Post job

Information security analyst jobs in Towson, MD - 1,061 jobs

All
Information Security Analyst
Senior Information Security Consultant
Intrusion Detection Analyst
Data Security Analyst
Network Security Analyst
Information Assurance Analyst
Information Systems Security Officer
Information Security Officer
Cyber Security Analyst
Information Security Manager
  • Junior Information System Security Officer

    Mantech 4.5company rating

    Information security analyst job in Washington, DC

    MANTECH seeks a motivated, career and customer-oriented Junior Information System Security Officer (ISSO) to join our team in Washington, D.C. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS. Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Provide liaison support between the system owner and other IS security personnel. Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM). Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Minimum Qualifications: At least 3 years' experience performing duties of an Information Systems Security Officer (ISSO) at a cleared facility At least 5 years of work experience in a computer science or cybersecurity related field Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or Information Assurance Management (IAM) Level II proficiency Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
    $60k-81k yearly est. 23h ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Chief Information Security Officer

    The Planet Group 4.1company rating

    Information security analyst job in Washington, DC

    Chief Information Security Officer (CISO) The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system. Position Details Salary: $250-2750k Type: Full-time, direct hire Location: Washington DC, onsite 3 days a week Strategic Direction & Executive Leadership Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission. Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams. Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices. Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management. Risk Oversight & Regulatory Alignment Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks. Maintain adherence to all regulatory requirements applicable to both sectors: Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules. University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing. Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment. Operational Security Management Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection). Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities. Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects. Communication, Influence & Education Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams. Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals. Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture. Required Qualifications Education: Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred). Professional Background: At least 10 years of progressive cybersecurity experience. Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity). Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments. Certifications: One or more required-CISSP, CISM, or equivalent. Key Skills & Core Competencies Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques. Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model. Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution. Demonstrated success in leading security incident response efforts and handling high-pressure situations. Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
    $126k-174k yearly est. 2d ago
  • Senior Manager, Information Security Office (ISO) Consultant

    Capital One 4.7company rating

    Information security analyst job in Washington, DC

    At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with modern software, big data ecosystems, and cloud based technologies. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. Responsibilities: Act as a central Information Security point of contact for the Enterprise Platforms line of business Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Web Security, and Mobile Security Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures, and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in development processes Escalate and manage cyber security risk Educate and influence executive leadership and associates to effectively leverage security capabilities and solutions to mitigate risks and emerging threats Deliver Cyber agenda and integration of Information Security within business objectives for the line of business area Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business About You: You have a desire to work in a very fast moving, forward leaning, and modern computing environment You have a deep passion for securing modern computing platforms You have a strong desire to continually learn about new technologies You possess strong conceptual thinking and communication skills You are able to work well under minimal supervision You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives You are able to tailor communications and analysis to the intended audience Basic Qualifications: High School Diploma, GED, or equivalent certification At least 6 years of experience working in cybersecurity or information technology At least 6 years of experience providing guidance and oversight of cyber security concepts At least 5 years of experience performing security risk assessments or security architecture reviews At least 5 years of experience with architecture, software design, networking, or cloud infrastructure At least 4 years of experience with cloud security engineering At least 2 years experience utilizing agile methodologies within DevOps environments Preferred Qualifications: Bachelor's Degree 8+ years of experience in cyber security or information technology 6+ years of experience in securing a public cloud environment 5+ years of experience securing Identity Applications 5+ years of experience with Threat Modeling AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $225.4k-257.2k yearly 12h ago
  • Cyber Information Assurance Analyst III

