Information System Security Engineer
Information security analyst job in Virginia Beach, VA
MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Engineer (ISSE) to join our team in Virginia Beach, VA. This is a hybrid position with 1-2 days onsite and 2-3 days remote.
As an ISSE, you will have the opportunity to work on innovative and mission-critical and national security projects. You will collaborate with a skilled team of professionals, responsible for developing accreditation packages for cloud systems in both AWS and Azure environments. This position offers great opportunities for technical growth and improved experience in Cyber Security.
Responsibilities include but are not limited to:
Performing cyber security research under NAVSEA for cloud and network solutions
Developing, defining, and aiding in implementing cyber security policies and processes
Defining IS and Network Environment security requirements in accordance with applicable cybersecurity requirements
Supporting A&A packages for multiple projects
Applying security expertise to new modernization cyber solutions that provide confidentiality, integrity, availability, authentication, and non-repudiation for security policies and memorandum for records
Developing Plan of Action and Milestones with proper Mitigations or Remediations, accordingly
Developing approaches to mitigate IS and Cloud Network Environment vulnerabilities and recommend changes to network or network system components as needed
Travel up to 25%
Minimum Qualifications:
High School Diploma, and 8+ years of relevant experience
5+ years developing secure solutions for incident response, business continuity, and disaster recovery
3+ years implementing security controls and policies with emerging cybersecurity technologies, including access control, privileged access management, data security, network security, data loss prevention, cloud security, vulnerability management, configuration management, privacy, and audits
Must have an active Security+ certification
Must be familiar with the use and operation of security tools including STIG Viewer, eMASSter, and Tenable Nessus and/or Security Center
Experience with cloud brokerages, preferably Navy
Knowledge and experience working with federal compliance and guidance, including FISMA, RMF, Federal Enterprise Architecture Framework, DoDAF, NIST Cybersecurity Framework, NIST 800 series, FedRAMP and cloud-based security controls
Preferred Qualifications:
Bachelor's Degree
One of the following certifications: Certified Information Systems Security Professional (CISSP), CompTIA Advanced Security Practitioner (CASP) CE, Certified Secure Software Lifecycle Professional (CSSLP), CISSP- Information System Security Engineering Professional (ISSEP), or CISSP- Information System Security Architecture Professional (ISSAP) or an equivalent security certification
Clearance Requirements:
Must have an active Secret security clearance.
Physical Requirements:
The person in this position must be able to remain in a stationary position 50% of the time.
Must be able to move around the office and operate office equipment.
Frequently communicate with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Information Technology Security Manager
Information security analyst job in Chesapeake, VA
In cybersecurity, we help keep our diverse environment from design, merchandizing, supply chain, eCommerce, and enterprise secure in a dynamic space. The IT Security team is looking for a passionate cybersecurity leader who wants to make an impact in multiple environments. Family Dollar is looking for a detailed and results oriented Security Engineering Manager leader who will be responsible for overseeing and managing the security of its information systems and data. This person will lead a team of cybersecurity professionals and work closely with other departments to protect the organization's digital assets, data and systems from cyber threats and breaches. This role is critical to the strategic and tactical success of Family Dollar's cybersecurity program. As the leader of this team, you will be responsible for providing strategic and operational direction of our security engineering solutions and cybersecurity tool stack.
Under the direction of Director, Cybersecurity, the Security Engineering Manager takes a lead role in ensuring the security of all protected information collected, used, maintained, or released by Family Dollar. This role plays a vital role in ensuring the confidentiality, integrity and availability of our data. It is a critical role in the face of an ever-evolving landscape of cyber threats and attacks.
Principal Duties and Responsibilities
Partnering with teams across the organization to influence security by design to help drive overall direction of our technical security solutions.
Accountable for end-to-end life cycle of our security tool portfolio (e.g., Firewalls, IDS/IPS, WAF, IAM, DLP, SIEM, Proxy, DDoS, Antimalware, Cloud network infrastructure technologies)
Ensuring the hardening of our infrastructure (e.g., authentication, MFA, perimeter edge.)
Driving standards and expectations of secure practices across the organization such as data security, defense-in-depth, SASE, Zero Trust etc.
Collaborating with senior leadership to assess and understand strategic initiatives to ensure IT Security support.
Act as a subject matter expert to provide advisory guidance to other teams.
Interface and influence leaders at varying levels and roles within the company to drive security ownership.
Keeping up to date with the security landscape to ensure our teams are providing strong defenses.
Strong decision-making, problem-solving abilities, and leadership abilities to manage multiple, often conflicting priorities to successful completion.
Demonstrate commitment to high standards of ethics and values, regulatory compliance, and business integrity.
Excellent management skills to drive the personal development of the team and individuals.
Maintain all security tools and technology.
In charge of security systems, such as firewalls, data protection controls, patching.
Ensures that project/department milestones/goals are met and adhering to approved budgets.
Has full authority for personnel actions.
Evaluates risks and improves Family Dollar's security positioning through process improvement, policy, automation, and the continuous evolution of capabilities.
