Senior Cyber Security Analyst jobs at Lockheed Martin - 3024 jobs
Lead Cyber Threat Analyst
Directviz Solutions, LLC 3.6
Washington, DC jobs
DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS offers competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development reimbursement, corporate-funded technology certifications, and employee recognition programs. At DVS, we recognize that our employees are our number one resource. If you are a problem-solving people-person, apply today!
Location
Washington, DC
Position
Lead Cyber Threat Analyst
Location: Washington, DC
Position Summary
The Lead Cyber Threat Analyst serves as the technical and operational lead for enterprise cybersecurity operations, overseeing approximately 63 systems and ensuring compliance with all federal security standards. This role drives the organization\'s threat detection, analysis, and response strategy, leads the Computer Security Incident Response Center (CSIRC), and manages enterprise security monitoring tools within the Enterprise Security Operations Center (ESOC).
The position requires deep expertise in cybersecurity frameworks, threat intelligence, and vulnerability management, combined with strong leadership, analytical, and communication skills to guide analysts, coordinate incident response, and safeguard sensitive financial and operational systems.
Key Responsibilities
Lead enterprise-wide cybersecurity operations across ~63 systems, ensuring continuous protection and compliance with federal security standards.
Oversee daily security monitoring, analysis, and response activities within the ESOC.
Direct 24/7 CSIRC operations, including incident triage, containment, and recovery.
Develop and maintain comprehensive security documentation, including System Security Plans (SSPs), Privacy Impact Assessments (PIAs), and RMF artifacts.
Conduct annual Security Control Assessments (SCAs) and evaluate new systems and applications.
Identify, track, and remediate vulnerabilities and risks across enterprise environments.
Develop and maintain a real-time Cyber Threat Dashboard for senior leadership reporting and situational awareness.
Lead the Vulnerability Management Program, including prioritization, patching, and remediation oversight.
Monitor and analyze network traffic for potential intrusions, unauthorized activity, and anomalous behavior.
Manage security tools, threat intelligence feeds, and automation solutions supporting the ESOC mission.
Provide training, mentoring, and technical guidance to cybersecurityanalysts and SOC staff.
Oversee incident handling involving Personally Identifiable Information (PII) and ensure proper documentation and escalation.
Collaborate with cross-functional and government stakeholders to align operations with NIST, FISMA, and organizational security policies.
Support the protection and compliance of financial systems under the OCFO through proactive risk management.
Maintain system and application security posture, ensuring ongoing compliance and operational integrity.
Qualifications
Bachelor\'s degree in Computer Science, Information Technology, Engineering, or a related field.
Minimum of 10 years of progressive IT or technology experience, including at least 5 years within the past decade supporting large-scale federal technical contracts.
At least 7 years of cybersecurity experience, with 5 years focused on threat analysis in SOC or CSIRC environments supporting government systems.
Required Certification: Certified Information Systems Security Professional (CISSP).
Preferred Certifications: GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CompTIA CybersecurityAnalyst (CySA+).
Required: Information Technology Infrastructure Library (ITIL) 4 Foundation certification.
Strong understanding of cybersecurity frameworks and principles (NIST 800-53, FISMA, RMF, ISO 27001).
Proven experience with enterprise risk management, incident response, and vulnerability remediation.
Excellent analytical and problem-solving skills, with strong attention to detail.
Effective communication and interpersonal skills to collaborate across technical, executive, and federal teams.
Ability to lead multiple projects simultaneously and deliver results under tight deadlines.
Physical and Mental Qualifications
Be able to maintain awareness during scheduled working hours.
Prolonged periods sitting or standing at desk and working on a computer (mouse and keyboard).
Able to lift up to 15 pounds.
Excellent verbal and written communication; good command of the English language.
Execute tasks independently and work as a team.
Learns and memories routine tasks.
Strong organizational, grammar, business correspondence, and self-management skills.
Candidates must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodation will be provided for employees with disabilities.
DVS retains the right to change or assign other duties to this position.