    Chickasaw Nation Industries 4.9company rating

    Information security analyst job in Fort Meade, MD

    The Cyber Information Assurance Analyst III supports the customer by performing assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Must be able to apply extensive technical expertise and has full knowledge of other related disciplines. Work is performed without appreciable direction. Exercises considerable latitude in determining technical objectives of assignment. Completed work is reviewed from a relatively long- term perspective, for desired results. Guides the successful completion of major programs and may function in a project leadership role. As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act. ESSENTIAL REQUIREMENTS * Have an active DoD Top Secret clearance with SCI eligibility * DoD 8570 IAM/IA Technical (IAT) Level II certification * Demonstrated experience with STIGs (Security Technical Implementation Guides), Security Requirement Guides (SRGs), Plan of Action and Milestones (POA&Ms) and cybersecurity best practices * Advanced understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253 * Demonstratable experience in risk analysis, control validation, and as a Security Control Assessor Representative (SCA-R). * Demonstrated experience with relevant tools such as eMASS, STIG Viewer, Nessus, ACAS, SCAP, or HBSS * Advanced understanding of key technologies areas/domain such as: Network, Mobility, Windows, UNIX, Cloud Environments and Cloud Native Tools/Services, Host Based Security System (HBSS)/Endpoint Security Solutions (ESS), Databases, Applications * Customer service skills KEY DUTIES AND RESPONSIBILITIES Essential Duties and responsibilities include the following. Other duties may be assigned. * Use government-assigned tools to perform weekly updates, maintain records, and complete tasks. * Coordinate with ISSMs and PMOs to understand system architecture, security requirements, and changes. * Conduct risk analysis and authorization tasks across all RMF steps using approved RE5 tools and processes. * Verify authorization boundaries and categorize systems (FIPS199). * Identify data classifications and conduct system-level risk assessments. * Track system changes, assess impacts, and report updates to the AO. * Evaluate authorization and change requests, web filtering, firewall exceptions, ports/protocols, cybersecurity risks, STIG/SRG compliance, and on-site security. * Lead assessment visits, conduct briefings, and ensure proper documentation and reporting. * Attend required government training and meetings to stay updated on process changes. * Maintain access and proficiency in required government databases and cybersecurity tools. * Assess threats, vulnerabilities, and residual risks; compile findings into authorization packages. * Support assigned systems throughout their lifecycle in alignment with FISMA requirements. * Submit weekly activity reports summarizing tasks, tracking IDs, and key updates. * Complete assessor training, vulnerability scanning, endpoint security, and RMF step training. EDUCATION AND EXPERIENCE Bachelor's Degree and a minimum of eight (8) years of experience in systems security, or equivalent combination of education/experience. PHYSICAL DEMANDS Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic. The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job. EOE including Disability/Vet The estimated pay range for this role is $115K to $120K, with the final offer contingent on location, skillset, and experience. CNI offers a comprehensive benefits package that includes: * Medical * Dental * Vision * 401(k) * Family Planning/Fertility Assistance * STD/LTD/Basic Life/AD&D * Legal-Aid Program * Employee Assistance Program (EAP) * Paid Time Off (PTO) - (11) Federal Holidays * Training and Development Opportunities Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI). #INDCNI
    $115k-120k yearly Auto-Apply 4d ago
  • Cyber Security Analyst

    JCS Solutions 4.0company rating

    Information security analyst job in Bethesda, MD

    Grow, innovate, and generate progress: Harness your expertise to solve challenges and celebrate success! JCS Solutions LLC (JCS) is seeking a Cyber Security Analyst to support our federal client. This position offers a great opportunity to be part of a high-performing team responsible for supporting a full complement of customer-centric technical support services. Must be a U.S. Citizen and able to obtain a Public Trust Clearance. If you are interested in a challenge and a great working environment, apply today! What's in it for you: Join a premier technology firm specializing in innovative solutions. Be part of a collaborative, inclusive, and innovative work culture. Enjoy tremendous growth potential in a high-performing team environment. A robust benefits package: Health, dental, and vision insurance Life insurance Short-and-long term disability Paid time off (PTO) 401k retirement plan with employer match Annual Professional Development Reimbursement Program And more! What you will do: Designs, develops, implements, and integrates information assurance architecture, systems, or system components for use within data center, network, and enclave environments. Ensures that the architecture and design of information systems are functional and secure. Supports: policy development and implementation; security engineering and security architecture; certification and accreditation processes and activities; continuity of operations planning, testing, and maintenance; security testing and analysis. Provides secure solutions to complex security issues. Upgrades systems by implementing and maintaining security controls. Participates on security and related working groups as required and at various levels. Develops and presents security solutions and recommendations to senior management for sites, systems, and networks. Keeps users informed by preparing performance reports and communicating system status. What you will bring: Four (4) years of cybersecurity experience Bachelor's degree in a relevant field of study Strong written and verbal communication skills (English) Demonstrated experience working with multiple assignments or multiple stakeholder groups Strong foundational understanding of information security and privacy practices and regulations How you will wow us: Hands-on experience using new and emerging cybersecurity technologies Hands-on experience using tools such as BigFix, Splunk, Tripwire, Cylance, Tenable, etc Experience running scans, reporting results, working with staff to support patching, documentation for SOPs and other areas, completing security waivers, validating identities for RSA tokens, triaging security tickets, monitoring Incident Response Team (IRT) requests, and working closely with desktop teams to resolve security issues Experience using a helpdesk ticketing system such as ServiceNow JCS Solutions (JCS) is a premier technology firm providing innovative solutions and high-quality services in defense, national security, and civilian sectors. JCS offers enterprise-wide solutions including cloud computing, software development, cybersecurity, digital modernization, and management consulting for the federal government. At JCS, we elevate our customers' mission through the application of technology and professional services. Our commitment to investing in our workforce drives innovation and progress for our clients, employees, and communities. JCS has been certified as a Great Place to Work four years in a row and was awarded Washington Post's Top Places to Work for 2024 and 2025. Our employees embody our core values, and we are looking for others who do too! Customer Experience: Strive for excellence and delight our clients Innovation: Embrace creative thinking to enable continual growth and powerful solutions Accountability: Take ownership of and pride in our actions and service delivery Inspire: Be inspired to be your best self and have fun in the process Integrity: Do the right thing, the right way, every time! Stewardship: The careful and responsible management of something entrusted to our care. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to any status protected by applicable federal, state, or local laws.
    $79k-106k yearly est. Auto-Apply 35d ago
  • Cyber Systems SSO

