Information security analyst jobs in Waldorf, MD - 1,899 jobs
All
Information Security Analyst
Network Security Analyst
Data Security Analyst
Intrusion Detection Analyst
Information Systems Security Officer
Security Engineer
Information Systems Security Manager
Information Security Officer
Information System Security Manager (ISSM)
Johns Hopkins Applied Physics Laboratory (APL 4.6
Information security analyst job in Laurel, MD
Do you love solving problems while enabling impactful research to operate securely?
Are you passionate about making meaningful contributions to national security cyber missions?
Do you like collaborating with a team with varied strengths to tackle complex problems which enable research across space exploration, cybersecurity, national defense, and cutting edge technologies?
If so, we're looking for someone like you to join our team at APL.
We are ranked as one of Computerworld 's Top Places to Work in IT for 6 years running and seeking motivated cybersecurity professionals to help us develop system security plans, handle cyber risk decisions, and enable our mission partners to innovate in a secure environment. As a member of our team, you'll contribute to the security and oversight of our classified information systems in support of real world, mission focused tasks. Our team of hardworking technical specialists are motivated by one common goal - securing our systems to enable national security missions. We strive to foster an environment of collaboration where the best idea prevails.
As an Information System Security Manager...
Your primary responsibility will be to ensure classified systems follow government and APL regulations while still meeting program demands and operating in an accredited state.
You will lead all aspects of SSP development, maintenance, accreditation/re-accreditation, and oversight, including conducting periodic reviews to ensure compliance.
You will function as lead contact for IS security inspections, tests, and reviews by oversight authorities.
You will support the Chief InformationSecurity Officer (CISO) and the Chief of Classified IT Compliance in carrying out the Laboratory's Classified InformationSecurity Program.
Qualifications
You meet our minimum qualifications for the job if you...
Have acquired a BS in Computer Science, Cyber Security, or a related field, 8+years of relevant cybersecurity experience, and a current DoD 8140 Level III certification.
Have 5+ years working with the RMF, DAAPM, NISPOM, JSIG or other equivalent security frameworks.
Are an outstanding communicator in both written and verbal forms.
Hold an active Top Secret security clearance with a current SSBI. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship.
You'll go above and beyond our minimum requirements if you...
Have worked as an Auditor, ISSO, ISSM, ISSE, Security Architect or Cyber Risk Manager for 5+ years.
Held cybersecurity positions in classified DoD or IC environment for 8+ years.
Currently have active TS/SCI, or TS/SCI+poly security clearance
About Us
Why Work at APL?
The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. While we are dedicated to solving complex challenges and pioneering new technologies, what makes us truly outstanding is our culture. We offer a vibrant, welcoming atmosphere where you can bring your authentic self to work, continue to grow, and build strong connections with inspiring teammates.
At APL, we celebrate our differences of perspectives and encourage creativity and bold, new ideas. Our employees enjoy generous benefits, including a robust education assistance program, unparalleled retirement contributions, and a healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities at ******************************
All qualified applicants will receive consideration for employment without regard to race, creed, color, religion, sex, gender identity or expression, sexual orientation, national origin, age, physical or mental disability, genetic information, veteran status, occupation, marital or familial status, political opinion, personal appearance, or any other characteristic protected by applicable law. APL is committed to providing reasonable accommodation to individuals of all abilities, including those with disabilities. If you require a reasonable accommodation to participate in any part of the hiring process, please contact Accommodations@jhuapl.edu.
The referenced pay range is based on JHU APL's good faith belief at the time of posting. Actual compensation may vary based on factors such as geographic location, work experience, market conditions, education/training and skill level with consideration for internal parity. For salaried employees scheduled to work less than 40 hours per week, annual salary will be prorated based on the number of hours worked. APL may offer bonuses or other forms of compensation per internal policy and/or contractual designation. Additional compensation may be provided in the form of a sign-on bonus, relocation benefits, locality allowance or discretionary payments for exceptional performance. APL provides eligible staff with a comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development. Applications are accepted on a rolling basis.
Minimum Rate
$105,000 Annually
Maximum Rate
$290,000 Annually
$86k-111k yearly est. Auto-Apply 1d ago
Looking for a job?
Let Zippia find it for you.
SME Zero Trust Security Engineer
Govcio LLC
Information security analyst job in Alexandria, VA
GovCIO is currently hiring a Zero Trust Security Engineer to join our team, supporting a critical program with the U.S. Coast Guard. This position is located in Alexandria, VA and will be a hybrid remote position.
Responsibilities:
The Zero Trust Security Engineer will be responsible for leading the strategic implementation and operationalization of Zero Trust principles across the enterprise. This role involves serving as the definitive technical authority on all matters related to ZT methodology and its practical application.