Equal Opportunity
DirectViz Solutions, LLC (DVS) is an equal opportunity employer and prohibits discrimination and harassment against any employee or applicant for employment because of race, color, sex (including pregnancy), age, gender identity, creed, religion, national origin, sexual orientation, marital status, genetic information, disability, political affiliation, protected veteran status, or any other status protected by federal, state or local law.
DVS has a zero-tolerance policy for harassment, threats, coercion, discrimination, and intimidation. Employees may file a complaint or exercise any right protected by Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, as amended, Section 4212 of the Vietnam Era Veterans Readjustment Assistance Act of 1974, or the Veterans Employment Opportunities Act of 1998.
#J-18808-Ljbffr
A leading tech company based in the US is seeking a Senior Incident Response Security Consultant for Google Cloud, Mandiant. You will lead incident response engagements, investigate, and help organizations effectively respond to cyber threats. The ideal candidate possesses extensive experience in incident response and forensics. This is a remote-eligible role with a competitive salary range of $132,000-$194,000 plus benefits.
#J-18808-Ljbffr
$132k-194k yearly 2d ago
Cyber Security Engineer SME - Associate Director
Dovel Technologies, Inc. 4.2
Palo Alto, CA jobs
CyberSecurity Engineer SME - Associate Director page is loaded## CyberSecurity Engineer SME - Associate Directorlocations: US - Remote (Any location)time type: Full timeposted on: Posted Todayjob requisition id: 34211**Job Family:**Cyber Consulting**Travel Required:**None**Clearance Required:**Active SecretOur Cybersecurity Consultants are a team of business integrators with extensive consulting and industry experience who help our clients solve their complex business issues from strategy through execution. A career in an integrated team of developers and consultants provides the opportunity to grow and contribute to our clients' business issues every day, applying a collection of security spectrum capabilities, including security strategy and governance, IT risk, security technologies, and cybercrime and breach response.We are seeking an experienced **CyberSecurity Engineer SME - Associate Director** with a strong background in designing, implementing, and managing enterprise-level security solutions, particularly within federal government environments. The ideal candidate will possess deep technical expertise across cybersecurity domains, including threat detection, incident response, vulnerability management, and security architecture. This role requires a strategic thinker and hands-on practitioner who can lead security initiatives, mentor junior engineers, and ensure compliance with federal cybersecurity standards.**What You Will Do:*** Provide technical leadership on major cybersecurity engineering tasks across all networks and environments.* Propose, develop, deploy, configure, operate, integrate, maintain, and support enhancements of cybersecurity capabilities including threat detection tools, traffic segmentation controls, and security infrastructure.* Establish goals for cybersecurity tool implementation that meet project objectives.* Direct cybersecurity engineering activities with domain expertise in multiple capability categories.* Make critical decisions regarding cybersecurity tool selection, design, and deployment.* Ensure cyber capabilities meet or exceed minimum standards to operate on the Department of Defense Information Network (DoDIN.)* Focus areas may include: Secure Design, Tool Engineering/Lead, Cyber Incident Response Team Lead, Comply-to-Connect (C2C) Network Access Control (NAC), Data Security, Defensive Cyberspace Operations Infrastructure, Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering roles.**What You Will Need:*** Bachelor's Degree is required* Minimum of TEN (10) years of relevant cybersecurity or IT security experience.* An ACTIVE and CURRENT SECRET federal security clearance.* Demonstrated expertise in enterprise security architecture, threat intelligence, and incident response.* Mastery of of security frameworks and compliance standards (e.g., NIST, RMF SP 800-53 Rev 5, DoD 8570).* Experience with cybersecurity platforms such as Splunk, Tenable, Palo Alto, CrowdStrike, and AWS/Azure security services.* Experience in incident response, threat hunting, and forensic analysis.* Experience with cloud security practices and technologies (AWS, Azure, GCP).* Demonstrated ability to be effective as a Subject Matter Expert delivering cyber theories, concepts and principles in cross-functional teams and manage complex technical projects.* Strong analytical and problem-solving skills.* Excellent communication skills with the ability to convey technical concepts to non-technical stakeholders.**What Would Be Nice To Have:*** Master's Degree in relevant cybersecurity or IT field* One or more of the following certifications:* ISC2 Zero Trust Strategy Certificate* Certified Information Security Manager (CISM)* Certified Authorization Professional (CAP) / Certified in Governance, Risk and Compliance (CGRC)* IAT Level II (Information Assurance Technical)* IAM Level II (Information Assurance Management)* Cloud Security Certification (AWZ, Azure, or Google)* Familiarity with emerging technologies such as AI/ML in cybersecurity, quantum-resistant cryptography, and secure software supply chain practices.