basic Qualifications
Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience and 4 years' experience in IT Solutions at senior management
Certified Information Systems Security Professional (CISSP)
Certified SecurityAnalyst, Certified Ethical Hacker, or similar certifications
Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended)
Information Technology Infrastructure Library (ITIL) 4 Foundation
10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical BPAs/contracts
US Citizen with the ability to pass a comprehensive government background check
Preferred Qualifications
Experience managing or supporting cybersecurity operations, including SOC functions, in a federal or highly regulated environment
Experience leading cybersecurity programs within federal civilian agencies
Master's degree in a technical or management-related field
GIAC (GCTI, GCFA) or AWS/Azure security certifications
Knowledge of RMF, NIST 800-series, OMB A-130, and TIC 3.0 policies
Experience with performance-based contracts and cross-functional team leadership
Strong communication skills, including experience delivering executive briefings and incident communications
Expertise in threat intelligence platforms (TIPs) and SIEM tools (Splunk, Elastic).
Familiarity with SOAR platforms and automation for threat detection and response.
Experience with malware reverse engineering and memory forensics.
Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and threat modeling methodologies.
Hands-on experience with cloud threat analysis (AWS, Azure, GCP) and container security.
Ability to lead advanced threat hunting campaigns and mentor junior analysts.
Understanding of nation-state threat actors and advanced persistent threats (APTs).
Experience integrating threat intelligence into vulnerability management and risk scoring.
Knowledge of scripting languages (Python, PowerShell) for automation and custom detection.
Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.
Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.
#J-18808-Ljbffr
$82k-111k yearly est. 5d ago
Lead Cyber Fusion Analyst
Leidos 4.7
Information security analyst job in Odenton, MD
This position will support GSM-O II Task Number 07 (TN07), which provides support to the DoD Cyber Defense Command (DCDC). DCDC provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support DCDC Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies.
Primary Responsibilities
Lead the DCDC Fusion Analyst team including employee engagement, training, performance reviews, and all other Leidos employee needs.
Includes mentoring, assigning and reviewing work and planning/scheduling to ensure milestones are completed in accordance with the program work statement.
Identify problems, determine accuracy and relevance of a broad range of technical information. Use sound judgment to generate, evaluate, and execute alternative courses of action. Produce timely, effective, decision-quality technical recommendations to support senior leadership.
Serve as a lead for planning, coordination, implementation, validation, mitigation, and compliance of cyber operations/intel security tasks.
Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity.
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy.
Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface.
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed.
Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment.
Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data.
Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting.
Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations.
Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities.
Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN.
Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends.
Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements.
Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure.
Required Qualifications
Active DoD TS/SCI Clearance and eligible for polygraph.
DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.).
Bachelor's degree in related discipline and 12+ years of related experience. Additional experience may be accepted in lieu of degree.
Strong communications and interpersonal skills.
Proficient in Microsoft Office applications (Word, Excel, Outlook, PowerPoint).
Proficient in Windows 7/8/10/11.
Ability to work in a virtual environment like Microsoft Teams.
Experience working with members of the Intelligence Community (IC) and knowledge and understanding of Intelligence processes.
In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies.
Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threatindicators, malware analysis results, Wireshark, Arcsight, etc.).
Experience with IC repositories (Pulse, TESTFLIGHT, etc.)
Experience with various open-source and commercial vendor portals, services and platform that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise.
Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs).
Preferred Qualifications
Experience with the DODIN and other DoD Networks.
Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.)
Experience with proprietary OSINT Sources (Mandiant, Recorded Future, Shodan, etc.)
Skilled in building extended cyber security analytics (Trends, Dashboards, etc.).
Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
Experience in intelligence driven defense and/or Cyber Kill Chain methodology.
IAT Level III or IAM Level II+III Certifications
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.
#J-18808-Ljbffr
$72k-90k yearly est. 1d ago
Information Systems Security Manager
Slope 4.0
Information security analyst job in Washington, DC
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century's most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril's family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.
ABOUT THE TEAM
Anduril employs a variety of networks and networking infrastructures to support global operations. Information Systems Security Managers are in charge of directly supporting business lines that wish to deploy Anduril products in classified environments. Information Systems Security Managers lead lean teams of Information Systems Security Officers to enable the program personnel to create contract deliverables. Well versed in Information Technology and the Risk Management Framework, Information Systems Security Managers are the driving force of Anduril's classified deployments. Forward thinkers capable of managing Business Line needs as well as critical thinking skills in order to drive customer requirements are the best candidates for a Information Systems Security Manager.
ABOUT THE JOB WHAT YOU'LL DO
Provide expertise in documenting security controls to reduce the administrative cost of deploying Anduril's products into operational environments.
Partner with program and security teams to coordinate security artifacts in support of classified deployments.
Apply technology standards from the commercial space in classified, air-gapped environments.
Collaborate with Information System Owners to understand key stakeholders' needs and provide complex technical solutions to meet contractual obligations.
Tailor NIST 800-53 controls to determine applicability to the network environment and oversee the implementation of Continuous Monitoring for respective programs.
Define, document, and conduct security scanning on Anduril's products and accredited information systems.
Scope, shape, and orchestrate the development of features to ensure products meet compliance goals.
REQUIRED QUALIFICATIONS
Design, develop, and implement secure systems and networks per NIST RMF, JSIG, and other industry standards.
Integrate security best practices into Anduril's Software Development Lifecycle (SDLC) and infrastructure design, collaborating with internal IT and engineering teams.
Conduct security risk assessments, vulnerability assessments, and audits to identify and mitigate threats.
Recommend and implement security solutions, such as IDS/IPS, encryption protocols, and secure communications technologies.
Develop and enforce access controls, encryption strategies, and other technical measures to safeguard systems.
Maintain and update System Security Plans (SSPs), POA&Ms, and other accreditation documentation.