Implements processes to automate and continuously monitor information security controls, exceptions, risks, testing.
Develops reporting metrics, dashboards, and evidence artifacts.
Schedules regular testing of effectiveness and efficiency of controls within area of ownership.
Remains current on best practices and technological advancements and acts as the technical resource for information security.
Minimum Requirements/Qualifications
5+ years of experience in cybersecurity.
2+ years as a security leader of a team (e.g., Incident Response, Engineering team).
5+ years' experience leveraging and implementing cybersecurity frameworks such as, MITRE ATTACK, MITRE D3FEND, OWASP Top 10, CIS Controls, NIST CSF, NIST 800-53, etc.
10+ years of advanced IT skills with high level of information security experience and expertise.
Knowledge of securing network technologies, client, and server operating systems.
Ability to develop and maintain security baselines based on best practices and industry standards.
Experience responding to, analyzing, problem solving, and communicating information security incidents.
6+ years of planning and managing security projects.
Excellent interpersonal, communication, and presentation skills, including formal report writing experience.
Understanding of common security standards and regulations relating to a retail environment (e.g., PCI DSS, NIST CSF, ISO2700x, etc.)
Team leadership and management. Foster a culture of security awareness and compliance within the organization.
Ability to work in agile and waterfall frameworks as needed
1-3 years as a technical leader / supervisor with strong analytical and problem-solving skills identifying risks and championing that change.
5+ years of experience interfacing with varying levels of leadership and roles within a company, influencing security change.
Minimum of 5 years' experience with modern security tool stacks
Network security tools (e.g., WAF, Proxies, IDS/IPS, VPN, Taps, Firewalls)
Endpoint security tools (e.g., AV, EDR, Application Control, PKI)
Security Operations tools (e.g., SIEM)
Authentication and authorization tools (e.g., PAM, SSO, SAML, IAM, MFA)
Data Security tools (e.g., eDiscovery, DSPM)
Cloud (e.g., CSPM) and other implications of cybersecurity
Strong knowledge of cybersecurity concepts
Secure protection and detection techniques
Application security
Vulnerability management
Exploitation techniques
Incident response
Data privacy and encryption
Endpoint platforms (Windows, Linux & Mac, iOS/Android)
Desired Qualifications
Bachelors in Information Technology or other four-year related degree
Security Engineer
Information security analyst job in Cary, NC
We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment
Responsibilities:
· Maintain and manage all processes systems supporting Millennia's security posture.
· Monitor, manage, and implement security infrastructure to support organizational needs
· Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents.
· Monitor network performance and troubleshoot issues and Security Incidents.
· Plan, manage, and execute system upgrades and weekly patches to all endpoints.
· Develop and enforce security policies to protect sensitive patient data.
· Conduct regular system audits and vulnerability assessments.
· Provide technical support for network-related issues to staff and clients.
· Maintain documentation of network configurations and procedures.
· Stay updated on industry trends and emerging technologies
· Collaborate with IT teams to integrate new technologies into existing systems.
· Provide hand-on support to our offices and data center.
Qualifications:
· Strong knowledge of network and security administration, controls, protocols, and best practices.
· Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule.
· Proven experience as a Network Administrator or similar role.
· Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates.
· Familiarity with cybersecurity principles and incident response strategies.
· Excellent problem-solving skills and attention to detail.
· Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment.
· Experience with cloud computing platforms (AWS, Azure) is a plus.
Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
Cyber Security Threat Analyst
Information security analyst job in Newport News, VA
Who We Are:
Headquartered in Washington, DC, Versar Global Solutions provides full mission lifecycle solutions for challenges faced by our government and commercial Customers in the natural, built, and digital environments. With nearly 2,000 team members around the world, and a rich legacy spanning more than 70 years, Versar Global Solutions delivers a broad array of planning, analysis and risk management solutions, project and program management, operations and maintenance services, and information technology applications for environmental management and remediation projects, mission critical facilities and installations, and in support of readiness and contingency operations.
Who You Are:
Are you a talented and innovative cyber security specialist that wants to make a difference in the world? Join us as a Cyber Security Threat Analyst and lead the charge in developing, implementing, and supporting cutting-edge geospatial technologies. In this pivotal role, you will collaborate with our dynamic Geospatial & Digital Solutions (GDS) Market Sector team to support diverse IR&D and customer-focused projects within a multi-disciplinary organization to achieve specific goals and objectives. The ideal candidate will focus on leveraging AI solutions and digital tools to improve efficiency, scalability, and the overall digital experience for both internal teams and external customers.
Reporting directly to our Director of our Digital HUB Team, we want to leverage your expertise in securing customer-facing products. The ideal candidate will focus on threat modeling, security assessments, protocol validation, and ensuring compliance with government certifications and policies for government and private systems and protocols.
What You'll Do:
Perform comprehensive threat modeling and risk assessments for customer products and internal systems.
Assess API security, OAuth/SAML, tenant isolation, or cloud-native security
Validate security protocols to ensure compliance with industry standards and best practices.
Conduct walkthroughs and audits of security policies and procedures.