Serve as the primary Subject Matter Expert (SME) for Zero Trust architecture, guiding the adoption and operational integration of ZT principles across the entire IT infrastructure.
Lead the design, implementation, and refinement of ZT strategies, focusing on the core tenets of "never trust, always verify" and the micro-segmentation of critical assets.
Conduct in-depth analysis of current network architectures, access controls, and security policies to identify gaps and develop comprehensive ZT migration roadmaps.
Collaborate directly with engineering, architecture, and cybersecurity teams to engineer and implement permanent, scalable ZT resolutions and security controls.
Architect and implement strategic process improvements, develop sophisticated, expert-level ZT implementation guides, and curate the knowledge base to significantly elevate the technical capabilities of the entire cyber operations organization.
Manage complex user identity, device, and application access controls within enterprise Identity and Access Management (IAM) systems, ensuring ZT principles and compliance standards are rigorously met.
Utilize advanced scripting and automation (PowerShell, Python) to automate ZT policy enforcement, enhance diagnostic capabilities, and streamline continuous monitoring processes.
Mentor and provide expert technical coaching to all levels of the security operations and IT support teams, acting as a technical leader and driving continuous skill development in ZT methodologies.
Maintain rigorous and detailed documentation of ZT architectures, configurations, and operational procedures within the enterprise knowledge management systems, strictly adhering to industry frameworks (e.g., ITIL, NIST, DoD).
#JP #USCG
Qualifications:
Bachelor's with 12+ years (or commensurate experience)
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or an equivalent combination of education and extensive, directly relevant experience) with 12+ years (or commensurate experience)
Required Skills and Experience
Minimum 8+ years of progressive, hands-on experience in cybersecurity, system architecture, or network engineering, with a minimum of 3 years spent specifically in a senior SME/escalation, engineering, or technical leadership role focused on Zero Trust or advanced security architecture.
Clearance Requirement: Must be clearable up to an active Secret clearance.
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $145,000.00 - USD $190,000.00 /Yr.
$145k-190k yearly Auto-Apply 4d ago
Information System Security Officer (ISSO)
Johns Hopkins Applied Physics Laboratory (APL 4.6
Information security analyst job in Laurel, MD
Do you love to be on a team of highly skilled, motivated and dedicated professionals charged with protecting sensitive data while administering enterprise Information Systems (IS) that support the Johns Hopkins University Applied Physic Lab (JHUAPL) mission?
Do you want to integrate system administration with InformationSecurity (IS) across Highly Classified networks?
Are you passionate about protecting our Nation's most sensitive information?
If so, we're looking for someone like you to join our team at APL.
We are seeking a dedicated Information System Security Officer (ISSO) to help us protect APL's Sponsor classified enterprise information technology infrastructure.
As a member of our team, you'll contribute to IS Security Management and oversight of our classified information systems in support of Sponsor/Program needs. You'll join an impressive team of technical specialists motivated by the common goal of supporting APL's operational security posture across a complex classified infrastructure. You will independently identify and solve technical issues relating to Information Assurance system hardening (ensuring system availability, integrity, authentication and confidentiality).
As an ISSO...
Your primary responsibilities are aligned to supporting requirements found in the Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM) version 2.2 and future updates to include: security relevant documentation such as security CONOPS, Security Controls Traceability Matrix's, System Security Plans, Risk Assessment Reports, Contingency Plans.
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security plan.
Ensure all proper account management documentation is completed prior to adding and deleting system accounts.
Verify all system security documentation is current and accessible to properly authorized individuals.
Conduct periodic assessments of authorized systems and providing the ISSM with corrective actions for all identified findings and vulnerabilities.
Ensure audit records are collected and analyzed in accordance with the security plan.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Serve as a member of the Configuration Control Board (CCB).
Possess sufficient experience and technical competence commensurate with the complexity of the systems.
Ensure user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures.
Execute the continuous monitoring strategy.
Perform and analyze weekly security audits for nonstandard events. Implement backup solution and ensure a cohesive disaster recovery plan.
Utilize the Enterprise Mission Assurance Support Services (eMASS) accreditation workflow platform.
Assist in preparations for and participate in system inspections and take timely action to correct and document any issues or findings and train IS users on items required to eliminate security incidents.
Qualifications
You meet our minimum qualifications for the job if you
A minimum of 6 years' experience implementing cybersecurity policy and security controls for classified enterprise information technology systems and have a worked with a Restricted Area, SCIF, or SAPF.
Possess a Bachelor's degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering from an ABET accredited or NCAE-C-designated institution.
Meet and demonstrate intermediate DoD 8140.03 Cyberspace Workforce Qualification and Management Program requirements through training and/or certifications (Security+, equivalent, or higher).