Security Management (ISSM):
Manage the organization's security posture, ensuring compliance with internal policies and external regulatory frameworks.
Oversee Authorization and Accreditation (A&A) processes to obtain/maintain system Authority to Operate (ATO).
Lead incident response efforts, including investigation, root cause analysis, containment, and reporting.
Conduct regular audits, continuous monitoring, and risk assessments to ensure ongoing compliance and system resilience.
Collaborate with government security officials, stakeholders, and teams to address security gaps and improve controls.
Develop and deliver security awareness training and ensure adherence to security best practices.
Provide leadership and mentorship to security team members, fostering a culture of cybersecurity excellence.
Currently possesses and is able to maintain an active U.S. Top Secret security clearance.
PREFERRED QUALIFICATIONS
Experience with application security paradigms such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA). As well as the tools needed to perform these actions.
Proven experience in securing micro-services architecture, including implementing best practices and compliance with DoD cybersecurity standards.
Experience with cybersecurity in unmanned and ground control system within DoD environments.
Experience with containerization and kubernetes along with the best practices for securing them.
Experience with Cloud Service Providers (CSPs) and the various tools they offer for implementing security and compliance best practices.
US Salary Range
$150,000 - $225,000 USD
The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations. Highly competitive equity grants are included in the majority of full time offers; and are considered part of Anduril's total compensation package. Additionally, Anduril offers top-tier benefits for full-time employees, including:
The recruiter assigned to this role can share more information about the specific compensation and benefit details associated with this role during the hiring process.
Anduril is an equal-opportunity employer committed to creating a diverse and inclusive workplace. The Anduril team is made up of incredibly talented and unique individuals, who together are disrupting industry norms by creating new paths towards the future of defense technology. All qualified applicants will be treated with respect and receive equal consideration for employment without regard to race, color, creed, religion, sex, gender identity, sexual orientation, national origin, disability, uniform service, Veteran status, age, or any other protected characteristic per federal, state, or local law, including those with a criminal history, in a manner consistent with the requirements of applicable state and local laws, including the CA Fair Chance Initiative for Hiring Ordinance. We actively encourage members of recognized minorities, women, Veterans, and those with disabilities to apply, and we work to create a welcoming and supportive environment for all applicants throughout the interview process. If you are someone passionate about working on problems that have a real-world impact, we'd love to hear from you!
To view Anduril's candidate data privacy policy, please visit **********************************************
#J-18808-Ljbffr
$150k-225k yearly 4d ago
Information Assurance Engineer / Security Manager
C2 Labs, Inc.
Information security analyst job in Washington, DC
Information Assurance Engineer / Security ManagerC2 Labs, Inc. - **************
C2 Labs partners with clients on their IT transformation journey via our industry-leading capabilities in full stack development, hyper-automation/DevOps, and cybersecurity compliance. We provide specialized products and services that enable clients to innovate with speed and scale while maintaining a robust and effective security posture. As digital transformation partners, we address the most urgent needs holding back our clients, including proactively addressing cultural change, quantifying risk, automating compliance, and closing critical skill gaps
We are seeking a highly skilled and experienced InformationSecurity Engineering Manager to spearhead the development, implementation, and management of our organization's security infrastructure. This pivotal role will be responsible for safeguarding our critical assets and ensuring compliance with industry-leading security standards. You will lead a team of security professionals, providing technical guidance and fostering a culture of security awareness.
Responsibilities
Design, develop, and implement robust security networking architectures, incorporating Intrusion Detection/Prevention Systems (IDS/IPS) and other advanced security technologies.
Develop and enforce comprehensive security policies and procedures aligned with industry best practices and regulatory requirements.
Lead the monitoring and analysis of security systems, proactively identifying and responding to potential threats and vulnerabilities.
Manage and optimize existing security solutions, ensuring their effectiveness and efficiency.
Drive compliance initiatives, with a focus on the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls.
Effectively manage security projects, ensuring timely completion and adherence to budget.
Lead incident response efforts, coordinating investigations and implementing remediation strategies.
Mentor and develop a high-performing team of security professionals.
Qualifications
Bachelor's degree in an IT-related field required.
Minimum 15 years of experience in informationsecurity, or Certified Information Systems Security Professional (CISSP) certification with a minimum of 10 years of experience.
Demonstrated deep understanding of informationsecurity principles, including access control, network security, cryptography, and vulnerability management.
Proven experience in managing security projects and leading incident response activities.
Extensive experience with the Risk Management Framework (RMF) and NIST 800-53 Rev 5 controls.
Excellent communication, leadership, and problem-solving skills.
EOE STATEMENT
We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen.
#J-18808-Ljbffr
$72k-96k yearly est. 1d ago
Information Security Engineer
Isaca 4.5
Information security analyst job in Washington, DC
The Information Technology Department of Arnold & Porter has an opening for an InformationSecurity Engineer in the Washington, DC office or may work 100% virtual/remote in a firm-approved U.S. state as part of the “Gideon” office. The InformationSecurity Engineer is a technical security expert responsible for supporting security operations, engineering, and architecture functions and efforts for Arnold & Porter. Under the direction of the Manager of InformationSecurity, the InformationSecurity Engineer helps to ensure the overall security posture of the firm, and is expected to be involved in day-to-day security operations and contribute to ensuring the integrity and availability of the firm's IT and application infrastructure and the confidentiality, integrity, and availability of the firm's data in support of enterprise IT objectives and client service delivery needs.
Qualifications:
Responsibilities
Security Operations
Performing security log and event analysis taking appropriate action as directed or required to address security risk issues or events / incidents using EDR, SIEM and log aggregation systems.
Monitoring and proactively executing the vulnerability management program to prevent or reduce IT hygiene risk issues from impacting production systems.
Maintaining and managing security toolsets as assigned, that help to mitigate or respond to security events and incidents including, but not limited to:
Application control systems
EDR/AV
Email Security platform
Attack simulation platform
Threat intelligence/hunting
Security related artificial intelligence tools
Supporting security incident response and investigation efforts as directed.