* Experience with Zero Trust Architecture and implementation based on CISA, DOD and/or IC maturity models.The annual salary range for this position is $149,000.00-$248,000.00. Compensation decisions depend on a wide range of factors, including but not limited to skill sets, experience and training, security clearances, licensure and certifications, and other business and organizational needs.**What We Offer:**Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.Benefits include:* Medical, Rx, Dental & Vision Insurance* Personal and Family Sick Time & Company Paid Holidays* Position may be eligible for a discretionary variable incentive bonus* Parental Leave and Adoption Assistance* 401(k) Retirement Plan* Basic Life & Supplemental Life* Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts* Short-Term & Long-Term Disability* Student Loan PayDown* Tuition Reimbursement, Personal Development & Learning Opportunities* Skills Development & Certifications* Employee Referral Program* Corporate Sponsored Events & Community Outreach* Emergency Back-Up Childcare Program* Mobility Stipend**About Guidehouse**Guidehouse is an Equal Opportunity Employer-Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation.Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco.If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at ************** or via email at RecruitingAccommodation@guidehouse.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or ************************. Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process.If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse's Ethics Hotline. If you want to check the validity of correspondence you have received, please contact *************************. Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant's dealings with unauthorized third parties.*Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee.*
#J-18808-Ljbffr
A leading software company in Chicago seeks a Senior Functional Consultant specializing in Human Capital Management to assist customers with HR technology challenges. The ideal candidate will have over 5 years of experience with Workday and must excel in communication and project management skills. This role involves providing customer service, supporting multiple projects, and partnering with engagement managers. Competitive salary range between $122,800 and $184,200, with flexibility for remote work.
#J-18808-Ljbffr
$122.8k-184.2k yearly 3d ago
Senior Security Engineer, Spam & Abuse Lead
Snap Inc. 4.7
Palo Alto, CA jobs
A leading technology company in California is seeking a Security Engineer for the Spam & Abuse team. This role involves architecting solutions against spam threats, collaborating across departments, and leading incident response efforts. The ideal candidate has a strong background in software engineering, experience with big data technologies, and excels in a collaborative setting. Compensation in the range of $209,000-$313,000 annually, along with additional employee benefits.
#J-18808-Ljbffr
$209k-313k yearly 1d ago
Senior Security Analyst
Capgemini 4.5
New York, NY jobs
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world.
The SeniorSecurityAnalyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client.
Responsibilities
Handles monthly reporting duties for the Information Risk Management team.
Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress.
Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important.
Develops work plans to structure solutions and communications.
Involves client and vendor staff appropriately in resolving security problems.
Participates effectively within the business' security governance framework.
Tracks the corrective and preventive actions being taken to improve security to closure.
Possesses strong communication skills to communicate technical and security risk information to management.
Experience
Ability to self-manage with little interaction from other management staff.
Flexible and able to adapt to manage a fast‑changing environment.
Ability to solve complex issues and provide recommendations and advice regarding remediations.
Experience with security architecture, security software, or security policy.
Ability to organize agendas, lead conference calls, and track action items to completion.
Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred.
Job Description - Grade Specific
The base compensation range for this role in the posted location is: $65,586-121,980.
Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law.
The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction.
These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity.
It is not typical for candidates to be hired at or near the top of the posted compensation range.
In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws.
Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include:
Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave
Medical, dental, and vision coverage (or provincial healthcare coordination in Canada)
Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada)
Life and disability insurance
Employee assistance programs
Other benefits as provided by local policy and eligibility
Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation.