Have a strong working knowledge with the DCSA DAAPM or JSIG, NISPOM, and DISA cybersecurity policy to support risk-based decisions and ensure compliance across the enterprise.
Managed, trained, and led System Administrators (SAs), Information System Owners (ISOs), Information System Security Officers (ISSOs), and other stakeholders to prepare for and meet DCSA DAAPM standards and Defense Information System Agency (DISA) Command Cyber Readiness Inspection (CCRI) or Cyber Operational Readiness Assessment (CORA) standards.
Managed, documented, and assisted with implementing DISA Security Technical Implementation Guides (STIGs) for operating systems and applications across the enterprise enclave for a minimum of 1 year.
Have a deep understanding of government cybersecurity compliance standards, regulations, and policies with the ability to communicate requirements to all stakeholders, needed to support the enterprise system to include: configuration changes, application patching, incident response, vulnerability mitigation, and risk management.
Developed, managed, or had direct implementation responsibility for continuous monitoring programs at the enterprise level.
Have a working knowledge of Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), DISA STIG Viewer, Splunk or other cybersecurity relevant tools.
Experience with developing and implementing cybersecurity training for SAs, ISOs, ISSOs, and privileged/general users.
Experience and technical understanding of high to low / low to high data transfer process
The ability to support enterprise level compliance requirements with minimal and timely manner to include providing clear and concise rational for decisions to all stakeholders.
Excellent organizational and communication skills and the ability to effectively interact with managers and technical staff.
Hold an active Secret security clearance and ability to obtain and maintain a Top Secret. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship.
You'll go above and beyond our minimum requirements if you...
Have more than 10 years' experience implementing cybersecurity policy and security controls for classified enterprise information technology systems and have a worked with a Restricted Area, SCIF, or SAPF.
Hold a Master's degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering from an ABET accredited or NCAE-C-designated institution.
Meet and demonstrate advanced DoD 8140.03 Cyberspace Workforce Qualification and Management Program requirements through training and/or certifications (CISSP, equivalent, or higher).
Have cybersecurity compliance experience supporting Collateral, SCI, or SAP Top Secret enterprise information systems.
Have experience in cybersecurity supporting domains such as intelligence analysis, Security Operations Center (SOC) support, governance and/or risk management, Development, Security, Operations (DevSecOps), computer forensics, policy creation, technical writing, incident response, disaster recover, etc.
Have working familiarity with Director of Central Intelligence Directives (DCID) or Intelligence Community Directives (ICD) security requirements.
Have direct experience working for a University Affiliated Research Center (UARC), Department of Defense (DoD) or Department of Energy (DOE) or similar research facilities.
#LI-AG1
About Us
Why Work at APL?
The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. While we are dedicated to solving complex challenges and pioneering new technologies, what makes us truly outstanding is our culture. We offer a vibrant, welcoming atmosphere where you can bring your authentic self to work, continue to grow, and build strong connections with inspiring teammates.
At APL, we celebrate our differences of perspectives and encourage creativity and bold, new ideas. Our employees enjoy generous benefits, including a robust education assistance program, unparalleled retirement contributions, and a healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities at ******************************
All qualified applicants will receive consideration for employment without regard to race, creed, color, religion, sex, gender identity or expression, sexual orientation, national origin, age, physical or mental disability, genetic information, veteran status, occupation, marital or familial status, political opinion, personal appearance, or any other characteristic protected by applicable law. APL is committed to providing reasonable accommodation to individuals of all abilities, including those with disabilities. If you require a reasonable accommodation to participate in any part of the hiring process, please contact Accommodations@jhuapl.edu.
The referenced pay range is based on JHU APL's good faith belief at the time of posting. Actual compensation may vary based on factors such as geographic location, work experience, market conditions, education/training and skill level with consideration for internal parity. For salaried employees scheduled to work less than 40 hours per week, annual salary will be prorated based on the number of hours worked. APL may offer bonuses or other forms of compensation per internal policy and/or contractual designation. Additional compensation may be provided in the form of a sign-on bonus, relocation benefits, locality allowance or discretionary payments for exceptional performance. APL provides eligible staff with a comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development. Applications are accepted on a rolling basis.