Helping validate and track IT operational activities to ensure compliance with policy, standards, and other applicable requirements, or as directed by organizational needs.
Researching and identifying security vulnerabilities and relevant industry / cybersecurity trends for follow-up and action.
Regularly reporting and tracking IT security events and metrics along with remediation activities.
Helping support third-party risk management efforts as assigned.
Helping support the firm security awareness training program as assigned.
Helping support the firm's IT Compliance efforts as assigned.
Participating in IT Security on-call rotation.
Security Engineering & Architecture
Advising and assisting with planning of security systems and standards by evaluating network and security technologies, developing security requirements for the enterprise infrastructure, and maintaining overall user access and data protection control in support of enterprise objectives and client service delivery.
Reviewing newly requested applications and SaaS and application changes for security impacts and possible remediation to address security risk.
Actively participating in the enterprise Change Advisory Board (CAB).
Conducting research and providing recommendations on methods, software, and technologies to mitigate risk exposures.
Helping to develop and contribute to security policies, standards and procedures to maintain an appropriate security posture and/or compliance with applicable requirements.
Technical Skills & Experience
Education/Experience
Four year college degree preferred; equivalent experience will be considered.
Minimum of three (3) years of experience in InformationSecurity, or equivalent experience in IT-related fields with secondary security responsibilities.
Technical Skills
Experience and understanding of Windows, Unix/Linux, and Active Directory.
Solid understanding of core networking protocols, including TCP/IP, UDP, DNS, DHCP, HTTP/HTTPS, routing protocols.
Experience and technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, application security, and cloud security.
Proficient in Windows operating systems, Microsoft Office Suite, and related software.
Skilled in leveraging artificial intelligence tools for daily work.
Strong remote collaboration capabilities.
Communication & Writing
Communicate complex technical information clearly to non-technical audiences.
Excellent oral and written communication, including reports, business correspondence, and procedure manuals.
Effective presenter to diverse groups, including managers, clients, and the public.
Ability to identify and apply the appropriate method of communication.
Professionalism & Judgment
Strong personal initiative, judgment, and professionalism.
High level of confidentiality and discretion.
Exceptional client service for both internal and external stakeholders.
Problem-Solving & Strategic Focus
Strong problem-solving skills and strategic thinking.
Ability to define goals, prioritize tasks, and follow through to achieve results.
Detail-oriented with excellent organizational and time management skills.
Capable of handling multiple tasks in fast-paced environments.
Flexibility & Commitment
Reliable, dependable, and motivated.
Flexible to work additional hours as needed.
Willingness to travel (1-4 weeks per year, or more if required).
The anticipated base salary for this position is $122,000 to $160,000. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location in which the applicant lives and/or from which they will be performing the job.
For benefits information, please note the firm's benefits details are available upon request.
The firm may provide a discretionary bonus annually.
Arnold & Porter is an equal opportunity employer that does not discriminate on the basis of race, color, creed, religion, national origin, sex, pregnancy and childbirth (including breastfeeding and related medical conditions), age, marital or partnership status, familial status, sexual orientation, gender, gender identity, gender expression, transgender, physical or mental disability, medical condition, family leave status, citizenship status, immigration status, ancestry, genetic information, military or veteran status, or any other characteristic protected by local, state or federal laws, rules or regulations. Our Firm\'s equal opportunity policy applies to all employment practices and terms and conditions, including, without limitation, recruitment, employment, assignment, training, compensation, benefits, promotions, disciplinary action and terminations. For purposes of the firm\'s Anti-discrimination and Anti-harassment Policies, the term "race" includes, without limitation, traits historically associated with race, including, but not limited to, hair texture and protective hairstyles, such as braids, locks, and twists.
Arnold & Porter Kaye Scholer LLP endeavours to make information accessible to any and all users. If you would like to contact us regarding accessibility of our website or need assistance completing the application process, please contact Director of Support Staff at ***************. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
For our EEO Policy Statement, please contact us for details. If you would like more information about your EEO rights as an applicant under the law, please inquire about Know Your Rights.
Arnold & Porter Kaye Scholer LLP uses E-Verify, which is a web-based system, to confirm the eligibility of our employees to work in the United States. As an E-Verify employer, we verify the identity and employment eligibility of newly hired employees by electronically matching information provided by employees on the Form I-9, Employment Eligibility Verification, against records available to the Social Security Administration (SSA) and the Department of Homeland Security (DHS). We use E-Verify because we are a federal contractor containing the Federal Acquisition Regulation (FAR) E-Verify clause. Please see the posters for details regarding E-Verify or contact Arnold & Porter Kaye Scholer LLP's Human Resources Department for more information. E-Verify Participation Poster and Right-to-work Poster.
#J-18808-Ljbffr
Information security analyst job in Washington, DC
A leading technology consulting firm is seeking a DevSecOps Architect with over 12 years of experience in building secure and scalable solutions. The role demands strong proficiency in automation tools, cloud security, and container orchestration. Ideal candidates will possess cloud certifications and an active TS/SCI Clearance. This position offers the opportunity to work in a fast-paced environment while collaborating effectively with both technical and non-technical stakeholders.
#J-18808-Ljbffr
$109k-151k yearly est. 1d ago
Firewall Security Engineer
Novacoast 3.9
Information security analyst job in Washington, DC
Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check.
Qualifications
To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments.
Responsibilities
In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls.
Requirements
5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments
Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies
Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management
Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs
US Citizenship is required due to the position being with a Federal Client
If this role is aligned with your next career move, submit your resume today for immediate consideration!