    Janus Research Group Inc. 4.3company rating

    Information security analyst job in Washington, DC

    is Subject to Contract Award JANUS Research Group is currently seeking a Cyber Systems SSO for a contract to support the Deputy Chief of Staff (DCS, G8. The DCS G-8 is the principal military advisor to the Chief of Staff, Army (CSA) and the Assistant Secretary of the Army, Financial Management and Comptroller (ASA(FMC)) for the Programming phase of the Planning, Programming, Budgeting, and Execution (PPBE) process. The DCS, G-8 coordinates with the Assistant Secretary of the Army, Acquisition, Logistics, and Technology (ASA(ALT)) on all proposed programming and process recommendations related to ongoing and future acquisition programs and science and technology initiatives. The DCS, G-8 coordinates with Army Futures Command (AFC) for program funding for all elements of the future force materiel modernization enterprise. Position Description: Manages Army cyber capability development within the Intelligence Division. Provides analytical and technical expertise on cyber defense, network operations, and offensive cyber modernization. Develops information papers, briefings, and SPAR/POM inputs addressing capability gaps, performance, and operational integration. Coordinates with ASA(ALT), T2COM, ARCYBER, INSCOM, and ARSTAF to align cyber initiatives with Army and Joint modernization strategies. Relevant Competencies / Skill Levels: A Bachelor's Degree in Engineering and/or Business A minimum of four (4) years of experience and expertise in Force Development duties Demonstrates expert analytical and technical skills in cyber systems architecture, network defense, and offensive cyber capabilities. Proficient in evaluating system performance, security posture, and modernization impacts to ensure resilient and adaptive cyber operations. Possesses advanced analytical and communication abilities to deliver clear, data-driven assessments that enhance Army cyber capability development and operational readiness Benefits: 401(k), Paid Time Off (PTO), Paid Holidays, Medical and Dental Plans, Life and Disability insurance, Education Assistance (and more). JANUS strives to provide opportunities for career growth through training and development. We also offer an attractive comprehensive benefit package to include health and welfare plans and financial products. As part of a total rewards program, employees can benefit from our referral bonus program, and other various employee awards. JANUS Research Group takes pride in our benefit package and rewards program which has earned us the certification of a Great Place to Work JANUS Research Group provides reasonable accommodation so that qualified applicants with a disability may participate in the selection process. Please advise us of any accommodations you request to express interest in a position by e-mailing: Judy Pagac, Chief Human Resources Officer at **************************** or calling **************. Please state your request for assistance in your message. Only reasonable accommodation requests related to applying for a specific position within JANUS Research Group will be reviewed at the e-mail address and phone number supplied. Thank you for considering a career with JANUS Research Group. JANUS Research Group participates in the Electronic Employment Verification Program. Please click the E-Verify link below for more information. E-Verify JANUS Research Group is an equal opportunity/ affirmative action employer. It is company policy to provide equal opportunity in all areas of employment practice without regard to race, color, religion, sex, sexual orientation, national origin, age, marital status, veteran status, citizenship, or disability. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment qualified individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability.
    $87k-120k yearly est. 35d ago
  • Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)

    Red Alpha

    Information security analyst job in Annapolis, MD

    A day in the life: As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to): Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis Categorize traffic as benign, suspicious, or malicious activity Document malicious tactics, techniques, and procedures (TTPs) Develop and implement mitigation strategies What you bring to the table: Level 1: A Bachelor's degree in a technical discipline and 2+ years of relevant experience Experience in malware analysis Programming experience in C, C#, Java, Perl or Python is preferred An active TS/SCI with Polygraph Level 2: A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification Experience in malware analysis An active TS/SCI with Polygraph Level 3: A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification Experience in malware analysis An active US Government TS/SCI security clearance with Polygraph Bonus Skills: Level 1: CISSP, GIAC GREM or CREA Certification is preferred The total package: Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves and their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information. Salary Range: Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself. Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are: Level 1: $80,000 - $125,000 Level 2: $120,000 - $160,000 Level 3: $140,000 - $180,000 Level 4: $165,000 - $215,000 Some of our additional perks and benefits include: Retire sooner than planned: Get closer to retirement with up to 10% in 401k contributions, immediately vested. Have a career AND a life: Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays. Stay at your best: As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym! Keep current on new technologies and technological advancements : $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships. Dress in style: Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc. Enjoy the culture: Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more! Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we bring digital transformation to the fight!
    $165k-215k yearly Auto-Apply 60d+ ago
  • Information Systems Security Analyst