Disclaimers
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.
Ref. code 385096-en_US
Posted on 05 Jan 2026
Contract type Permanent
Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville
#J-18808-Ljbffr
A global technology consulting firm is seeking a SeniorSecurityAnalyst to support governance in the enterprise security program. The role involves monitoring service provider activities, facilitating audits, and providing expertise on security issues. Ideal candidates should have strong self-management skills, familiarity with security technologies, and security certifications are preferred. This position comes with a comprehensive benefits package and competitive compensation in New York, with a compensation range between $65,586 and $121,980.
#J-18808-Ljbffr
$65.6k-122k yearly 4d ago
Senior Incident Response Security Consultant, Google Cloud, Mandiant
Google Inc. 4.8
Sunnyvale, CA jobs
Remote eligible
Mid Level Experience
Experience driving progress, solving problems, and mentoring more junior team members; deeper expertise and applied knowledge within relevant area.
Application Window
The application window will be open until at least November 26, 2025. This opportunity will remain online based on business needs which may be before or after the specified date. Applicants in the County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Applicants in San Francisco: Qualified applications with arrest or conviction records will be considered for employment in accordance with the San Francisco Fair Chance Ordinance for Employers and the California Fair Chance Act. Note: Google's hybrid workplace includes remote and in-office roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
In-office locations: Boulder, CO; Seattle, WA; San Francisco, CA; Sunnyvale, CA.
Remote location(s): California, USA; Colorado, USA; Washington, USA.
Qualifications
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
5 years of experience working end-to-end incident response investigations, analysis, or containment actions.
5 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
Preferred qualifications
Certifications in cloud platforms.
Experience in security competitions, Capture the Flag (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Ability to develop documentation and explain technical details in a concise manner.
Excellent time and project management, and written/verbal communication skills.
About the job
As an Incident Response Consultant, you will provide industry-leading incident response, assessment, transformation, managed detection and response, and training services with in-depth tactical support. You will help organizations effectively detect and respond to threats and reduce the overall impact of business risk before, during, and after an incident. You will be able to resolve security incidents quickly, effectively and at scale with complete incident response including investigation, containment, remediation, and crisis management. Additionally, you will work on engagements including assisting clients in navigating technically complex and high‑profile incidents, performing forensic analysis, threat hunting, and malware triage.
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation‑state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full‑time position is $132,000-$194,000 + bonus + equity + benefits Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job‑related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
Support and lead large, client‑facing incident response engagements, examine cloud, endpoint, and network‑based sources of evidence.
Collaborate with internal and customer teams to investigate and contain incidents.
Recognize and codify attacker tools, tactics, and procedures (TTPs) and indicators of compromise (IOCs) that can be applied to current and future investigations.
Build scripts, tools, or methodologies to enhance Mandiant's incident investigation processes.
Develop and present comprehensive and accurate reports, trainings, and presentations for both technical and executive audiences.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
#J-18808-Ljbffr
Duration: 11+ Months Contract
Contract
Interview Type: In-person
Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work).
Requirement ID: NYC_OT735_SS
contact Sandeep @ **********************
Job Description
Justification:
This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases.
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
Note:
Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum.
SCOPE OF SERVICES:
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered
At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety.
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats.
Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls.
DESIRABLE SKILLS/EXPERIENCE:
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant.
Please share my contact information with others working in Information Technology.
$81k-109k yearly est. 4d ago
Acquisition Security Analyst
Mantech 4.5
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 3d ago
Senior Security Engineer, Google Public Sector
Google Inc. 4.8
Urban Honolulu, HI jobs
Apply
Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing work 5 days a week in Honolulu, Hawaii.
Bachelor's degree in Computer Science, IT, or related field or equivalent practical experience.
5 years of experience with security assessments, security design reviews, or threat modeling.
5 years of experience with security engineering, computer and network security, and security protocols.
Experience delivering comprehensive security solutioning through design, coding, configuration, and deployment.