Minimum Rate
$100,000 Annually
Maximum Rate
$245,000 Annually
$58k-76k yearly est. Auto-Apply 1d ago
Chief Information Security Officer
The Planet Group 4.1
Information security analyst job in Washington, DC
Chief InformationSecurity Officer (CISO)
The Chief InformationSecurity Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of informationsecurity programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
$126k-174k yearly est. 3d ago
Intrusion Analyst - Multiple Levels (TS/SCI with Polygraph required)
Red Alpha
Information security analyst job in Annapolis, MD
A day in the life:
As an Intrusion Analyst, you'll support critical missions through analysis of data derived from various network and telecom communication systems. Your responsibilities will include (but not be limited to):
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity
Document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies
What you bring to the table:
Level 1:
A Bachelor's degree in a technical discipline and 2+ years of relevant experience
Experience in malware analysis
Programming experience in C, C#, Java, Perl or Python is preferred
An active TS/SCI with Polygraph
Level 2:
A Bachelor's degree in a technical discipline and 5+ years of relevant experience OR a Master's Degree and 3+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active TS/SCI with Polygraph
Level 3:
A Bachelor's degree in a technical discipline and 8+ years of relevant experience OR a Master's Degree and 6+ years of relevant experience
CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification
Experience in malware analysis
An active US Government TS/SCI security clearance with Polygraph
Bonus Skills:
Level 1:
CISSP, GIAC GREM or CREA Certification is preferred
The total package:
Our total compensation package was strategically designed with our members in mind with the intention to: reward our members for their hard work and commitment to our customers' missions; allow members to share in Red Alpha's success as we continue to grow and expand our footprint; provide long-term career opportunities through stability and internal mobility; and provide the resources our members need to support themselves
and
their dependents in the form of a robust benefits package. Our total compensation package includes a competitive base salary and benefits such as health, life/disability, 401k, paid time off, professional development, and generous bonus programs. Please visit our benefits tab for additional information.
Salary Range:
Disclosed pay ranges are a general guideline, and are not a guarantee of a final salary or compensation. Our approach in determining final salaries takes into consideration a number of factors such as education, certifications, total years of relevant professional experience, actual level of expertise, and the responsibilities of the role itself.
Based on the outlined roles, responsibilities, and requirements, the projected pay range for these positions are:
Level 1: $80,000 - $125,000
Level 2: $120,000 - $160,000
Level 3: $140,000 - $180,000
Level 4: $165,000 - $215,000
Some of our additional perks and benefits include:
Retire sooner than planned:
Get closer to retirement with up to 10% in 401k contributions, immediately vested.
Have a career AND a life:
Enjoy up to 5 weeks of leave (25 days of personal time off) and 11 paid floating holidays.
Stay at your best:
As a member, we'll pay 100% of your premiums for comprehensive health, dental, and vision insurance. We'll also pay the majority of the premiums for your family. Let's not forge free access to a fully equipped state of the art gym!
Keep current on new technologies and technological advancements
: $5250 per year towards ongoing education, trainings, certifications, and maintaining professional memberships.
Dress in style:
Spend up to $300 per year on company branded merchandise featuring top quality brands such as Under Armour, Nike, Carhartt, YETI, etc.
Enjoy the culture:
Attend fun company events throughout the year such as our Oktoberfest, summer picnic, and annual holiday party! These are all in additon to your team events which may include happy hours, baseball games, snowboarding, RenFest, and more!
Every day, our elite customers are pushing through "the grind" to defeat the enemy, even putting their lives on the line for our freedom. Rise to the occasion with us to deliver engineering excellence, to match their dedication to this nation. Join us as we
bring digital transformation to the fight!
$165k-215k yearly Auto-Apply 60d+ ago
Incident Detection Analyst
Tyto Athene 4.2
Information security analyst job in Washington, DC
Tyto Athene is searching for a **Incident Detection Analyst** to support our customer in Washington, DC. **Responsibilities:** + Accurately review, annotate, and resolve security incidents tasked by the Intrusion Detection Team, Watch Officer, SOC management or other SOC teams 24 hours a day, 7 days a week, which is subject to change based on AOUSC needs.
+ Conduct Incident Triage to prioritize newly identified security incidents for follow-on action. Identify all relevant data sources for initial collection to determine prioritization and resource application based on the criticality of the incident. Conduct immediate actions to evaluate and contain threats as necessary in accordance with the Judiciary Security Operations Center Incident Response Plan (JSOCIRP), Incident Response Operations Guide, and any other published SOC operations guides and manuals. Please see SLA SOC3.
+ Perform deep dive analysis (manual and automated) of malicious links and files.
+ Ensure efficient configuration and content tuning of shared SOC security tools to eliminate or significantly reduce false alert events.
+ Provide Executive Summary in accordance to IDT Operations Guide.
+ Provide 5W briefing slides for each event for leadership briefing.
+ Provide on demand time/trend/event based metric reports for SOC management.
+ Provide clear and actionable event notifications to customers. Notifications to customers will be clear and provide sufficient detail for a mid-level system or network administrator to understand what has occurred and what needs to take place to remediate the event.