    Qmulos

    Information security analyst job in Washington, DC

    Qmulos is recruiting cybersecurity specialists who want to challenge themselves by working with brilliant people to solve some of today's most important cybersecurity problems. As an emerging cybersecurity software and consulting company in the heart of Washington D.C., we need highly motivated individuals who think of big ideas, work well with others, and can help solve game-changing problems. We need creative people whose intelligence is matched only by their grit. Among only a small group of Silicon Valley-style startups in D.C., Qmulos you'll work with industry trailblazers and global private-sector and public-sector clients to help solve national security problems. Job Description Research, verify and document information security controls using the Federal Certification and Accreditation (C&A) processes. Propose, communicate, and enforce security policies, procedures and methodologies. Collect, compile, and report IA and CND metrics relating to Connection Approval Process, Certification and Accreditation Compliance, Information Assurance Vulnerability Management Compliance, Inspection Compliance Status, and FISMA Compliance. Analyze reports from vulnerability assessment scanners, patch management tools, and emerging threat information to advise on the risk and remediation of security issues. Develop Plan of Action and Milestones (POA&Ms) for identified vulnerabilities to initiate, coordinate and track the patching and remediation of security weaknesses. Conduct reviews: security authorization documents, event logs, security incidents. Report on security status and security incidents. Coordinate Authorization packages. Qualifications Bachelor's Degree (Preferable: Computer Science, Information Systems, Software Engineering or other related analytical, scientific, or technical disciplines) 5+ years experience in IT security, including Certification and Accreditation and/or IT security risk analysis/advice, preferably in support of the Federal government. Knowledge of Federal government C&A practices and policies (Preferable: ICS 503, FISMA, NISP SP 800-53, and DHS 4300) 5+ years experience with information assurance tools preferred 5+ years experience working directly with a federal client Ability to work independently and also collaborating closely with project managers, engineers, and others Working knowledge of Ongoing Authorization with in the NIST Framework Excellent written and oral communication skills Clearance Requirements: Active Top Secret Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-111k yearly est. 12h ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Washington, DC

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 13h ago
  • Incident Detection Analyst

    Tyto Athene 4.2company rating

    Information security analyst job in Washington, DC

    Tyto Athene is searching for a **Incident Detection Analyst** to support our customer in Washington, DC. **Responsibilities:** + Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC needs. + Conduct Incident Triage to prioritize newly identified security incidents for follow-on action. Identify all relevant data sources for initial collection to determine prioritization and resource application based on the criticality of the incident. Conduct immediate actions to evaluate and contain threats as necessary in accordance with the Judiciary Security Operations Center Incident Response Plan (JSOCIRP), Incident Response Operations Guide, and any other published SOC operations guides and manuals. Please see SLA SOC3. + Perform deep dive analysis (manual and automated) of malicious links and files. + Ensure efficient configuration and content tuning of shared SOC security tools to eliminate or significantly reduce false alert events. + Provide Executive Summary in accordance to IDT Operations Guide. + Provide 5W briefing slides for each event for leadership briefing. + Provide on demand time/trend/event based metric reports for SOC management. + Provide clear and actionable event notifications to customers. Notifications to customers will be clear and provide sufficient detail for a mid-level system or network administrator to understand what has occurred and what needs to take place to remediate the event. + Coordinate and provide direct support to local incident responders at the circuit, local court unit and program office levels. Provide notifications, guidance and end to end incident response support to local incident responders to ensure the appropriate actions are properly taken to detect, contain, eradicate and recover from identified security incidents. Coordinate with various other SOC teams to leverage the appropriate resources to enable local incident responders. Participate in course of action (COA) development and execution as necessary. + Document all communications and actions taken in response to assigned incidents in the SOC ticketing system. Ensure tickets are properly updated in a timely manner and all artifacts are included. Escalate any concerns or requests through the Contractor management as necessary. + Directly support the Judiciary Special Tactics and Active Response (JSTAR) team and provide incident response support for critical security incidents as they arise. + Perform appropriate event escalation for events, notifications, and non-responsiveness from customers. Contractors shall track all notifications in the SOC ticketing system and escalate tickets to Watch Officers or SOC management in cases where the customer is non-responsive or requires clarification that is outside the scope of the normal operations. Contractors will be familiar with the JSOCIRP escalation and reporting procedures. + Continuously review and update the Incident Handlers (IH) Guide and provide recommendations to annual updates for the JSOCIRP. All SOPs and Op Guides are federal government property. Contract staff provide recommendations in draft form for federal management review, approval and adoption. + Incident Responders must be able to perform the tasks and meet the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework for the role of Cyber Defense Incident Responder **Qualifications** **Required:** + 6 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and Network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs; + Ability to communicate clearly both orally and in writing. + Working experience with Splunk SIEM. + At least three years of experience working at a senior level, performing analytics examination of logs and console events and creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, in SIEM environments **Education/Certifications:** + Bachelor's degree in information systems, Computer Science or related field is preferred. // Splunk Fundamentals I & II certification. **Clearance:** + Public Trust **Hours of Operation/Shift:** + Monday-Friday 3PM EST - 1130PM EST **About Tyto Athene** **Compensation:** + Compensation is unique to each candidate and relative to the skills and experience they bring to the position. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range. **Benefits:** + Highlights of our benefits include Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave. Tyto Athene is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success. Our expertise spans four core technology domains-Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT-empowering our clients with cutting-edge solutions tailored to their evolving needs. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National Security, Civilian, Health, and Public Safety clients across the United States and worldwide. At Tyto Athene, we believe that success starts with our people. We foster a collaborative, innovative, and mission-driven environment where every team member plays a critical role in shaping the future of technology. Are you ready to join #TeamTyto? Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, [sexual orientation, gender identity,] national origin, disability, status as a protected veteran, or any characteristic protected by applicable law. Submit a Referral (******************************************************************************************************************************* **Location** _US-DC-Washington_ **ID** _2025-1522_ **Category** _Cybersecurity_ **Position Type** _Full-Time_
    $62k-88k yearly est. 60d+ ago
  • Senior Information Security Specialist