Collaborate with cross-functional teams to implement mitigation strategies addressing identified risks.
Support and lead efforts for government and industry security certifications.
Monitor emerging cyber threats and vulnerabilities, analyzing their potential impact on organizational assets.
Develop detailed reports documenting findings, risk assessments, and remediation plans.
Assist in designing and maintaining incident response plans and security controls.
What You'll Bring:
Certifications such as CISSP, CISM, CEH, or equivalent.
Minimum 3 years of experience in threat modeling, vulnerability assessments, and protocol validation for large systems.
Strong knowledge of cybersecurity frameworks and government certification requirements.
Experience with API security, OAuth/SAML, tenant isolation, and cloud-native security concepts.
Experience reviewing and improving security policies, procedures, and compliance documentation for geospatial systems.
Familiarity with security protocols, network security, and cryptographic principles.
Excellent analytical and problem-solving skills.
Ability to communicate complex security concepts clearly to technical and non-technical stakeholders.
Familiarity working within government or regulated environments.
Experience supporting audits and managing compliance documentation.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Must be proficient in English, both written and verbal, to ensure effective communication and collaboration.
Must be able to obtain and maintain a Secret Security Clearance.
Successful results of preemployment screenings, including federal background check, MVR, and drug screen.
Comply with company drug and alcohol policy.
Be authorized to work in the US or will be authorized by the successful candidate's start date.
Preferred Skills & Certifications:
Strong Project Management Skills: Ability to plan, organize, and manage multiple projects simultaneously, ensuring they are completed on time and within budget.
Digital and Technology Expertise: Understanding of various digital technologies, platforms, and tools relevant to the program's objectives.
Communication and Interpersonal Skills: Ability to communicate effectively with diverse stakeholders, build relationships, and influence decision-making.
Problem-Solving and Analytical Skills: Ability to identify and solve complex problems, analyze data, and make data-driven decisions.
Leadership and Team Management Skills: Ability to lead and motivate teams, build consensus, and drive collaboration.
Customer Knowledge: Familiarity with Federal Market and technical approaches related to next-generation cloud, network, and cybersecurity technologies.
Location Requirements
The position will primarily work onsite at the Newport News, VA office location.
EEO Commitment
Versar Global Solutions is committed to providing equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws.
Versar Global Solutions complies with applicable state and local laws governing non-discrimination in employment in every location in which the company operates. This policy applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Versar Global Solutions expressly prohibits any form of unlawful employee harassment based on race, color, religion, sex, national origin, age, disability, genetic information, sexual orientation, gender identity, marital status, amnesty, or status as a covered veteran. Improper interference with the ability of Versar Global Solutions employees to perform their job duties is not tolerated.
#LI-WJ1
Auto-ApplyInformation Security Analyst
Information security analyst job in McLean, VA
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
The position is within the Information Security Identity and Access Management (IAM) team.
This position will be responsible for user provisioning of application & infrastructure access as well as application account management; working knowledge of platform provisioning (groups/roles/accounts/permissions), this includes understanding of platform or application meta-data, or fine grained entitlement details.
They need to identify risks and work out possible solutions with the customer and inform management as necessary, while handling tasks assigned to them with little or no supervision.
They are expected to identify task inefficiencies and provide ideas for solutions, including the ability to assist with the automation of manual and semi-manual processes via development and scripting.
Qualifications
Strong understanding of Identity and Access Management (IAM) concepts
• Provisioning access to applications and infrastructure platforms within our SLA.
• Handling of miscellaneous support requests.
• 24/7 on call support on rotational basis.
• Handle deployment related activities which is often after hours and/or weekends.
• Incorporating process changes and updates into the Standard Operation Procedures.
• Troubleshoot application/platform access issues and escalate to Tier 3 Support as necessary.
• Training other staff on provisioning and daily tasks.
• The gathering of requirements and testing for new application integration into Identity Management Solution.
• 3 - 5 years of experience with business application or infrastructure support on the following platforms: Windows, UNIX (Solaris, Linux, AIX), Web Technologies (WebLogic, Web Methods, Apache, Tomcat, MQ, IIS, etc).
• 3 - 5 years of collective experience with databases (Sybase, DB2, SQL Server, Oracle) and security (firewall, AD, TAM, LDAP, certificate).
• Experience providing direct support to IT business application and related infrastructure teams in a complex multi-platform operating environment
• 3 - 5 years of strong Java, J2EE development experience, including Java frameworks such as Spring MVC, JSF, Struts, etc.
Basic Requirements:
• Bachelor's degree in Engineering, Computer Science, Information Technology, related field or equivalent work experience.
• Experience working in a fast paced team environment and managing priorities with minimal supervision
• Strong organizational skills and the ability to multitask; can set priorities and follow a timeline
• Excellent written and oral communications
• Proficiency with Microsoft Excel skills, with strong excel analytical experience.
• Strong familiarity / experience with MS Office tools, Visio and SharePoint
• Strong interpersonal and communication skills, up to and including executive
• Experience using analytical and problem solving skills
• Experience negotiating effectively and facilitating conflict resolution
Preferred Skills:
• 3 - 5 years of application development or support coupled with infrastructure experience.