Must possess an active Top Secret/SCI Security Clearance.
Must currently have or be able to obtain advanced DoD 8140 DCWF certification.
Preferred qualifications
Certifications in CISSP, CISM, GCIH, GCIA, or OSCP.
Experience in a regulated industry (e.g., finance, healthcare, government).
Experience securing cloud environments (Cloud Computing Platform, Google Cloud Platform).
Understanding of cloud security principles and best practices.
About the job
Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal).
The GPS Cyber Defense and Security Operations Group leads our Security Operations (SECOPs) function for a range of GPS platforms and services. Combining Mandiant's deep security experience with Google technologies, our team sets the standard in Security Engineering, Assessment, and Operations across Government Cloud programs.
Google Public Sector brings the magic of Google to the mission of government and education with solutions purpose-built for enterprises. We focus on helping United States public sector institutions accelerate their digital transformations, and we continue to make significant investments and grow our team to meet the complex needs of local, state and federal government and educational institutions.
The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
Implement security monitoring strategies, incident response plans, and security awareness programs.
Oversee the deployment and operation of security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS) and other security tools.
Leverage cyber threat intelligence to conduct ongoing network hunt activities and identify active and dormant threats within the environment.
Develop and implement custom-built AI-driven security detections and workflows.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
#J-18808-Ljbffr
$123k-155k yearly est. 5d ago
Junior Information System Security Officer
Mantech 4.5
Washington, DC jobs
MANTECH seeks a motivated, career and customer-oriented Junior Information System Security Officer (ISSO) to join our team in Washington, D.C.
Responsibilities include, but are not limited to:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS. Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
Provide liaison support between the system owner and other IS security personnel. Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM). Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Minimum Qualifications:
At least 3 years' experience performing duties of an Information Systems Security Officer (ISSO) at a cleared facility
At least 5 years of work experience in a computer science or cybersecurity related field
Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or Information Assurance Management (IAM) Level II proficiency
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Preferred Qualifications:
A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline
Clearance Requirements:
Must have a current/active Top Secret security clearance with eligibility to obtain SCI.
Selected candidate must be willing to undergo a Polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
Often positions self to maintain computers in the lab, including under the desks and in the server closet
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
$60k-81k yearly est. 2d ago
Senior Cloud Visibility & Security PM
Gigamon 4.8
Santa Clara, CA jobs
A leading technology firm is seeking a Senior Product Manager to drive strategy and execution for cloud visibility and security solutions. This role involves collaborating cross-functionally with engineering, sales, and marketing teams. The ideal candidate should have a master's degree with an MBA preferred, along with over 10 years of experience in product management within cloud technologies. The role offers a competitive salary ranging from $192,000 to $240,000 and various employee benefits including health insurance and 401(k) matching.
#J-18808-Ljbffr
A technology firm in San Francisco is seeking a Corporate Security Engineer to lead initiatives ensuring the safety of its corporate environment. The ideal candidate will have over 4 years of experience in Corporate Security, familiarity with Identity and Access Management, and a strong understanding of security concepts. This role offers hybrid working arrangements and a competitive compensation and benefits package, including mental health support and career coaching.
#J-18808-Ljbffr
A leading collaboration platform seeks a Corporate Security Engineer to lead security initiatives and protect the corporate environment. You will collaborate with IT and engineering teams, design security tools, and drive the implementation of Data Loss Prevention strategies. Ideal candidates have 4 years of experience in IT Security, knowledge of security frameworks, and familiarity with various security tools. This role is hybrid, based at the San Francisco office.
#J-18808-Ljbffr
$142k-185k yearly est. 4d ago
Firewall Security Engineer
Novacoast 3.9
Washington, DC jobs
Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check.
Qualifications
To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments.
Responsibilities
In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls.
Requirements
5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments
Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies
Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management
Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs
US Citizenship is required due to the position being with a Federal Client
If this role is aligned with your next career move, submit your resume today for immediate consideration!