    ISYS Technologies 4.1company rating

    Information security analyst job in Washington, DC

    Minimum Clearance Required No Clearance Responsibilities I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense. We are seeking a Senior Information Security Specialist to support our customer's operations in Washington, DC. This effort provides our Government customer with IT Staffing and Consulting services. This position will be on-site. Responsibilities: Administer and maintain intrusion detection/prevention systems (IDS/IPS), SIEM platforms, and firewalls for both on-premises and cloud environments, including authoring custom detection content. Monitor real-time network activity, analyze logs and metadata, and investigate anomalies to confirm and respond to intrusion attempts across hybrid infrastructures. Perform full-scope digital forensics and incident response (DFIR), covering all phases from scoping and containment to recovery and lessons learned. Design and maintain secure network architectures and data loss prevention (DLP) solutions to safeguard sensitive data in cloud and on-premises systems. Execute comprehensive security assessments, including penetration testing, ethical hacking, and static/dynamic code analysis, to uncover and address vulnerabilities. Demonstrate deep technical understanding of network protocols, system hardening, encryption, identity and access management (IAM), and application security. Conduct risk assessments, security gap analyses, and develop actionable mitigation strategies in alignment with NIST, OMB M-22-09, and other federal cybersecurity standards. Deploy and support identity, credential, and access management (ICAM) solutions, including multifactor authentication and identity governance frameworks for federal environments. Lead compliance efforts, including control assessments under NIST 800-53, POA&M management, and executive reporting on security posture and residual risk. Collaborate with stakeholders to build consensus on vulnerability management, prioritize remediation, and ensure alignment with agile development and zero trust initiatives. Qualifications Essential Requirements: US Citizenship Required Experience: 5-10 years of experience in the following: Administering and maintaining intrusion detection, prevention, and analysis platforms, including SIEMs, host-based systems, and firewalls, while authoring and implementing custom detection logic. Monitoring real-time network activity and analyzing raw data, metadata, and logs to identify, investigating, and responding to anomalies and cybersecurity incidents across on-premises and cloud environments. Implementing and maintaining data loss prevention (DLP) capabilities for safeguarding sensitive information in both local and cloud-based systems. Designing, supporting, and managing security infrastructure, including upgrading toolsets, applying patches, and configuring settings to align with organizational security goals and zero trust architecture. Conducting comprehensive security testing-including ethical hacking, static/dynamic code reviews, and system architecture assessments-for evaluating controls and identifying vulnerabilities. Analyzing security data to identify risks, assessing system vulnerabilities, and developing mitigation strategies aligned with federal standards and best practices. Leading and supporting vulnerability management efforts, including executing scans, evaluating risk, tracking compliance with BOD 22-01, and generating reports to guide remediation efforts. Collaborating with stakeholders for conducting gap analyses, prioritizing vulnerabilities, and developing actionable remediation plans for enterprise systems and networks. Deploying and managing enterprise-wide Identity, Credential, and Access Management (ICAM) solutions, supporting MFA, privileged access management, and identity lifecycle governance in compliance with OMB and NIST guidance. Developing technical and executive-level documentation, reports, and presentations for communicating findings, readiness status, and recommendations for improving cybersecurity posture. Education and Certifications: A Bachelor's degree from an accredited college or university One or more of the following, as appropriate: Certified Incident Handler (GCIH) GIAC Network Forensic Analyst (GNFA) GIAC Certified Forensic Analyst (GCFA) Information Systems Security Engineering (ISSE) Certified Cloud Security Engineer (CCSE) Offensive Security Certified Professional (OSCP) GIAC Penetration Tester (GPEN) Certified Information Systems Security Professional (CISSP) GIAC Enterprise Vulnerability Assessor (GEVA) Certified Analytics Professional (CAP) I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status. Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer.
    $78k-106k yearly est. Auto-Apply 60d+ ago
  • Safety and Security Data Analyst

    AHU Technologies Inc.

    Information security analyst job in Washington, DC

    Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities Gather and accurately organize safety and security data collected from various internal and external sources. Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets. Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas. Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes. Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data. Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data. Qualifications Minimum Requirements Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting). Demonstrable experience with data collection, maintenance, and basic reporting. Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records. Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment. Unwavering ability to maintain confidentiality and protect sensitive data. Preferred Skills Familiarity or exposure to basic data visualization techniques. Working knowledge of or familiarity with programming languages such as Python and SQL. Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries. Prior exposure to or experience with safety, security, or transportation-related data.
    $66k-95k yearly est. 18d ago
  • Information Security Manager