Job Type: Contract
Pay: $60.00 - $68.00 per hour
#J-18808-Ljbffr
$60-68 hourly 4d ago
Lead Security Engineer - Federal Cyber Operations
Teksynap
Information security analyst job in Washington, DC
A high-tech company is seeking a Lead Security Engineer to oversee cybersecurity operations within the DC area. The ideal candidate will lead efforts to ensure compliance with federal security standards while managing vulnerabilities and incidents. Qualifications include a Bachelor's in Cybersecurity, 8-10 years of relevant experience, and necessary security clearances. The position offers a competitive benefits package, including health and retirement plans, within an office setting with occasional travel expectations.
#J-18808-Ljbffr
$73k-99k yearly est. 3d ago
Information Security Engineer
Arnold & Porter LLP 4.9
Information security analyst job in Washington, DC
The Information Technology Department of Arnold & Porter has an opening for an InformationSecurity Engineer in the Washington, DC office or may work 100% virtual/remote in a firm-approved U.S. state as part of the “Gideon” office. The InformationSecurity Engineer is a technical security expert responsible for supporting security operations, engineering, and architecture functions and efforts for Arnold & Porter. Under the direction of the Manager of InformationSecurity, the InformationSecurity Engineer helps to ensure the overall security posture of the firm, and is expected to be involved in day-to-day security operations and contribute to ensuring the integrity and availability of the firm's IT and application infrastructure and the confidentiality, integrity, and availability of the firm's data in support of enterprise IT objectives and client service delivery needs.
Responsibilities
Security Operations
Performing security log and event analysis using EDR, SIEM and log aggregation systems.
Monitoring and proactively executing the vulnerability management program to prevent or reduce IT hygiene risk issues from impacting production systems.
Maintaining and managing security toolsets such as Application control systems, EDR/AV, Email Security platform, Attack simulation platform, Threat intelligence/hunting, and Security related artificial intelligence tools.
Supporting security incident response and investigation efforts as directed.
Helping validate and track IT operational activities to ensure compliance with policy, standards, and other applicable requirements.
Researching and identifying security vulnerabilities and relevant industry/cybersecurity trends for follow-up and action.
Regularly reporting and tracking IT security events and metrics along with remediation activities.
Helping support third‑party risk management efforts as assigned.
Helping support the firm security awareness training program as assigned.
Helping support the firm's IT Compliance efforts as assigned.
Participating in IT Security on‑call rotation.
Security Engineering & Architecture
Advising and assisting with planning of security systems and standards by evaluating network and security technologies, developing security requirements for the enterprise infrastructure, and maintaining overall user access and data protection control.
Reviewing newly requested applications and SaaS and application changes for security impacts and possible remediation to address security risk.
Actively participating in the enterprise Change Advisory Board (CAB).
Conducting research and providing recommendations on methods, software, and technologies to mitigate risk exposures.
Helping to develop and contribute to security policies, standards and procedures.
Qualifications
Education/Experience
Four‑year college degree preferred; equivalent experience will be considered.
Minimum of three (3) years of experience in InformationSecurity, or equivalent experience in IT-related fields with secondary security responsibilities.
Technical Skills
Experience and understanding of Windows, Unix/Linux, and Active Directory.
Solid understanding of core networking protocols, including TCP/IP, UDP, DNS, DHCP, HTTP/HTTPS, and routing protocols.
Experience and technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, application security, and cloud security.
Proficient in Windows operating systems, Microsoft Office Suite, and related software.
Skilled in leveraging artificial intelligence tools for daily work.
Strong remote collaboration capabilities.
Communication & Writing
Communicate complex technical information clearly to non-technical audiences.
Excellent oral and written communication, including reports, business correspondence, and procedure manuals.
Effective presenter to diverse groups, including managers, clients, and the public.
Ability to identify and apply the appropriate method of communication.
Professionalism & Judgment
Strong personal initiative, judgment, and professionalism.
High level of confidentiality and discretion.
Exceptional client service for both internal and external stakeholders.
Problem‑Solving & Strategic Focus
Strong problem‑solving skills and strategic thinking.
Ability to define goals, prioritize tasks, and follow through to achieve results.
Detail‑oriented with excellent organizational and time‑management skills.
Capable of handling multiple tasks in fast‑paced environments.
Flexibility & Commitment
Reliable, dependable, and motivated.
Flexible to work additional hours as needed.
Willingness to travel (1-4 weeks per year, or more if required).
The anticipated base salary for this position is $122,000 to $160,000. The actual base salary offered will depend on a variety of factors, including, without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location in which the applicant lives and/or from which they will be performing the job.
The firm may provide a discretionary bonus annually.
Arnold & Porter is an equal opportunity employer that does not discriminate on the basis of race, color, creed, religion, national origin, sex, pregnancy and childbirth (including breastfeeding and related medical conditions), age, marital or partnership status, familial status, sexual orientation, gender, gender identity, gender expression, transgender, physical or mental disability, medical condition, family leave status, citizenship status, immigration status, ancestry, genetic information, military or veteran status, or any other characteristic protected by local, state or federal laws, rules or regulations. Our Firm's equal opportunity policy applies to all employment practices and terms and conditions, including, without limitation, recruitment, employment, assignment, training, compensation, benefits, promotions, disciplinary action and terminations. For purposes of the firm's Anti-discrimination and Anti-harassment Policies, the term "race" includes, without limitation, traits historically associated with race, including, but not limited to, hair texture and protective hairstyles, such as braids, locks, and twists.
#J-18808-Ljbffr
$122k-160k yearly 4d ago
Information Security Engineer (ISSE) | RMF, Cloud, Govt
Method, Inc. 4.6
Information security analyst job in Washington, DC
A leading cybersecurity firm is seeking an Information Systems Security Engineer (ISSE) to support secure, mission-focused information systems in a high-impact government environment. The ISSE will work on cybersecurity controls design, implementation, and maintenance, ensuring systems meet federal requirements. The ideal candidate will have 3-5 years in cybersecurity, TS Clearance, and practical experience with NIST RMF as well as familiarity with various security tools. This role offers the opportunity to contribute significantly to the security of government missions.