Job Type: Contract
Pay: $60.00 - $68.00 per hour
#J-18808-Ljbffr
$60-68 hourly 1d ago
Senior Systems Security Engineer
Nava 4.0
Washington, DC jobs
Be Challenged and Make a Difference
In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
Description of Task to be Performed:
AnaVation is looking for a Sr. Systems Security Engineer to assist the customer with engineering and administration tasks. The ideal candidate will be comfortable engaging with client leadership on a regular basis and interacting with senior level team members.
Responsibilities
Perform hands-on engineering, administration, and securing of multiple operating systems (e.g., Windows, RHEL, Unix variants), and applying DISA STIGs across diverse vendor technologies, including virtualization platforms (VMWare, Hyper-V), cloud environments (AWS, Azure, Google Cloud), and enterprise applications.
Perform system administration tasks to include audit and log management, availability monitoring and remediation, account management and access reviews, and configuration update scheduling and performance.
Contribute to the design and development of secure system architectures, ensuring security is integrated through system and network lifecycles.
Evaluate, implement, and document security architecture solutions, aligning with compliance requirements and organizational mission needs.
Ensure technical compliance with applicable security frameworks, standards, and regulations (e.g., DISA SITGs, NIST 800-53, RMF).
Conducting, configuring, and managing vulnerability scans.
Conducting vulnerability remediations, patching, and system hardening.
Collaborate with ISSOs, Assessors, System Owners, and other stakeholders to implement security controls.
Support security assessments, audits, and accreditation/authorization (ATO) activities.
Document security configurations, engineering solutions, and compliance evidence.
Troubleshoot and resolve security-related technical issues in a timely manner.
Understanding and advising the client regarding critical application data and vulnerability points, coordinating with industry partners to advise the government regarding those security vulnerabilities, and providing recommendations and advice on incident response and recovery plans.
Providing Incident Response (IR) activities including triage, investigation, interviewing, resolving, and reporting on events.
Promoting information security awareness across the program, ensuring security controls and processes are implemented.
Presenting vulnerability analysis to system owners and leadership.
Required Qualifications
5-10 years of experience in information system engineering and configuration management.
5 years of experience in control implementation and secure system engineering or design.
Excellent communication skills.
Hands on experience with:
Security monitoring and evaluation, including audits, assessments, and risk management
SIEM tools (e.g., Splunk)
Vulnerability Scanning tools (e.g., Tenable, Nessus)
EDR tools (e.g., Crowdstrike)
Web App Scanning tools (e.g., Burpsuite, Acunetix)
Active Directory
SANs
VMWare
Networking Devices
Expertise in batch, bash, and/or PowerShell scripting
Able to deliver and present security compliance to a wide range of audiences (i.e., system owners, division leadership).
Experience configuring and operating enterprise storage across networks (SAN)
Server visualization - design solutions and configuration (VMWare, VSphere, Hyper-V, etc)
Experience with:
Linux (RHEL 7/8), Windows Operating Systems, and Oracle/SQL Databases
Agile Methodologies
GRC Tools (e.g., CSAM)
Strong desire to learn, grow and be highly motivated.
Certifications: OS specific certifications, Security +
Personnel assigned to this task shall possess a blend of strong technical skills (networking, operating systems, security tools, programming, encryption) and essential soft skills (problem-solving, critical thinking, communication, collaboration) to design, implement, and maintain an information system's security control implementation.
Desired Qualifications
Knowledgeable on different cloud providers: AWS, Azure, Oracle, GCP
Understanding of servers and security tools
Education: Bachelor's degree in Engineering, Computer Science, or Information Systems
Certifications: CompTIA Server+, Cloud certifications (AWS, Azure, Google), Network+, CCNA, RHCSA, Azure (AZ-104, AZ-204, AZ-500, AZ-305), AWS Solutions Architect
Benefits
Generous cost sharing for medical insurance for the employee and dependents
100% company paid dental insurance for employees and dependents
100% company paid long-term and short-term disability insurance
100% company paid vision insurance for employees and dependents
401k plan with generous match and 100% immediate vesting
Competitive Pay
Generous paid leave and holiday package
Tuition and training reimbursement
Life and AD&D Insurance
About AnaVation
AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team.