+ Coordinate and provide direct support to local incident responders at the circuit, local court unit and program office levels. Provide notifications, guidance and end to end incident response support to local incident responders to ensure the appropriate actions are properly taken to detect, contain, eradicate and recover from identified security incidents. Coordinate with various other SOC teams to leverage the appropriate resources to enable local incident responders. Participate in course of action (COA) development and execution as necessary.
+ Document all communications and actions taken in response to assigned incidents in the SOC ticketing system. Ensure tickets are properly updated in a timely manner and all artifacts are included. Escalate any concerns or requests through the Contractor management as necessary.
+ Directly support the Judiciary Special Tactics and Active Response (JSTAR) team and provide incident response support for critical security incidents as they arise.
+ Perform appropriate event escalation for events, notifications, and non-responsiveness from customers. Contractors shall track all notifications in the SOC ticketing system and escalate tickets to Watch Officers or SOC management in cases where the customer is non-responsive or requires clarification that is outside the scope of the normal operations. Contractors will be familiar with the JSOCIRP escalation and reporting procedures.
+ Continuously review and update the Incident Handlers (IH) Guide and provide recommendations to annual updates for the JSOCIRP. All SOPs and Op Guides are federal government property. Contract staff provide recommendations in draft form for federal management review, approval and adoption.
+ Incident Responders must be able to perform the tasks and meet the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework for the role of Cyber Defense Incident Responder
**Qualifications**
**Required:**
+ 6 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and Network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs;
+ Ability to communicate clearly both orally and in writing.
+ Working experience with Splunk SIEM.
+ At least three years of experience working at a senior level, performing analytics examination of logs and console events and creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, in SIEM environments
**Education/Certifications:**
+ Bachelor's degree in information systems, Computer Science or related field is preferred. // Splunk Fundamentals I & II certification.
**Clearance:**
+ Public Trust
**Hours of Operation/Shift:**
+ Monday-Friday 3PM EST - 1130PM EST
**About Tyto Athene**
**Compensation:**
+ Compensation is unique to each candidate and relative to the skills and experience they bring to the position. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range.
**Benefits:**
+ Highlights of our benefits include Health/Dental/Vision, 401(k) match, Paid Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and parental leave.
Tyto Athene is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success. Our expertise spans four core technology domains-Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT-empowering our clients with cutting-edge solutions tailored to their evolving needs. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National Security, Civilian, Health, and Public Safety clients across the United States and worldwide.
At Tyto Athene, we believe that success starts with our people. We foster a collaborative, innovative, and mission-driven environment where every team member plays a critical role in shaping the future of technology. Are you ready to join #TeamTyto?
Tyto Athene, LLC is an Equal Opportunity Employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, [sexual orientation, gender identity,] national origin, disability, status as a protected veteran, or any characteristic protected by applicable law.
Submit a Referral (*******************************************************************************************************************************
**Location** _US-DC-Washington_
**ID** _2025-1522_
**Category** _Cybersecurity_
**Position Type** _Full-Time_
$62k-88k yearly est. 60d+ ago
Data Exploiter (TS/SCI with Poly Required)
GCI Careers 4.7
Information security analyst job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. KEY RESPONSIBILITIES
Provide data exploitation and targeting support to the customer.
Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
Analyze intrusion artifacts to identify mitigation approaches for potential network defense
Provide recommendations for continuous improvement.
Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
Equivalent combination of education, technical certifications, training, and work/military
experience. REQUIRED QUALIFICATIONS
Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
Demonstrated experience in utilizing technical targeting tools
Experience reviewing and assessing network traffic and knowledge of the OSI Layers
Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
Knowledge of incident response, containment, and mitigation
Knowledge of common cyber-attack methods
Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
Demonstrated experience performing vulnerability identification, risk analysis, and remediation
Ability to triage, review, identify, and correlate items of interest from numerous all source
datasets
Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
Identify and document information that can fill critical gaps
Create new methodologies / algorithms for data analysis and correlation
Create entity / object profiles and derived data sets that enable future opportunities and
analytical efforts
Prepare a range of tailored products that embody and explain findings
Experience with technical collection abilities
Must be eligible to obtain the required Security Clearance.
DESIRED QUALIFICATIONS
Python Scripting
Strong understanding of VPNs, VLANs, and TCP/IP
Understanding of Linux operating systems
Ability to working independently with minimal supervision
Experience conducting network traffic analysis
Understanding of forensic tools and applications
Salary Range $160,000-$200,000
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$67k-93k yearly est. 60d+ ago
Safety and Security Data Analyst
AHU Technologies Inc.
Information security analyst job in Washington, DC
Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension.
Key Responsibilities
Gather and accurately organize safety and security data collected from various internal and external sources.
Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets.
Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas.
Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes.
Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data.
Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data.
Qualifications
Minimum Requirements
Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting).
Demonstrable experience with data collection, maintenance, and basic reporting.
Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records.
Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment.
Unwavering ability to maintain confidentiality and protect sensitive data.
Preferred Skills
Familiarity or exposure to basic data visualization techniques.
Working knowledge of or familiarity with programming languages such as Python and SQL.
Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries.
Prior exposure to or experience with safety, security, or transportation-related data.
$66k-95k yearly est. 19d ago
Senior Information Security Specialist
ISYS Technologies 4.1
Information security analyst job in Washington, DC
Minimum Clearance Required No Clearance Responsibilities
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense. We are seeking a Senior InformationSecurity Specialist to support our customer's operations in Washington, DC. This effort provides our Government customer with IT Staffing and Consulting services. This position will be on-site.
Responsibilities:
Administer and maintain intrusion detection/prevention systems (IDS/IPS), SIEM platforms, and firewalls for both on-premises and cloud environments, including authoring custom detection content.
Monitor real-time network activity, analyze logs and metadata, and investigate anomalies to confirm and respond to intrusion attempts across hybrid infrastructures.
Perform full-scope digital forensics and incident response (DFIR), covering all phases from scoping and containment to recovery and lessons learned.
Design and maintain secure network architectures and data loss prevention (DLP) solutions to safeguard sensitive data in cloud and on-premises systems.
Execute comprehensive security assessments, including penetration testing, ethical hacking, and static/dynamic code analysis, to uncover and address vulnerabilities.
Demonstrate deep technical understanding of network protocols, system hardening, encryption, identity and access management (IAM), and application security.
Conduct risk assessments, security gap analyses, and develop actionable mitigation strategies in alignment with NIST, OMB M-22-09, and other federal cybersecurity standards.
Deploy and support identity, credential, and access management (ICAM) solutions, including multifactor authentication and identity governance frameworks for federal environments.
Lead compliance efforts, including control assessments under NIST 800-53, POA&M management, and executive reporting on security posture and residual risk.
Collaborate with stakeholders to build consensus on vulnerability management, prioritize remediation, and ensure alignment with agile development and zero trust initiatives.
Qualifications
Essential Requirements:
US Citizenship
Required Experience:
5-10 years of experience in the following:
Administering and maintaining intrusion detection, prevention, and analysis platforms, including SIEMs, host-based systems, and firewalls, while authoring and implementing custom detection logic.
Monitoring real-time network activity and analyzing raw data, metadata, and logs to identify, investigating, and responding to anomalies and cybersecurity incidents across on-premises and cloud environments.
Implementing and maintaining data loss prevention (DLP) capabilities for safeguarding sensitive information in both local and cloud-based systems.
Designing, supporting, and managing security infrastructure, including upgrading toolsets, applying patches, and configuring settings to align with organizational security goals and zero trust architecture.
Conducting comprehensive security testing-including ethical hacking, static/dynamic code reviews, and system architecture assessments-for evaluating controls and identifying vulnerabilities.
Analyzing security data to identify risks, assessing system vulnerabilities, and developing mitigation strategies aligned with federal standards and best practices.
Leading and supporting vulnerability management efforts, including executing scans, evaluating risk, tracking compliance with BOD 22-01, and generating reports to guide remediation efforts.
Collaborating with stakeholders for conducting gap analyses, prioritizing vulnerabilities, and developing actionable remediation plans for enterprise systems and networks.
Deploying and managing enterprise-wide Identity, Credential, and Access Management (ICAM) solutions, supporting MFA, privileged access management, and identity lifecycle governance in compliance with OMB and NIST guidance.
Developing technical and executive-level documentation, reports, and presentations for communicating findings, readiness status, and recommendations for improving cybersecurity posture.
Education and Certifications:
A Bachelor's degree from an accredited college or university
One or more of the following, as appropriate:
Certified Incident Handler (GCIH)
GIAC Network Forensic Analyst (GNFA)
GIAC Certified Forensic Analyst (GCFA)
Information Systems Security Engineering (ISSE)
Certified Cloud Security Engineer (CCSE)
Offensive Security Certified Professional (OSCP)
GIAC Penetration Tester (GPEN)
Certified Information Systems Security Professional (CISSP)
GIAC Enterprise Vulnerability Assessor (GEVA)
Certified Analytics Professional (CAP)
I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.
Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer.
$78k-106k yearly est. Auto-Apply 60d+ ago
Visual Imagery Intrusion Detection System (VIIDS)
Siertek Ltd.