#J-18808-Ljbffr
$80k-108k yearly est. 4d ago
Senior Cloud & Security Software Engineer
Tla LLC
Information security analyst job in Washington, DC
A technology firm is seeking a Software Engineer to design, develop, and integrate secure computing environments supporting critical mission objectives. The role requires experience in full-stack development, AWS services, and Infrastructure-as-Code tools. Ideal candidates will collaborate with cross-functional teams and possess strong scripting skills. Preferred certifications include AWS Certified Solutions Architect. This position is based in Washington, D.C.
#J-18808-Ljbffr
$98k-136k yearly est. 5d ago
Qualys Security Engineer- Active Secret Clearance Required
VETS, Inc.
Information security analyst job in Washington, DC
Staffing Pros, a division of VETS Inc., is recruiting for a full-time Qualys Security Engineer onsite in Washington, DC or Beltsville, MD. This position requires an Active Secret Clearance.
The Senior Qualys Security Engineer will support our customer's enterprise vulnerability management initiatives. This role involves maintaining and optimizing Qualys toolsets, performing vulnerability assessments, and working collaboratively across technical teams to strengthen organizational cybersecurity posture.
This position is based on-site at either the Washington, DC or Beltsville, MD office, with occasional travel between the two locations.
What you'll do:
Oversee day-to-day management of the Qualys platform including agents, scanners, and connectors.
Optimize scan configurations, authentication methods, and template deployments.
Review and interpret scan results to generate actionable intelligence for technical and non-technical audiences.
Partner with infrastructure, development, and SOC teams to validate findings and drive remediation efforts.
Automate tasks using Qualys APIs and custom scripts to support reporting and data integration.
Maintain an up-to-date asset inventory through discovery and classification workflows.
Minimize false positives through tuning and validation.
Conduct policy compliance assessments in support of regulatory frameworks.
Provide guidance and mentorship to junior analysts in vulnerability management best practices.
Required Qualifications
5+ years of hands-on expertise with Qualys.
Must be able to commute to Beltsville, MD or Washington, DC for full-time onsite work.
Secret clearance with the ability to obtain a Top Secret clearance is required.
Proficiency in scripting (Python, PowerShell, or Bash).
Familiarity with network protocols, OS security (Windows/Linux), and web application vulnerabilities.
Understanding of compliance standards and frameworks (e.g., NIST 800-53, CIS Controls, ISO 27001.)
Qualys Vulnerability Management & Policy Compliance.
Qualys Web Application Scanning.
Automation using Qualys APIs.
Network architecture and protocol knowledge.
Database and OS-level security.
Vulnerability lifecycle and remediation strategies.
Excellent written and verbal communication.
Strong problem-solving and analytical mindset.
Ability to operate independently or as part of a multi-disciplinary team.
Solid documentation and reporting practices.
Experience engaging with cross-functional stakeholders.
US Citizenship is required.
Preferred Qualifications
Professional certifications: CISSP, CEH, GIAC, or equivalent.
Exposure to other scanning tools (e.g., Tenable, Rapid7).
Familiarity with public cloud security models (AWS, Azure, GCP).
Experience with configuration management tools and CI/CD pipelines.
Background in system administration, network engineering, or DevSecOps.
EEO Statement Staffing Pros a division of VETS-inc is an Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information.
$84k-117k yearly est. 38d ago
Information System Security Officer
Conviso Inc.
Information security analyst job in Germantown, MD
Conviso Inc is looking for ISSO Officer for onsite Job. This role comes with benefits, 401K & some accrued PTO. The Ideal must have hands-on technical and analytical experience supporting the RMF lifecycle, cybersecurity monitoring, continuous authorization, and security control assessments. Are you open to new opportunities & could this be of interest?
On Site Job at 3 locations - Albuquerque NM, Las Vegas NV, Germantown MD
Active Top-Secret Clearance Required
Title: Information System Security Officer (ISSO)
Minimum 3 years as an ISSO
Required Skills: ISSO personnel must understand and interpret data from security tools and apply NIST frameworks with precision.
Capabilities include:
Proficiency in NIST SP 800-37, 800-53, 800-60, FIPS 199, CNSSI 1253.
Ability to perform risk assessments, system categorization, and control selection.
Experience with eGRC tools (e.g., Archer) for documentation, continuous monitoring, and POA&M management.
Responsibilities:
Prepare: Support enterprise, mission, and system-level RMF readiness, establish tailored baselines, identify assets, assess risks, and determine system placement in the enterprise architecture.
Categorize Information Systems: Perform FIPS 199 categorization, develop SSP subsections, register systems, and ensure early engagement with developers to integrate cybersecurity impact analysis.
Select Security Controls: Document, implement, and validate selected controls, incorporating security architecture, privacy requirements, and common control inheritance.
Assessment: Develop assessment plans, test controls, produce SARs, document findings, and support POA&M development.
Data Calls: Provide timely and accurate evidence and responses using approved tools. Internal & External Assessments: Support audits, collaborate with internal and external partners, and perform self-assessments.
Program-Level Documentation Support: Maintain program policies, adjudicate comments, and assess the impact of federal directives and legislation.
$65k-88k yearly est. 3d ago
Senior Systems Security Engineer - Cloud, IR & Compliance Lead
Nava 4.0
Information security analyst job in Washington, DC
A leading technology solutions provider in Washington, DC is seeking a Senior Systems Security Engineer. This role involves hands-on engineering and securing multiple operating systems, managing vulnerabilities, and ensuring compliance with security frameworks. Ideal candidates will have 5-10 years of experience in system engineering and strong communication skills. The position offers competitive pay and extensive benefits including paid medical and dental insurance.
#J-18808-Ljbffr
$74k-97k yearly est. 5d ago
Senior Information Security Engineer / Vulnerability Manager
C2 Labs, Inc.