• 3 - 5 years of prior working experience in automating manual and semi-automatic processes via scripting languages such as PowerShell, Perl or Python.
• Strong IT systems troubleshooting analysis abilities
• Experience with SailPoint IdentityIQ Suite
• Experience with CyberArk Application Identity Manager or other Password Management utility.
• CISSP certification a plus
• J2EE certification a plus
Additional Information
If you are interested, Please contact
Siva Kumar
************
Information Security Analyst II
Information security analyst job in Blacksburg, VA
Job Summary:Responsible for reducing the impact of information security incidents and system compromises. They do so by assisting with security monitoring, incident / event investigation and analysis, roleplay through tabletop events and "purple team" exercises, contributing to documentation and playbooks to ensure repeatable security-focused processes, participating with security and data privacy assessment as well as providing recommendation for endpoints, servers, and network infrastructure. They are responsible for the understanding and identification of indicators of compromise (IoC) as well as helping understand evidence of attack in alerts or monitoring, by hunting through data, systems and from review of investigation notes. Position has a moral and legal responsibility to uphold all local, state, and federal regulations especially in regards to security and data privacy.
Job Responsibilities:• Perform security incident investigations and reporting according to the Incident Response Plan (IRP).• Perform industry best practice security and data privacy assessments for all third party vendors, contractors, consultants, auditors, applications (both on premise and cloud) as well as system-to-system connections on our internal and customer-facing networks.• Contribute to network and application penetration tests, vulnerability assessment scans, and patch management / vulnerability remediation strategy planning.• Monitor and advise on information security and data privacy issues related to the systems and their related data flows while ensuring internal security controls are appropriate and operating as intended.• Conduct security and data privacy research in keeping abreast of latest information security as well as data privacy events, issues, and trends.• Assist and support user and security posture awareness for IT teams as well as key information security partners for our customer facing servers, networks, and applications.• Participate in any breach analysis activities to help discover root cause.• Participate in disaster and business continuity recovery planning as well as plan execution should an event occur.• Analyze and provide security model planning input for cloud (SaaS) access and monitoring. Including protection recommendations associated with IT architecture for cloud and hybridized computing.• Provide support for compliance activities for SOX, PCI, CPNI, and data privacy regulations around PII, PHI, and financial data.• Actively participate in red team / blue team engagements led by more senior team members or by select management approved security partners.• Participate in threat modeling activities with more senior team members or with select management approved security partners.
Qualification Requirements:• Education: Bachelor's degree in Computer Science, Network Administration, Cybersecurity, or a related field required; Master's degree preferred; relevant certifications and professional experience may be considered in lieu of formal education.• Experience Level: 5-7 years of Software Development, Network Administration, or Cyber Security experience is required.• Experience in securing applications (front end / back end, SaaS), servers, or networks is required. • Experience in the event log monitoring of computer systems is required.• Experience with industry standard security frameworks (e.g., NIST, CIS, OWASP, Mitre Att&ck) as well as experience with PII, PHI, CPNI, and PCI data handling requirements is required.• Experience in information security or data privacy investigative work is required.• 2-3 years of Splunk or SIEM experience is preferred.• Experience with SOX compliance is preferred.• Experience with mobile device management (MDM) is preferred.
Job Skills & Knowledge:• Ability to review reports and system activity logs to identify critical events, categorize according to priority, and escalate as appropriate.• Capability to gather information, analyze and evaluate evidence, draw conclusions, and share that knowledge gained in an appropriate manner.• Ability to absorb intelligence information about threats and threat actors to help mitigate harmful events for the organization.• Ability to develop and analyze processes.• Understanding of security measures and testing at an application level that aim to prevent data or code from being stolen, manipulated, or hijacked.• Ability to identify detailed information risk and to apply governance compliance concepts and principles.• Must have excellent verbal and written skills.• Must be able to work effectively in a team environment.• Excellent capability to develop and document security architecture, assessment, and plans. Including strategic, tactical, and project plans.• Ability to develop security policies, procedures, standards, and guidelines.• Capability to work with a set of guidelines to help identify critical event data for additional analysis and escalation as appropriate.
Knowledge of:• WSUS Management and Deployment, SCCM Package Building and Maintenance, Windows, Endpoint Protection and Compliance systems, Active Directory, Office 365, SIEM solutions.• Penetration/vulnerability test suites and compliance regulations (SOX, PCI, etc.)• Applicable knowledge of Information Technology, security and data privacy fundamentals, and networking.
Certifications:• CompTIA Network+ and Security+ certifications required, or equivalent certifications demonstrating foundational knowledge in networking and security. Candidates with substantial hands-on experience may be considered in lieu of formal certification.• Computer Hacking Forensic Investigator (CHFI) or Certified Ethical Hacker (CEH) Certifications preferred.
Data Exploiter (TS/SCI with Poly Required)
Information security analyst job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION
A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination.
KEY RESPONSIBILITIES
* Provide data exploitation and targeting support to the customer.
* Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
* Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
* Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
* Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
* Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
* Analyze intrusion artifacts to identify mitigation approaches for potential network defense
* Provide recommendations for continuous improvement.
* Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
* Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
* Equivalent combination of education, technical certifications, training, and work/military
experience.
REQUIRED QUALIFICATIONS
* Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
* Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
* Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
* Demonstrated experience in utilizing technical targeting tools
* Experience reviewing and assessing network traffic and knowledge of the OSI Layers
* Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
* Knowledge of incident response, containment, and mitigation
* Knowledge of common cyber-attack methods
* Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
* Demonstrated experience performing vulnerability identification, risk analysis, and remediation
* Ability to triage, review, identify, and correlate items of interest from numerous all source
* datasets
* Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
* Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
* Identify and document information that can fill critical gaps
* Create new methodologies / algorithms for data analysis and correlation
* Create entity / object profiles and derived data sets that enable future opportunities and
* analytical efforts
* Prepare a range of tailored products that embody and explain findings
* Experience with technical collection abilities
* Must be eligible to obtain the required Security Clearance.
DESIRED QUALIFICATIONS
* Python Scripting
* Strong understanding of VPNs, VLANs, and TCP/IP
* Understanding of Linux operating systems
* Ability to working independently with minimal supervision
* Experience conducting network traffic analysis
* Understanding of forensic tools and applications
Salary Range $160,000-$200,000
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Information Systems Security Analyst
Information security analyst job in Dahlgren, VA
Job DescriptionDescription:
Client Solution Architects (CSA) is currently seeking an Information Systems Security Analyst to support a program at Dahlgren, VA.
This role is contingent on award.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-indepth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI))
Information security program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements
Requirements:
What you'll need to have to join our award-winning team:
Clearance: Must possess and maintain an active Secret Clearance
Four (4) years of experience in Cybersecurity.
Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES))
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (e.g., Access Control Lists(ACLs))
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model
System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Network Security Analyst
Information security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
SOC Cyber Analyst (Journeyman or Junior, Norfolk, VA)
Information security analyst job in Norfolk, VA
Akira Technologies is seeking a Cyber Analyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Norfolk, VA. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $75,000 to $100,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Auto-ApplyInformation Assurance Analyst
Information security analyst job in Suffolk, VA
Falconwood is a woman-owned, veteran-owned company providing consultation and programmatic support to Department of Defense Information Technology (IT) initiatives and programs. We provide expert advice and consultation on a diverse range of IT subjects, focusing on acquisition, policy, cybersecurity, engineering, and process development.
The Information Assurance Analyst will be responsible for performing duties associated with development and review of RMF packages in support of the Commander, Naval Information Forces (NAVIFOR) N6 Directorate.
Responsibilities
The candidate will support Assessment and Authorization efforts for NAVIFOR N6 directorate and subordinate commands through:
Support program's authorization efforts throughout the Navy RMF process.
Track to ensure quality and timeliness of RMF package artifacts and deliverables.
Analyze general information assurance-related technical problems and provides recommendations and technical support in solving these problems.
Assess and supports implementation of solutions that meet network security requirements.
Review vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
Perform duties associated with development and review of RMF packages.
Support continuous improvement of strategies, processes, and procedures aligned with existing DoN Navy processes.
Ensure the necessary planning, outreach, execution, and dissemination of lessons learned/after action reports.
Qualifications
Clearance: TS/SCI clearance required (a current SSBI within the five-year scope).
Education: Bachelor of Science degree in Information Systems, Computer Science, Cybersecurity, Information Systems, Computer Engineering or related discipline.
Certifications: Information Assurance Certification (GIAC) - Security Leadership Certification (GSLC), Certified Information system Security Professional (CISSP), or Certified Information Security Manager (CISM).
Experience: At least one-year relevant experience performing Navy IA or cybersecurity functions.
Preferred:
Experience in an IT operational capacity (e.g., operations/project support, helpdesk).
Strong analytical, problem-solving, and project management skills.
Familiarity with U.S. Navy culture, processes, command organizations, and IT infrastructures.
Ability to analyze general information assurance-related technical problems and provides recommendations and technical support in solving these problems.
Be able to assess and support implementation of solutions that meet network security requirements.
Experience with vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
Advanced technical writing skills for developing documentation, reports, and training materials.
The candidate must be:
Familiar with the Navy RMF process.
Capable of performing effectively individually and as part of a team.
Technically savvy and possess excellent communication skills.
Have effective critical thinking and problem-solving skills.
Self-motivated and able to successfully deliver with minimal supervision.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
This position is fast paced and high demand that is a hybrid position (onsite and remote) in Suffolk, VA.
Limited to no travel is anticipated.
Pay Range
Base pay is $85,000-$95,00, subject to skill level, qualifications, and location.
Benefits Highlights: 401k, Tuition Reimbursement, Health/Dental/Vision Insurance, PTO, Federal Holidays, Performance Increases, Reserve Duty Compensation and more!