Information security analyst job in Andrews Air Force Base, MD
Job Description
SierTeK proudly serves our clients by providing expertise in the Program Management, Information Technology, and Administrative Support domains. Founded in 2007 as a minority and service-disabled veteran-owned company, we serve as prime- and subcontractor for a multitude of Federal Department of Defense contracts. By focusing on continual improvement, our services remain at the forefront of our industry, and we pride ourselves on delivering our services with the highest degree of integrity.
SierTeK Ltd. is seeking a Visual Imagery Intrusion Detection System (VIIDS) to support an opportunity at Joint Base Andrews, MD.
PLEASE APPLY DIRECTLY ON OUR WEBSITE: ***********************
POSITION OVERVIEW SECTION
The employee shall provide Tiers 2 and 3 support to install, configure, administer, manage, maintain/update and provide VIIDS support and repairs required to keep listed critical VIIDS systems and components fully operational. The employee shall ensure the VIIDS as a whole and all hardware and software components meet or exceed all applicable Government standards and regulations. The employee shall ensure all listed VIIDS, and components are kept updated to meet or exceed all industry standards and are fully functional. The employee shall maintain and keep current any relevant Government documentation on a SharePoint site or similar web/application-based tracking tool (on premise) for all VIIDS.
Essential Job Functions
Provide onsite emergency support to resolve any issues within 1 hour of notification by the Government to include outside normal duty hours. The Government will determine what constitutes an emergency on a case-by-case basis.
Prepare and maintain project planning documentation, create, and maintain network maps/diagrams (static and active/dynamic which are maintained/updated continuously), and presentation material. Acceptable Formats are Adobe Acrobat and Visio. The employee shall provide these materials to the Government within three (3) business days of the request and follow all required document classification requirements. The employee shall provide a written monthly status report on the VIIDS repair and maintenance activities in a mutually agreed upon format.
Qualifications
Minimum Position Requirements
3+ years of experience in network design and administration and possess Cisco or equivalent certification, e.g., CCNA, CCNP. Individual(s) shall have advanced understanding of server maintenance and operation.
Honeywell Vindicator Intrusion Detection System, Access Control, and Vindicator Command and Control certification and maintain active certification with Honeywell. Certification shall be maintained for the duration of the task order.
Top Secret with capability of being upgraded to Yankee White
SierTeK is an equal opportunity employer and values diversity. Employment is decided based on qualifications, merit, and business need. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, transfer, leaves of absence, compensation, and training.
If you need assistance or accommodation due to a disability, you may contact us at 1+************.
$80k-112k yearly est. 9d ago
Intrusion Analyst
Synergy ECP
Information security analyst job in Columbia, MD
Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security.
In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our Employees, to our Customers and by Improving Performance (ECP).
It's what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results - showing we're ready to meet our customers' evolving demands.
Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services.
Synergy ECP is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected class.
Requirements
A Bachelor's degree and 5 years of relevant experience or a Master's degree plus 3 years of relevant experience or a Doctoral degree and 2 years of relevant experience. An Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
CISSP, CEH, Sec+, Net+, GIAC, GREM, or CREA Certification is required.
Relevant experience must be in malware analysis. Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources.
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis.
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs).
Develop and implement mitigation strategies.
Have a network and/or host-based focus.
$80k-112k yearly est. 60d+ ago
Information Systems Security Analyst
CSA Global LLC 4.3
Information security analyst job in Dahlgren, VA
Job DescriptionDescription:
Client Solution Architects (CSA) is currently seeking an Information Systems SecurityAnalyst to support a program at Dahlgren, VA.
This role is contingent on award.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
Cybersecurity Expertise:
Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES)
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (e.g., Access Control Lists (ACLs)
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model
System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Technical Proficiency:
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-indepth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI))
Leadership and Management:
Informationsecurity program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements
Requirements:
What you'll need to have to join our award-winning team:
Clearance: Must possess and maintain an active Secret Clearance
Four (4) years of experience in Cybersecurity.
Certification: IAT Level II
$92k-135k yearly est. 7d ago
Network Sniffer Analysis
E Pro Consulting 3.8
Information security analyst job in McLean, VA
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email: [email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-115k yearly est. 60d+ ago
Network Analyst - Active Security Clearance
Cadre 4.4
Information security analyst job in Reston, VA
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
$80k-114k yearly est. 2d ago
Network Security Analyst
Cymertek
Information security analyst job in Reston, VA
Network SecurityAnalystLOCATIONReston, VA 20190CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, InformationSecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$77k-104k yearly est. Easy Apply 60d+ ago
Networking Security Analyst
Beyond SOF
Information security analyst job in Fort Belvoir, VA
The company is looking for an amazingly talented Networking SecurityAnalyst to join our team! In this role you will get to support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
What You'll Be Doing:
Risk Mitigation of sensitive networks and systems
Configure, scan, monitor, report
PCAP collection
What Required Skills You'll Bring:
1+ years' experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices
Experience with configuring, scanning, monitoring, alerting and reporting security tools.