Information security analyst job in Washington, DC
C2 Labs, Inc. - **************
C2 Labs partners with clients on their IT transformation journey via our industry-leading capabilities in full stack development, hyper-automation/DevOps, and cybersecurity compliance. We provide specialized products and services that enable clients to innovate with speed and scale while maintaining a robust and effective security posture. As digital transformation partners, we address the most urgent needs holding back our clients, including proactively addressing cultural change, quantifying risk, automating compliance, and closing critical skill gaps.
Job Duties
As a Senior InformationSecurity Engineer / Vulnerability Manager, you will lead efforts to identify, assess, and mitigate security vulnerabilities across complex enterprise IT environments. Responsibilities include:
Vulnerability & Threat Management
Manage enterprise vulnerability management platforms (e.g., Tenable, Qualys, Rapid7) and ensure timely scanning, reporting, and remediation tracking.
Perform risk-based analysis of vulnerabilities, develop mitigation plans, and escalate issues requiring urgent remediation.
Integrate threat intelligence to prioritize vulnerabilities based on exploitability, industry trends, and business impact.
Establish and maintain vulnerability KPIs, metrics, and executive reporting dashboards.
Security Engineering
Design, implement, and maintain security controls and safeguards across networks, endpoints, and cloud environments (AWS, Azure, or hybrid).
Automate security operations tasks using scripts or tools (Python, PowerShell, Bash, or AWS Lambda).
Collaborate with IT and DevOps teams to integrate vulnerability management into CI/CD pipelines and cloud workloads.
Conduct regular security assessments, penetration test remediation support, and continuous monitoring activities.
Governance, Risk, & Compliance
Support compliance with federal frameworks (FedRAMP, NIST SP 800-53, NIST SP 800-171/CMMC, FISMA, etc.).
Document processes, remediation plans, and compliance evidence in alignment with client requirements.
Provide recommendations for continuous improvement of security posture and policy enforcement.
Collaboration & Leadership
Partner with cross-functional teams (IT, Development, Operations, and Compliance) to ensure vulnerabilities are remediated in a timely, risk-based manner.
Provide technical leadership and mentorship to junior security engineers and analysts.
Participate in client-facing meetings and presentations as a subject matter expert in vulnerability and threat management.
Education, Training, Qualifications, and Certifications
Required:
U.S. Citizenship and ability to obtain/maintain Public Trust clearance
Bachelor's degree in Computer Science, Cybersecurity, or related field OR 5+ years of equivalent hands-on experience
Proven experience in vulnerability management, security engineering, or penetration testing
Strong knowledge of IT infrastructure, networking, and cloud environments (AWS preferred)
Familiarity with security automation, scripting (Python, PowerShell, Bash), and infrastructure-as-code principles
Excellent analytical, problem-solving, and communication skills
Background check and unannounced drug testing required.
This position is onsite in Washington, DC, with occasional travel (up to 25%) for client meetings and work assignments.
Preferred:
Professional certifications such as CISSP, CISM, OSCP, CEH, Security+, or AWS Security Specialty
Experience with compliance frameworks (FedRAMP, NIST 800-53, CMMC)
Background in DevSecOps practices, continuous monitoring, and automation
EOE STATEMENT:
We are an equal opportunity employer. All qualified applicants will be considered without discrimination based on race, color, religion, sex, national origin, age, disability, or protected veteran status. Employment offers will be contingent on passing a pre-employment drug screen.
#J-18808-Ljbffr
$103k-139k yearly est. 2d ago
Senior Security Engineer
Emergencymd
Information security analyst job in Washington, DC
Evolver Federal is seeking a Senior Security Engineer to fulfill a requirement for a potential government client. The Senior Security Engineer is responsible for designing, implementing, and maintaining advanced security solutions to protect federal systems and data. This role prioritizes continuous monitoring, FISMA compliance, and OIG audit readiness while engineering secure architectures, integrating cybersecurity technologies, and ensuring adherence to federal standards such as NIST 800-series, RMF, and TIC 3.0. The Senior Security Engineer will work closely with SOC teams, architects, and program managers to deliver robust security capabilities across cloud (AWS GovCloud, Azure Government), on-premises, and hybrid environments. This position requires deep technical expertise, hands-on experience with security tools, and the ability to lead engineering efforts for mission‑critical systems in highly regulated environments.
Responsibilities
Design and implement security solutions for enterprise and federal environments, ensuring compliance with RMF and NIST guidelines.
Engineer secure configurations for SIEM, SOAR, EDR, and vulnerability management platforms.
Support Tier 2/3 SOC analysts by developing advanced correlation rules for Splunk and optimizing detection workflows.
Support SOC operations by integrating advanced detection and response capabilities.
Conduct security assessments, penetration testing, and risk analysis for critical systems.
Implement continuous monitoring and automated compliance reporting to meet Department of Labor and federal requirements.
Develop and maintain security engineering documentation, including system security plans and architecture diagrams.
Collaborate with architects and program managers to align security engineering with strategic objectives.
Lead efforts to integrate security into DevSecOps pipelines and CI/CD workflows.
Provide technical expertise during incident response and forensic investigations.
Evaluate emerging technologies and recommend enhancements to improve security posture.
Define and track measurable outcomes such as MTTR reduction, SLA adherence, compliance score improvements, and false positive reduction to meet performance‑based contract KPIs.
Coordinate with federal stakeholders (CISO, ISSOs, AO) and provide audit support for ATO processes.
Ensure adherence to performance‑based contract requirements and federal cybersecurity mandates.