    Howard Community College 4.1company rating

    Information security analyst job in Columbia, MD

    Bookmark this Posting Print Preview | Apply for this Job Details Information About Us Howard Community College (HCC) is an exciting place to work, learn, and grow! We are proud to have received the Great Colleges to Work For honor for 12 consecutive years, 2009-2020. Howard Community College values diversity among its faculty, staff and student population. We are an innovative institution that is committed to responding to the ever-changing needs and interests of a diverse and dynamic community. No matter where you want to go in your career, you can get there from here! Health Insurance * Multiple medical options with no annual deductible and low co‑pays; prescription drugs covered through mail‑order or retail pharmacies. * Vision coverage includes an annual eye exam and a generous frame allowance. * Dental plans offer low deductibles and reasonable annual maximums. Paid Time Off & Leave * 20 days of vacation per year for full‑time staff (capped at 30 days), with additional accrual tiers for other employee groups. * Spring break and winter break each add one extra week of paid vacation. * 4 days of personal leave per year (rolls into sick leave if unused). * 12 days of sick leave per year, unlimited carry‑forward. * Additional leave options include bereavement, organ‑donor, sabbatical (faculty & staff), and an emergency‑leave bank. Tuition Waiver * Full‑time budgeted employees receive a tuition waiver for Howard Community College courses taken during non‑working hours (subject to space availability and prior approval). On‑Site Amenities * Fitness center accessible to all staff. * Library with research resources and bestseller collection. Café offering a variety of food options and a quick‑service kiosk and parking is free for faculty and staff. Position Title Information Security Manager FLSA Exempt FT/PT Full Time Hours Per Week 37.5 Work Schedule Monday-Friday Grade 18 Compensation Range $84,559 Summary We are seeking a highly skilled and experienced Information Security Manager to lead our IT security team. The successful candidate will be responsible for developing and implementing comprehensive security strategies to protect our organization's information assets from cyber threats. Essential Role Responsibilities Security Strategy Development: * Develop and implement a robust information security strategy aligned with organizational goals. * Conduct regular risk assessments and security audits to identify and mitigate potential threats. Policy and Procedure Management: * Establish, enforce, and update security policies, procedures, and guidelines. * Ensure compliance with industry standards, regulations, and best practices. Team Leadership: * Manage and mentor a team of IT security professionals, providing guidance and support in their daily activities. * Foster a culture of security awareness and continuous improvement within the organization. Security Technology Management: * Oversee the implementation and maintenance of security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus software. * Stay current with emerging security technologies and trends to ensure the organization remains protected against new threats. Collaboration and Communication: * Collaborate with other departments to ensure security measures are integrated into all aspects of the organization's operations. * Communicate security risks and strategies to senior management and other stakeholders. Minimum Education Required Bachelor's degree Experience Required 5 Preferred Experience Education: * Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field. A master's degree is preferred. Certifications: * Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA). Experience: * Minimum of five (5) years of experience in information security, with at least three (3) years in a managerial role. * Proven track record of developing and implementing successful security programs. Technical Skills: * In-depth knowledge of security frameworks (e.g., CIS) and best practices. * Proficiency with security technologies and tools, including firewalls, IDS/IPS, SIEM systems, and encryption methods. * Strong understanding of network protocols, operating systems, and application security. OTHER SKILLS * Excellent leadership and team management abilities. * Strong analytical and problem-solving skills. * Effective communication and interpersonal skills. Physical Demand Summary * This position may require occasional on-call duties and availability for emergency response. * Ability to work in a fast-paced, dynamic environment. Supervisory Position? Yes Division Information Technology Department Information Security Posting Detail Information Posting Number B556P Number of Vacancies 1 Best Consideration Date 11/14/2025 Job Open Date 10/29/2025 Job Close Date Continuous Recruitment? No Job Category Staff Benefits Summary Howard Community College offers competitive salaries, excellent medical and dental selections, tuition reimbursement and paid leave programs. As a participating member of the Maryland Retirement and Pension System, HCC offers two retirement options: The Pension, which requires a 7% employee contribution and The ORP, a 403(b) with a 7.25% employer contribution only. Employees in positions that do not require a bachelor's degree must participate in The Pension. Employees that possess a bachelor's degree and hold professional positions that require a bachelor's degree may choose to participate in either The Pension or The ORP. Applicant Instructions * Pre-employment criminal background investigation is a condition of employment. HCC is interested in all qualified applicants who are eligible to work in the United States. However, HCC will generally not sponsor applicants for work visas. Due to HCC policy, only employees living in states contiguous to Maryland are eligible for work at HCC and include Virginia, West Virginia, Washington DC, Pennsylvania. Candidates must live in the commutable area or willing to relocate at their own expense if offered the position because HCC does not offer relocation benefits. Please complete the entire HCC Employment Application (Candidates will be evaluated on completing the college's application in full). Quick Link for Internal Postings ********************************************** EEO Statement Howard Community College (HCC) is an Equal Employment Opportunity & Affirmative Action employer & values diversity within its faculty, staff & student population. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, gender, sexual orientation, gender identity, genetic information, disability or protected veteran status. HCC understands that persons with specific disabilities may need assistance with the job application process and/or with the interview process. For confidential assistance with the job application process, please contact the Office of Human Resources at ************. Reference Collection References Minimum Requests 3 Maximum Requests 3 Cut-off Date Special Instructions to Reference Provider Supplemental Questions Required fields are indicated with an asterisk (*). * * Do you have a bachelor's degree or higher? * Yes * No * * Do you have at least 5 years of related work experience, as defined in the position posting? * Yes * No Documents Needed to Apply Required Documents * Resume * Cover Letter Optional Documents
    $84.6k yearly 60d ago
  • Network and Security Analyst