Active TS/SCI Clearance
Must be willing to travel 15%- OCONUS and CONUS locations
What Desired Skills You'll Bring:
Experience with PCAP collection.
Experience as a SOC analyst.
Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
Minimum Clearance Required to Start:
Top Secret SCI
This position is part of our Federal Solutions team.
Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
The company is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the quest-APPLY TODAY!
$77k-104k yearly est. 60d+ ago
Network and Security Analyst
Vheda Health
Information security analyst job in Columbia, MD
We're seeking a talented and motivated Network and SecurityAnalyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role.
Key Responsibilities
Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi)
Assess and improve existing IT systems and processes
Coordinate with vendors for cabling, equipment, and installation
Set up and recommend equipment for new hires
Manage access control systems, surveillance integration, and UPS/power solutions
Evaluate and improve domain/web infrastructure
Ensure HIPAA and data privacy compliance in all IT operations
Required Qualifications
Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+)
5-10+ years in IT infrastructure, networking, or systems analysis
Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control
Familiar with HIPAA, PII, and cybersecurity best practices
Experience with Microsoft 365, Power BI, and Asana (preferred)
Preferred Qualifications
Healthcare or regulated industry experience
Why Join Vheda Health?
At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package:
Compensation: Competitive salary within the published range plus performance bonus and equity opportunities
Healthcare: Comprehensive medical, dental, and vision coverage
Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability
Work-Life Balance: Unlimited paid time off and 11 paid company holidays
Community: Engaging team events and activities throughout the year
$66k-90k yearly est. 60d+ ago
Data Exploiter (TS/SCI with Poly Required)
GCI Careers 4.7
Information security analyst job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. Able to identify, triage and exploit data collections.
REQUIRED QUALIFICATIONS
Experience conducting network traffic analysis.
Prepare a range of tailored products that embody and explain findings
Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts).
Demonstrated knowledge of incident response, containment, and mitigation
Knowledge of common cyber-attack methods.
Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies.
Demonstrated experience performing vulnerability identification, risk analysis, and remediation.
Ability to triage, review, identify, and correlate items of interest from numerous all source datasets.
Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks).
Ability to identify and document information that can fill critical gaps.
Create new methodologies / algorithms for data analysis and correlation.
Create entity / object profiles and derived data sets that enable future opportunities and analytical efforts.
Experience with technical collection abilities.
DESIRED QUALIFICATIONS
Experience with scripting to exploit large data sets
Strong understanding of VPNs, VLANs, and TCP/IP.
Experience with Linux operating systems.
Experience with OS hardening using tools such as CIS-CAT.
Ability to work independently with minimal supervision.
Experience with navigating an enterprise security accreditation process.
Demonstrated experience and understanding of network monitoring tools (e.g Splunk, WSUS, Snare, Wireshark, and Solarwinds).
Technical targeting experience.
Russian Language skills or demonstrated knowledge of the EE AOR
REQUIRED EDUCATION AND EXPERIENCE
Bachelor's degree in Computer Science, Information Technology, or other related discipline, or equivalent combination of education, technical certifications, training, and work/military experience.
KEY RESPONSIBILITIES
Provide data exploitation support to the customer.
Assist with attribution efforts related to cyber activity.
Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures.
Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
Provide recommendations for continuous improvement.
Work alongside other team members to sustain and advance our organization's capabilities.
Salary Range $134,596-$224,764
*A candidate must be a US Citizen and requires an active/current TS/SCI with Polygraph clearance.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$67k-93k yearly est. 9d ago
Safety and Security Data Analyst
AHU Technologies
Information security analyst job in Washington, DC
Replies within 24 hours Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (80-90%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities
Gather and accurately organize safety and security data collected from various internal and external sources.
Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets.
Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas.
Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes.
Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data.
Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data.
Qualifications Minimum Requirements
Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting).
Demonstrable experience with data collection, maintenance, and basic reporting.
Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records.
Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment.
Unwavering ability to maintain confidentiality and protect sensitive data.
Preferred Skills
Familiarity or exposure to basic data visualization techniques.
Working knowledge of or familiarity with programming languages such as Python and SQL.
Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries.
Prior exposure to or experience with safety, security, or transportation-related data.
Compensation: $31.00 per hour
About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues.
AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.
$31 hourly Auto-Apply 18d ago
Network Security Analyst
Cymertek
Information security analyst job in Annapolis, MD
Network SecurityAnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, InformationSecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$66k-90k yearly est. Easy Apply 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Waldorf, MD?
The average information security analyst in Waldorf, MD earns between $66,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Waldorf, MD