Basic Qualifications
Bachelor's Degree in Computer Science, Information Management (IM), Information Technology, Engineering, or equivalent with 6 years of technical experience, or 4 years' experience in IT Solutions at senior management
Certified Information Systems Security Professional (CISSP) mandatory with Information Systems Security Engineering Professional (ISSEP) concentration
Project Management Institute (PMI) Project Management Professional (PMP) (Highly Recommended)
Information Technology Infrastructure Library (ITIL) 4 Foundation
10 years of successful enterprise experience in an IT or technology-related field, with the last 5 years, on large government technical contract/BPAs
US Citizen with the ability to pass a comprehensive government background check
Preferred Qualifications
Master's degree in cybersecurity, IT, or a related technical field
Experience supporting SOC operations in federal or regulated environments
Familiarity with RMF, NIST 800-series, OMB A-130, and TIC 3.0
Proven leadership in cross‑functional teams and performance‑based contracts
Strong communication skills, including executive briefings and incident reporting
Hands‑on experience with SIEM (Splunk, Elastic), SOAR (Cortex XSOAR), and EDR (CrowdStrike, Microsoft Defender).
Expertise in cloud security engineering (AWS, Azure, GCP) and container security (Kubernetes, Docker).
Familiarity with Zero Trust Architecture principles and implementation strategies.
Familiarity Continuous Diagnostics and Mitigation (CDM).
Experience with PKI, encryption standards, and secure network design.
Knowledge of automation tools for security orchestration and compliance reporting.
Ability to lead technical teams and mentor junior engineers in cybersecurity best practices.
Experience integrating security controls into large-scale federal systems and mission‑critical applications.
Understanding of advanced threat detection techniques and AI‑driven security solutions.
Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.
Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.
#J-18808-Ljbffr
$98k-136k yearly est. 5d ago
Senior Systems Security Engineer
Nava 4.0
Information security analyst job in Washington, DC
Be Challenged and Make a Difference
In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
Description of Task to be Performed:
AnaVation is looking for a Sr. Systems Security Engineer to assist the customer with engineering and administration tasks. The ideal candidate will be comfortable engaging with client leadership on a regular basis and interacting with senior level team members.
Responsibilities
Perform hands-on engineering, administration, and securing of multiple operating systems (e.g., Windows, RHEL, Unix variants), and applying DISA STIGs across diverse vendor technologies, including virtualization platforms (VMWare, Hyper-V), cloud environments (AWS, Azure, Google Cloud), and enterprise applications.
Perform system administration tasks to include audit and log management, availability monitoring and remediation, account management and access reviews, and configuration update scheduling and performance.
Contribute to the design and development of secure system architectures, ensuring security is integrated through system and network lifecycles.
Evaluate, implement, and document security architecture solutions, aligning with compliance requirements and organizational mission needs.
Ensure technical compliance with applicable security frameworks, standards, and regulations (e.g., DISA SITGs, NIST 800-53, RMF).
Conducting, configuring, and managing vulnerability scans.
Conducting vulnerability remediations, patching, and system hardening.
Collaborate with ISSOs, Assessors, System Owners, and other stakeholders to implement security controls.
Support security assessments, audits, and accreditation/authorization (ATO) activities.
Document security configurations, engineering solutions, and compliance evidence.
Troubleshoot and resolve security-related technical issues in a timely manner.
Understanding and advising the client regarding critical application data and vulnerability points, coordinating with industry partners to advise the government regarding those security vulnerabilities, and providing recommendations and advice on incident response and recovery plans.
Providing Incident Response (IR) activities including triage, investigation, interviewing, resolving, and reporting on events.
Promoting informationsecurity awareness across the program, ensuring security controls and processes are implemented.
Presenting vulnerability analysis to system owners and leadership.
Required Qualifications
5-10 years of experience in information system engineering and configuration management.
5 years of experience in control implementation and secure system engineering or design.
Excellent communication skills.
Hands on experience with:
Security monitoring and evaluation, including audits, assessments, and risk management
SIEM tools (e.g., Splunk)
Vulnerability Scanning tools (e.g., Tenable, Nessus)
EDR tools (e.g., Crowdstrike)
Web App Scanning tools (e.g., Burpsuite, Acunetix)
Active Directory
SANs
VMWare
Networking Devices
Expertise in batch, bash, and/or PowerShell scripting
Able to deliver and present security compliance to a wide range of audiences (i.e., system owners, division leadership).
Experience configuring and operating enterprise storage across networks (SAN)
Server visualization - design solutions and configuration (VMWare, VSphere, Hyper-V, etc)
Experience with:
Linux (RHEL 7/8), Windows Operating Systems, and Oracle/SQL Databases
Agile Methodologies
GRC Tools (e.g., CSAM)
Strong desire to learn, grow and be highly motivated.
Certifications: OS specific certifications, Security +
Personnel assigned to this task shall possess a blend of strong technical skills (networking, operating systems, security tools, programming, encryption) and essential soft skills (problem-solving, critical thinking, communication, collaboration) to design, implement, and maintain an information system's security control implementation.
Desired Qualifications
Knowledgeable on different cloud providers: AWS, Azure, Oracle, GCP
Understanding of servers and security tools
Education: Bachelor's degree in Engineering, Computer Science, or Information Systems
Certifications: CompTIA Server+, Cloud certifications (AWS, Azure, Google), Network+, CCNA, RHCSA, Azure (AZ-104, AZ-204, AZ-500, AZ-305), AWS Solutions Architect
Benefits
Generous cost sharing for medical insurance for the employee and dependents
100% company paid dental insurance for employees and dependents
100% company paid long-term and short-term disability insurance
100% company paid vision insurance for employees and dependents
401k plan with generous match and 100% immediate vesting
Competitive Pay
Generous paid leave and holiday package
Tuition and training reimbursement
Life and AD&D Insurance
About AnaVation
AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team.
If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you!
AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
#J-18808-Ljbffr
$74k-97k yearly est. 5d ago
Information System Security Engineer (ISSE)
Tla LLC
Information security analyst job in Washington, DC
TLA is seeking an Information System Security Engineer (ISSE). This is a critical role responsible for designing, developing, implementing, and maintaining secureinformation systems and networks. The ISSE ensures that security requirements are effectively integrated into systems throughout their entire lifecycle, from design to disposal. This position involves close collaboration with system owners, developers, and other stakeholders to identify vulnerabilities, assess risks, and implement robust security controls in accordance with industry standards and regulatory frameworks such as the NIST Risk Management Framework (RMF) and DoD 8570/8140 guidelines.