    Vheda Health

    Information security analyst job in Columbia, MD

    We're seeking a talented and motivated Network and Security Analyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role. Key Responsibilities Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi) Assess and improve existing IT systems and processes Coordinate with vendors for cabling, equipment, and installation Set up and recommend equipment for new hires Manage access control systems, surveillance integration, and UPS/power solutions Evaluate and improve domain/web infrastructure Ensure HIPAA and data privacy compliance in all IT operations Required Qualifications Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+) 5-10+ years in IT infrastructure, networking, or systems analysis Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control Familiar with HIPAA, PII, and cybersecurity best practices Experience with Microsoft 365, Power BI, and Asana (preferred) Preferred Qualifications Healthcare or regulated industry experience Why Join Vheda Health? At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package: Compensation: Competitive salary within the published range plus performance bonus and equity opportunities Healthcare: Comprehensive medical, dental, and vision coverage Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability Work-Life Balance: Unlimited paid time off and 11 paid company holidays Community: Engaging team events and activities throughout the year
    $66k-90k yearly est. 60d+ ago
  • Network Security Analyst

    Cymertek

    Information security analyst job in Annapolis, MD

    Network Security AnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $66k-90k yearly est. Easy Apply 60d+ ago
  • Senior Manager, Information Security Office Consultant

    Capital One 4.7company rating

    Information security analyst job in Washington, DC

    Senior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. As a Senior Manager, You will play a leading role in delivering product security advisory services for a fast moving project within a line of business portfolio, working closely with other professionals as required. You have the ability to lead complex problem solving in partnership with multiple stakeholders in a fast-paced environment, driving results with critical impact. You will work with the other Information security consultants, business, technology and risk partners to achieve time sensitive goals and objectives in a secure manner with a heavy forward lean on modern software and technology architectures. Responsibilities: Act as an Information Security point of contact for a business function within the Card line of business Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Leverage strong technical acumen and be security SME reviewing architecture, providing risk mitigation solutions and driving overall risk management. Partner closely with engineers, product managers, and other cross-functional partners to help break down complexity and organizational silos to problem solve. Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment About You: You have a desire to work in a very fast moving, forward leaning, and modern computing environment You have experience in securing large-scale e-commerce platforms, with deep understanding of payments systems, customer data protection across high transaction environments ensuring protection of user data across internal and partner ecosystems. You have a deep passion for Securing modern computing platforms You have a strong desire to continually learn about new technologies You possess strong conceptual thinking and communication skills You are able to work well under minimal supervision You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives Basic Qualifications: High School Diploma, GED or equivalent certification At least 6 years of experience working in cybersecurity or information technology At least 5 years of experience providing guidance and oversight of Security concepts At least 5 years of experience performing security risk assessments and security architecture reviews At least 5 years of experience with architecture, software design, networking, and cloud infrastructure At least 4 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 6+ years of experience Application Security, Threat Modeling, Penetration Testing, Vulnerability Management 4+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 2+ years experience in e-commerce industry 2+ years of experience building software utilizing public cloud (e.g. AWS, GCP, Azure) 1+ years of experience in security integration for Mergers and Acquisitions 1+ years of experience with Cloud patch management practices such as system rehydration and image management 1+ years of experience utilizing Agile methodologies 1+ years of experience with Software Security Architecture 1+ years of experience with Application Security 1+ years of experience with Threat Modeling 1+ years of experience with Penetration Testing and/or Vulnerability Management 1+ years of experience with integrating SaaS products into an Enterprise Environment 1+ years of experience with securing Container services 1+ years of experience with Splunk-Fu and Enterprise Monitoring experience 1+ years of experience in a Financial services industry experience 1+ years of experience with Offensive or Defensive Security techniques AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) certification At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, or another type of work authorization). The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. McLean, VA: $225,400 - $257,200 for Sr Manager, Cyber Technical New York, NY: $245,900 - $280,600 for Sr Manager, Cyber Technical Plano, TX: $204,900 - $233,800 for Sr Manager, Cyber Technical Richmond, VA: $204,900 - $233,800 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $92k-120k yearly est. 12h ago
  • Information Systems Security Analyst