Auto-ApplyNetwork Sniffer Analysis
Information security analyst job in McLean, VA
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track )
Information security analyst job in Suffolk, VA
Posting Details Posting Details Job Title OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track ) Department RESILIENCE CLUSTER HIRE Number TBA Job Description The Office of Enterprise Research and Innovation (OERI) at Old Dominion University invites applicants for an annual 10-month position at Non-Tenure Track Assistant/Associate/Full Research Professor rank as part of a multi-position hiring cluster aiming for the Critical Infrastructure and Data Transformation to Advance National Security to begin in Fall 2026. This is an annual 12-month appointment that will begin July 25, 2026. The cluster, with faculty hires in School of Data Science, Batten College of Engineering and Technology and Office of Enterprise Research and Innovation, integrates interdisciplinary research in resilient infrastructure, infrastructure data transformation, and secure smart systems to address national security challenges in coastal regions. It explicitly addresses the Old Dominion University's Strategic Plan in research areas including Coastal Resilience and National Security. The research in this cluster will be supported by five interrelated, cross-cutting research domains, including Artificial Intelligence & Machine Learning, Computational & Data Science, Cybersecurity & Network Security, and Modeling & Simulation.
The primary responsibilities for this position are as follows:
Develop an interdisciplinary and externally funded research program in Critical Infrastructure and Data Transformation (CID) to Advance National Security.
Collaborate with faculty hired in this cluster and other faculty at Old Dominion University.
Opportunities for teaching graduate courses in the candidate's area of expertise will also be available with other departments in the BCET college or School of Data Science.
Position Type
FullTime
Type of Recruitment
General Public
Type of Recruitment
General Public
Minimum required education and/or special licenses, registrations, trainings, or certifications
A Ph.D. or equivalent terminal degree in engineering, computer science, or closely related field, complementary to the cluster's core areas of research, by May 2026.
Candidates for research assistant professor should have a record of conducting research in modeling and simulation as evidenced by peer reviewed publications.
Candidate for associate or full professor must have a demonstrated sustained track record of external federal funding and peer reviewed research publications.
Minimum required level and type of experience, knowledge, skills, and abilities
Candidate for associate research research professor must have a demonstrated sustained track record of external federal funding and peer reviewed research publications.
A plan for developing an externally funded research program at ODU with expressed interest in leveraging complementary research expertise at ODU.
Preferred Qualifications
Non-Tenure Track (Research Assistant/Associate Professor) Office of Enterprise Research and Innovation (OERI): is seeking for faculty with the expertise aligned with the Center for Secure and Intelligent Critical Systems Digital Twin for distributed energy resources, Modeling and Simulation for efficient data center infrastructure. Cyber Resilient data center.
Skill in working both independently and as part of an interdisciplinary team.
Ability to transfer existing projects and plans for acquiring and sustaining sponsored research.
Previous development and/or leadership experience with interdisciplinary, administrative, and/or academic initiatives.
Successful record of grant funding.
Conditions of Employment
Location
Suffolk, VA
Job Open Date
09/15/2025
Application Review Date
11/15/2025
Open Until Filled
Yes
Application Instructions
Interested candidates must complete the online application at************************************ including the following:
A cover letter describing your relevant qualifications and indicating the rank you would like to be considered for.
A curriculum vitae.
A statement of research interests.
Unofficial graduate transcripts.
Contact information for 3 professional references. At the appropriate time in the Search process, these individuals will be contacted by the Search Committee.
Applications should be submitted by November 15, 2025 for full consideration. The positions will remain open until filled. Questions about these positions should be directed to Dr. Murat Kuzlu (**************), Chair of the Critical Infrastructure and Data Transformation (CID) to Advance National Security Cluster Hire.
Telework Friendly
No
Reasonable Accommodation Request
If you are an individual with a disability and require reasonable accommodation, please contact the Division of Talent Management and Culture at *************.
Pay Transparency Nondiscrimination Provision
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or consistent with contractor's legal duty to furnish information.
About the College
The Office of Enterprise Research and Innovation (OERI), within the Division of Research and Economic Development at Old Dominion University, unifies and focuses the advanced research of six distinct and diverse multidisciplinary applied research centers. From cybersecurity to maritime to modeling and simulation, OERI supports ODU's research infrastructure through innovation, workforce development, and industry engagement. OERI has evolved from the Virginia Modeling, Analysis, and Simulation Center (VMASC), which was established in 1997, and has been a secure and applied research and enterprise research facility of ODU. The continued success and growing recognition of VMASC as a global leader in the modeling and simulation sector has underscored the value of unifying research and commercial products. ***************************************************************
About the Department
Easy ApplyNetwork Security Analyst
Information security analyst job in Tysons Corner, VA
Network Security AnalystLOCATIONTysons, VA 22182CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyNetwork Analyst - Active Security Clearance
Information security analyst job in Reston, VA
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Networking Security Analyst
Information security analyst job in Fort Belvoir, VA
The company is looking for an amazingly talented Networking Security Analyst to join our team! In this role you will get to support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
What You'll Be Doing:
Risk Mitigation of sensitive networks and systems
Configure, scan, monitor, report
PCAP collection
What Required Skills You'll Bring:
1+ years' experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices
Experience with configuring, scanning, monitoring, alerting and reporting security tools.