Responsibilities
Security Architecture and Design: Design, develop, and implement network and system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation.
Risk Management: Assess and mitigate system security threats and risks throughout the program life cycle, including performing technical security assessments and vulnerability analyses.
Compliance and Documentation: Ensure systems comply with applicable security policies, standards, and methodologies (e.g., NIST, DoD, FISMA). Prepare and maintain security documentation, including System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and security assessment reports.
Testing and Validation: Plan and conduct security verification testing, using tools like vulnerability scanners (e.g., Nessus, ACAS) to identify weaknesses and ensure controls are in place and effective.
Operational Support and Incident Response: Monitor systems for irregular behavior, support security incident response activities, and manage changes to systems while assessing their security impact.
Collaboration and Guidance: Serve as a subject matter expert, providing guidance to development, engineering, and program teams on secure design, development, and secure coding techniques.
System Hardening: Oversee the implementation of security configuration settings and hardening of systems (e.g., using DISA STIGs) to minimize vulnerabilities.
Required Skills and Experience
Education: Bachelor's degree in Computer Science, Information Technology, Information Assurance, Information Systems Security Engineering, or a related field (or equivalent experience).
Experience: A minimum of 5-8 years of experience in informationsecurity engineering, system administration, and/or cybersecurity, with hands‑on experience in implementing security controls and supporting authorization processes.
Technical Skills
Expert knowledge of security engineering principles, secure architecture, and design concepts.
Hands‑on experience with security tools such as vulnerability scanners (Nessus/ACAS), SIEM platforms (Splunk, LogRhythm), and security configuration tools (DISA STIGs, SCAP).
Strong understanding of network protocols, firewalls, intrusion detection/prevention systems, encryption techniques, and access controls.
Familiarity with various operating systems (Windows, Linux, Unix) and secure configuration management.
Experience with risk management frameworks, specifically the NIST RMF and/or DoD 8500 series guidance.
Soft Skills
Strong analytical thinking, attention to detail, problem‑solving capabilities, and excellent communication skills to collaborate effectively with technical and non‑technical stakeholders.
Clearance (if applicable): May require a U.S. Citizenship and an active security clearance (e.g., Secret, Top Secret, or SCI).
Preferred Certifications
Certified Information Systems Security Professional (CISSP)
CISSP-Information Systems Security Engineering Professional (ISSEP)
Certified Cloud Security Professional (CCSP)
Certified Ethical Hacker (CEH) or GIAC certifications (GSEC, GCIH)
AWS Certified Security Specialty, Cisco Certified Network Associate (CCNA) Security, or similar cloud/network vendor certifications.
At TLA, we build solutions that matter-supporting national security missions through technology innovation, collaboration, and excellence. Our team is passionate about leveraging modern technologies to deliver impactful, mission‑focused outcomes for our customers.
Benefits
Competitive salary and performance bonuses
Medical, dental, and vision coverage
Paid time off and federal holidays
401(k) with company match
Education and certification reimbursement
Training and professional development opportunities
Employee referral bonuses and team events
TLA is proud to be an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
#J-18808-Ljbffr
$84k-115k yearly est. 5d ago
Information System Security Engineer
Method, Inc. 4.6
Information security analyst job in Washington, DC
Spry Methods is seeking an Information Systems Security Engineer (ISSE) to support secure, mission-focused information systems in a high-impact government environment. The ISSE will contribute to the design, implementation, and maintenance of cybersecurity controls across enterprise and mission systems, working closely with engineering, operations, and security teams to ensure systems meet federal cybersecurity and authorization requirements.
What Your Day-To-Day Looks Like (Position Responsibilities):
Support the identification of information protection needs and security requirements for information systems and network environments
Contribute to the design and implementation of security architectures and security controls across system components
Assist with security engineering activities throughout the system lifecycle, including requirements, design, implementation, testing, and operations
Support the implementation of security measures that ensure confidentiality, integrity, availability, authentication, and non-repudiation
Participate in Risk Management Framework (RMF) activities, including security control implementation, assessment support, and continuous monitoring
Develop and maintain security documentation such as System Security Plans (SSPs), security control artifacts, POA&Ms, and ATO packages
Assist in assessing the security impact of system changes, enhancements, and architectural modifications
Support vulnerability management efforts, including reviewing scan results and coordinating remediation actions
Collaborate with system engineers, network engineers, developers, and security stakeholders to support authorization activities
What You Need to Succeed (Minimum Requirements):
TS Clearance with SCI eligibility.
3 - 5 years of demonstrated experience supporting cybersecurity or information assurance activities within enterprise or mission systems
Working knowledge of the NIST Risk Management Framework (RMF), FISMA and ATO processes
Familiarity with common security assessment, vulnerability scanning, and monitoring tools (e.g., Nessus, NMAP, Guardium, WebInspect, or similar)
Understanding of system and network security principles, including access control, boundary protection, and secure system design
Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure.
Analyze logs using Splunk and AWS tools.
Ability to document security controls and communicate technical information clearance
Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk.
Ideally, You Also Have (Preferred Qualifications):
Certifications: CISSP, CISM, CASP+, CECAP, Security+, AWS Certified Security - Specialty, or other relevant certifications.
Experience in a high-side or multi-enclave (U/S/TS) environment.
Experience working with Agile development teams and CI/CD pipelines.
Familiarity with NIST 800-53 Rev. 5
#CJ
#J-18808-Ljbffr
$82k-109k yearly est. 4d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in North Potomac, MD?
The average information security analyst in North Potomac, MD earns between $66,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in North Potomac, MD