    Qmulos

    Information security analyst job in Washington, DC

    Qmulos is recruiting cybersecurity specialists who want to challenge themselves by working with brilliant people to solve some of today's most important cybersecurity problems. As an emerging cybersecurity software and consulting company in the heart of Washington D.C., we need highly motivated individuals who think of big ideas, work well with others, and can help solve game-changing problems. We need creative people whose intelligence is matched only by their grit. Among only a small group of Silicon Valley-style startups in D.C., Qmulos you'll work with industry trailblazers and global private-sector and public-sector clients to help solve national security problems. Job Description Research, verify and document information security controls using the Federal Certification and Accreditation (C&A) processes. Propose, communicate, and enforce security policies, procedures and methodologies. Collect, compile, and report IA and CND metrics relating to Connection Approval Process, Certification and Accreditation Compliance, Information Assurance Vulnerability Management Compliance, Inspection Compliance Status, and FISMA Compliance. Analyze reports from vulnerability assessment scanners, patch management tools, and emerging threat information to advise on the risk and remediation of security issues. Develop Plan of Action and Milestones (POA&Ms) for identified vulnerabilities to initiate, coordinate and track the patching and remediation of security weaknesses. Conduct reviews: security authorization documents, event logs, security incidents. Report on security status and security incidents. Coordinate Authorization packages. Qualifications Bachelor's Degree (Preferable: Computer Science, Information Systems, Software Engineering or other related analytical, scientific, or technical disciplines) 5+ years experience in IT security, including Certification and Accreditation and/or IT security risk analysis/advice, preferably in support of the Federal government. Knowledge of Federal government C&A practices and policies (Preferable: ICS 503, FISMA, NISP SP 800-53, and DHS 4300) 5+ years experience with information assurance tools preferred 5+ years experience working directly with a federal client Ability to work independently and also collaborating closely with project managers, engineers, and others Working knowledge of Ongoing Authorization with in the NIST Framework Excellent written and oral communication skills Clearance Requirements: Active Top Secret Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-111k yearly est. 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Information security analyst job in Washington, DC

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 60d+ ago
  • Cyber Information Assurance Analyst - Junior Assessor

    Chickasaw Nation Industries 4.9company rating

    Information security analyst job in Fort Meade, MD

    The Cyber Information Assurance Analyst supports the customer by performing analyses to validate security requirements and assessing the systems and networks within the networking environment. Work is performed under some direction and exercises a limited degree of latitude in determining technical objectives of assignment. Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays. As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act. ESSENTIAL REQUIREMENTS * The ability to obtain, maintain and access classified information at the TS/SCI level. * DoD 8570 IAM/IA Technical (IAT) Level II certification. * Familiarity with STIGs (Security Technical Implementation Guides), Security Requirement Guides (SRGs), Plan of Action and Milestones (POA&Ms) and cybersecurity best practices. * Understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253. * Familiarity with relevant tools such as eMASS, STIG Viewer, Nessus, ACAS, SCAP, or HBSS. * Strong written and verbal communication skills for reporting assessment findings. * This position requires travel ~85% CONUS & OCONUS KEY DUTIES AND RESPONSIBILITIES Essential Duties and responsibilities include the following. Other duties may be assigned. * Conducts cybersecurity assessments, audits, and inspections for DoD organizations and partners handling DoD information or connecting to the DoDIN. * Evaluates systems and Defensive Cyberspace Operations using cyber threat emulation and performance-based testing. * Adheres to policies and processes for each assessment type. * Supports assessment development and execution to ensure security expertise is properly applied. * Coordinates logistics, test plans, and scope with the SCA Team Lead. * Performs vulnerability assessments, capture results using STIG Viewer or designated tools, and document findings in eMASS. * Analyzes security gaps and provide mitigation recommendations. * Validates cybersecurity controls, TTPs, STIGs, RMF controls, and compliance with DoD policies and guidelines. * Provides risk analysis and assessment results for authorization recommendations. * Participates in daily assessment reviews, in-briefs, and out-briefs, sharing findings with the SCA-R. EDUCATION AND EXPERIENCE Bachelor's Degree and a minimum of one to two (1-2) years of experience in systems security, or equivalent combination of education/experience. PHYSICAL DEMANDS Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic. The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job. EOE including Disability/Vet * Please note, that this position is contingent upon the award or funding. The essential duties, experience, education requirements, and salary are subject to change.* The estimated pay range for this role is $65K to $70K, with the final offer contingent on location, skillset, and experience. CNI offers a comprehensive benefits package that includes: * Medical * Dental * Vision * 401(k) * Family Planning/Fertility Assistance * STD/LTD/Basic Life/AD&D * Legal-Aid Program * Employee Assistance Program (EAP) * Paid Time Off (PTO) - (11) Federal Holidays * Training and Development Opportunities Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
    $65k-70k yearly Auto-Apply 47d ago
  • Safety and Security Data Analyst

    AHU Technologies

    Information security analyst job in Washington, DC

    Replies within 24 hours Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (80-90%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities Gather and accurately organize safety and security data collected from various internal and external sources. Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets. Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas. Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes. Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data. Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data. Qualifications Minimum Requirements Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting). Demonstrable experience with data collection, maintenance, and basic reporting. Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records. Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment. Unwavering ability to maintain confidentiality and protect sensitive data. Preferred Skills Familiarity or exposure to basic data visualization techniques. Working knowledge of or familiarity with programming languages such as Python and SQL. Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries. Prior exposure to or experience with safety, security, or transportation-related data. Compensation: $31.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.
    $31 hourly Auto-Apply 17d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Towson, MD?

The average information security analyst in Towson, MD earns between $66,000 and $128,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Towson, MD

$92,000

What are the biggest employers of Information Security Analysts in Towson, MD?

The biggest employers of Information Security Analysts in Towson, MD are:
  1. CyberCore
Job type you want
Full Time
Part Time
Internship
Temporary