If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you!
AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
#J-18808-Ljbffr
$74k-97k yearly est. 2d ago
Senior Systems Security Engineer - Cloud, IR & Compliance Lead
Nava 4.0
Washington, DC jobs
A leading technology solutions provider in Washington, DC is seeking a Senior Systems Security Engineer. This role involves hands-on engineering and securing multiple operating systems, managing vulnerabilities, and ensuring compliance with security frameworks. Ideal candidates will have 5-10 years of experience in system engineering and strong communication skills. The position offers competitive pay and extensive benefits including paid medical and dental insurance.
#J-18808-Ljbffr
$74k-97k yearly est. 2d ago
Principal Enterprise Security Engineer
F5 Networks, Inc. 4.6
Palo Alto, CA jobs
**Location:** Remote **About the Role** We are seeking a seasoned **Principal Enterprise Security Engineer** to design, implement, and manage enterprise-wide security solutions. You'll shape our security strategy across endpoint protection, network, SaaS, IAM, and observability, while aligning to NIST and CIS standards. This role reports to the Head of Enterprise Security, with close collaboration with the CISO, CISO staff, and cross-functional teams. **Key Responsibilities** Experience with Security Service Edge and Software-Defined Perimeter enables ZTNA solutions such as NetSCOPE, Zscaler, and PAN**Qualifications & Experience** **Education:** Bachelor's degree in cybersecurity, computer science, engineering-or equivalent years of corporate security/SOC experience. **Experience:** 7+ years in enterprise or cloud security with hands-on background in IAM, endpoint/network/SaaS security, incident management, vulnerability management, and log analytics. Experience with DoD IL‑4/IL‑5 programs-understand added encryption, personnel restrictions, and control overlays **Technical Skills:** Proficiency with tools like CrowdStrike, Palo Alto, F5, Splunk/ELK, and IAM platforms (Okta, Entra ID, etc.).**Soft Skills:** Strong verbal and written communication; ability to convey complex topics to executives; experience working with stakeholders across multiple time zones. Nice to have experience with F5 BigIP LTM**Personality Traits:** Strategic thinker, collaborative, proactive, with the ability to thrive in fast-moving environments. It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.**Remote**: Primarily work from designated home location but can come into an F5 office to work or travel to an offsite location as needed.
#J-18808-Ljbffr
$133k-172k yearly est. 1d ago
DevOps and Security Engineer
Comrise 4.3
Miami, FL jobs
Job Posting Title DevOps & Security Engineer
We are looking for a DevOps & Security Engineer to maintain and secure our Web3 stablecoin infrastructure. You will be responsible for overall server architecture, security hardening, node maintenance, and CI/CD deployments to ensure 24/7 system reliability for both our off-chain systems and on-chain nodes.
Location: Miami, Florida (temporarily remote, with future hybrid in-office requirements)
Key Responsibilities:
Manage day-to-day operations of company infrastructure including servers, cloud services, and container platforms.
Maintain critical node services including RPC services and oracle components.
Establish security protocols and implement host/network security hardening (WAF, security groups, firewalls)
Oversee service monitoring, log analysis, troubleshooting, and capacity planning.
Build and maintain CI/CD pipelines using GitHub Actions/GitLab CI
Manage Docker and Kubernetes clusters.
Administer certificates, TLS, VPN, and IAM permission systems.
Conduct regular vulnerability scans, coordinate penetration tests, and manage patch updates.
Undertake ad hoc projects as we continue to grow.
Qualifications:
3+ years of experience in DevOps, infrastructure, or security roles.
Strong Linux administration skills with substantial experience in troubleshooting and performance tuning.
Proficiency with Docker/Kubernetes, Nginx, load balancing, and logging systems (ELK/EFK).
Solid understanding of network security concepts: VPC, ACL, WAF, DDoS protection, firewalls, zero-trust.
Experience with at least one major cloud platform (AWS/GCP/Azure).
Scripting skills in Shell, Python, or Go.