Active TS/SCI Clearance
Must be willing to travel 15%- OCONUS and CONUS locations
What Desired Skills You'll Bring:
Experience with PCAP collection.
Experience as a SOC analyst.
Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
Minimum Clearance Required to Start:
Top Secret SCI
This position is part of our Federal Solutions team.
Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
The company is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the quest-APPLY TODAY!
Information Security Analyst (Filling more than one position)
Information security analyst job in Newport News, VA
Working Title Information Security Analyst (Filling more than one position) Role Title Information Technology Specialist II Position Number 00719 FLSA Exempt Appointment Type Full Time Type of Posting General Public Is Sensitive Position? No If Sensitive Position, please paste statement Designated Personnel Yes Responsible Employee
This position is designated as a "responsible employee" who has the authority to redress sexual violence, who has the duty to report incidents of sexual violence or other student misconduct, or who a student could reasonably believe has this authority or duty.
If Designated Personnel, please paste statement Statement of Economic Interest No If Statement of Economic Interest, please paste statement Is this a restricted position subject to availability of funding? If Restricted Position, please paste statement Departmental Objective
To inspire and foster partnerships that focus on innovative solutions for ubiquitous access and use of information services to support educational and cultural opportunities that benefit the CNU community.
Purpose of the Position
The Information Security Analyst is responsible for implementing the campus' information security program to include reviewing security plans, and role-based training requirements, operating security tools, scanners, tools and responding to security alerts.
Knowledge, Skills, and Abilities Related to Position
* Knowledge of general concepts of information security best practices; IT Governance, Risk Management, and Compliance (GRC) for example NIST CSF, NIST SP 800-39 and NIST SP 800-30
* Knowledge of NIST SP 800-53 rev 5 security controls and the Risk Management Framework (e.g. NIST SP 800-37)
* Knowledge of vulnerability scanning and threat mitigation tools such as Microsoft Defender, Tenable Security Center / Nessus, Burp Suite and Trivy
* Knowledge of centralized log management tools such as Splunk, Graylog, Microsoft Sentinel, AWS CloudTrail
* Knowledge of common vulnerability management frameworks such as CIS or STIGs
* Knowledge of security concepts such as Least Privilege; and Separation of Duties
* Ability to think critically, analyze risk, consider possible solutions, and make recommendations
* Ability to communicate effectively both verbally and in writing with diverse groups of organizations and people
* Ability to develop relationships with and provide guidance to all levels of management regarding employee system access
* Willingness to be very flexible, ability to maintain the highest professional standards, and competence to be accurate, thorough, and productive with all work
* Foundational knowledge of computer networking (IPv4 and IPv6), ports and protocols, traffic flow
* Understanding of system administration for both on-premises and cloud systems
* Understanding of defense-in-depth, and common security elements
* Familiarity with Infrastructure as Code (e.g., Terraform, Ansible, Puppet, Chef) and automated pipelines (e.g., GitLab)
* Understanding of the IT Incident Response processes
* Knowledge of regulations such as FERPA, GLBA, PCI
* Knowledge of Palo Alto firewalls and IDS/IPS concepts
* Demonstrated understanding of technical, engineering, and programmatic capabilities related to information systems and/or subsystems
* Familiarity with programming and query languages, such as Python, SQL, KQL
Education, Experience, Licensure, Certification Required
Education:
* High school graduate or equivalent education/experience that equates to a high school diploma.
Experience:
* Experience creating notional and technical diagrams
* Experience in an information security environment
* Experience developing and customizing security-related scripts
Additional Consideration(s)
Education:
* BA or BS in Information Security, Information Assurance, Computer Science, or related equivalent professional experience
* Possession of a current information security certificate / credential, such as a CISSP, CISM, or similar.
Experience:
* Professional experience with information security to include managing systems security architecture, design, installation, operational planning, and risk remediation activities on an enterprise level
* Experience in information security performing IT/technical audits, security vulnerability assessments, system configuration verifications, and security-related assignments
* Experience working with centralized logging solutions and vulnerability scanning tools
* Experience with vulnerability scanning solutions, including Tenable Security Center
* Experience working in a higher education environment
* Experience in installing security software and documenting security issues
Salary Information Starting at $68,534, Commensurate with Education and Experience CNU Information
This position includes Commonwealth of Virginia and Christopher Newport University employee benefits. CNU offers a comprehensive benefits package to include retirement plans, medical, dental, vision, and a variety of other options. Available leave includes vacation, sick time, personal time, and volunteer/service leave. State employees are eligible for discounted travel, banking, legal and retail services, among others. To view more information about our benefits, please visit *****************************
Role Code 39112 Conditions of Employment
* This is a classified position. New and returning classified employees are required to complete a 12-month probationary period
* Selected candidate must attend a 2-day New Employee Orientation Program
Is this position telework eligible? Yes Telework Eligibility Disclaimer
This position is eligible for periodic telework as determined by the department. Eligibility is not guaranteed, and is subject to supervisor approval. Eligibility will depend on the likelihood of the employee's success in a telework arrangement and the supervisor's ability to manage telework. Departments and/or Human Resources may modify or revoke eligibility at any time. Employees will be required to sign a Telework Agreement.
Physical/Cognitive Requirements
Light Lifting (less than 20 lbs.) Essential Moderate Lifting (20-50 lbs.) Essential Heavy Lifting (more than 50 lbs.) Marginal Pushing/Pulling Essential Standing Essential Sitting Essential Bending Non-Applicable Walking Marginal Climbing Non-Applicable Reaching Non-Applicable Repetitive Motion Non-Applicable List other physical requirements
Emotional Demands
Fast Pace Essential Average Pace Essential Multiple Priorities Essential Intense Customer Interaction Essential Multiple Stimuli Essential Frequency Changes Essential
Mental/Sensory Demands
Memory Essential Reasoning Essential Hearing Essential Reading Essential Analyzing Essential Logic Essential Verbal Communication Essential Written Communication Essential List other mental/sensory requirements
Posting Detail Information
Posting Number PS1180P Number of Vacancies 2 Posting Date 12/11/2025 Closing Date 12/26/2025 Open Until Filled No Special Instructions to Applicants
CNU will only accept online applications through the jobs.cnu.edu website. Online applications must be received by midnight on the closing date indicated in a job announcement. Faxed, emailed, hand-delivered or mailed applications and attachments will NOT be accepted. Applicants are welcome to complete an online application by using computers located in the Office of Human Resources. Address: CNU North - 321 Hiden Boulevard, Suite 101, Newport News, VA 23606. Public computers are also available in nearby libraries and at the Virginia Employment Commission. Address: 600 Butler Farm Road, Hampton, VA 23666 (M-F 9am-4:30pm).
In order to be considered for this position, your application must provide evidence of experience and/or education supporting the requirements outlined in the posting. We encourage you to be clear and specific when describing your experience. *Responses to supplemental questions alone are not considered evidence of experience and/or education.
Quick Link for Direct Access to Posting *********************************** Advertising Text EEO/Diversity Statement(s)
Christopher Newport University, an EO Employer, is fully Committed to Access and Opportunity.
Notice of Non-Discrimination & Title IX Policy Statement
Reasonable Accommodation Request
Christopher Newport University (CNU) will make a reasonable effort to accommodate persons with disabilities in the application and/or interview process. Persons with disabilities who require accommodation should contact the CNU Human Resources Office by calling **************.
Alternative Hiring Process
In support of the Commonwealth's commitment to inclusion, we are encouraging individuals with disabilities to apply through the Commonwealth Alternative Hiring Process. To be considered for this opportunity, applicants will need to provide their Certificate of Disability (COD) provided by a Certified Rehabilitation Counselor within the Department for Aging & Rehabilitative Services
(DARS). Veterans are encouraged to answer Veteran status questions and submit their disability documentation, if applicable, to DARS to get their Certificate of Disability. If you need to get a Certificate of Disability, use this link: ********************************************** or call DARS at ************.
Background Check
Applicant finalists are required to complete a CNU sponsored background check. After accepting employment, individuals are required to complete a USCIS Form I-9 (employment eligibility verification) and present documentation from the USCIS List of Acceptable Documents that establishes both their identity and employment authorization to work in the United States. The provided documents will be verified through the Department of Homeland Security E-Verify website.
Data Exploiter (TS/SCI with Poly Required)
Information security analyst job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. KEY RESPONSIBILITIES
Provide data exploitation and targeting support to the customer.
Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
Analyze intrusion artifacts to identify mitigation approaches for potential network defense
Provide recommendations for continuous improvement.
Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
Equivalent combination of education, technical certifications, training, and work/military
experience. REQUIRED QUALIFICATIONS
Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
Demonstrated experience in utilizing technical targeting tools
Experience reviewing and assessing network traffic and knowledge of the OSI Layers
Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
Knowledge of incident response, containment, and mitigation
Knowledge of common cyber-attack methods
Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
Demonstrated experience performing vulnerability identification, risk analysis, and remediation
Ability to triage, review, identify, and correlate items of interest from numerous all source
datasets
Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
Identify and document information that can fill critical gaps
Create new methodologies / algorithms for data analysis and correlation
Create entity / object profiles and derived data sets that enable future opportunities and
analytical efforts
Prepare a range of tailored products that embody and explain findings
Experience with technical collection abilities
Must be eligible to obtain the required Security Clearance.
DESIRED QUALIFICATIONS
Python Scripting
Strong understanding of VPNs, VLANs, and TCP/IP
Understanding of Linux operating systems
Ability to working independently with minimal supervision
Experience conducting network traffic analysis
Understanding of forensic tools and applications
Salary Range $160,000-$200,000
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Network Security Analyst
Information security analyst job in Durham, NC
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Network Analyst - Active Security Clearance
Information security analyst job in Reston, VA
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Job Posted by ApplicantPro