Information Security Analyst jobs at ManTech - 163 jobs
Cyber Security Analyst
Mantech 4.5
Information security analyst job at ManTech
MANTECH seeks a motivated, career and customer-oriented **Cyber SecurityAnalyst** to join our team **onsite** in **Herndon, VA or Reston, VA** in support of a high-priority mission at one of our National Intelligence Customers **.** **Responsibilities include but are not limited to:**
+ Responsible for supporting the acceptance of an Authorization to Operate (ATO) for the new Modern Data Platform (MDP) transformation
+ Support the documenting and navigating the customer's accreditation process for ATO
+ Work closely with Security Engineers to ensure security solutions are meeting customer accreditation requirements and following security controls
+ Will use RMF (Risk Management Framework) NIST 800-53, NISPOM, and ICDs for cybersecurity and informationsecurity protocols to drive tasking and ensure compliance
+ ISSE/ISSO tasking in support of documenting and navigating the customer's accreditation process for ATO
**Minimum Qualifications:**
+ Bachelor's degree in a related field OR additional equivalent work experience
+ 5+ years of experience relevant to this position
+ Experience with Software Development Lifecycle, application security, Cloud principles and engineering
+ Expert in System Accreditation process and protocols within the Intelligence Community
+ Experience with NIST 800-53 and implementing Risk Management Framework
+ Understanding of vulnerability assessment tools like Rapid7 or Nessus
+ Knowledge of User Access Monitoring and Identity Access Management
+ Experience creating and reviewing system design documents and workflows
**Preferred Qualifications:**
+ Experience with Terraform, SIEM and AI/ML Governance
+ Knowledge of cross-domain solutions, Zero Trust, and/or IDP (Identity Provider) integration skills
+ DoD 8570-compliant certification (e.g., Security+, CYSA+, CEH, or CISSP)
+ Experience with security tools such as Splunk, CrowdStrike, or Wireshark
+ Familiarity with SCAP tools, STIGs, or automated compliance reporting
+ Knowledge of incident response and digital forensics processes
**Clearance Requirements:**
+ Must have active TS/SCI with Polygraph
**Physical Requirements:**
+ Must be able to remain in a stationary position 50% of the time
+ Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
+ Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
$69k-90k yearly est. 60d+ ago
Looking for a job?
Let Zippia find it for you.
Cyber Threat Hunt Analyst
Mantech International Corporation 4.5
Information security analyst job at ManTech
General information Requisition # R65035 Posting Date 12/29/2025 Security Clearance Required TS/SCI w/ Poly Remote Type Onsite Time Type Full time Description & Requirements Unlock the secrets of intelligence with MANTECH! Join a dynamic team at the forefront of national security, providing advanced solutions to government intelligence agencies. Since 1968, we've been solving the toughest challenges with groundbreaking tech. Explore thrilling projects in Digital Transformation, Cybersecurity, IT, Data Analytics and Software Development. Elevate your career and make a difference. Your adventure begins now-unleash your potential with MANTECH!
MANTECH seeks a skilled and innovative Cyber Threat Hunt Analyst to support our cybersecurity operations in McLean, VA.
As a Cyber Threat Hunter, you will be responsible for proactively detecting, investigating, and mitigating cyber threats within our large enterprise environment. Your primary focus will be on hypothesis-based threat hunting utilizing the HMM-4 approach and leveraging the Mitre ATT&CK framework. You will collaborate closely with cross-functional teams, including endpoint, network, offensive, threat intelligence, cloud, and data science experts, to identify, analyze, and respond to emerging threats.
Responsibilities include but are not limited to:
* Conduct proactive threat hunting using the HMM-4 approach and Mitre ATT&CK framework.
* Develop and refine hypotheses for targeted threat hunts based on threat intelligence, internal data, and analysis of attacker tactics, techniques, and procedures (TTPs).
* Collaborate with internal teams to collect and analyze security event data from various sources, such as logs, alerts, network traffic, and endpoint telemetry.
* Utilize cutting-edge tools and technologies to identify indicators of compromise (IOCs) and anomalies that may indicate potential threats.
* Perform in-depth analysis of identified threats, assess their impact, and recommend appropriate mitigation and response strategies.
* Document investigative objectives and progress throughout threat hunt. Produce detailed reports and provide clear and concise communication on findings, to include root cause analysis and recommendations for remediation and risk mitigation. Propose enhanced detections where possible defensive gaps are identified.
* Stay up to date with the latest cyber threats, attack techniques, and security technologies through continuous learning and knowledge sharing.
Minimum Qualifications
* 3+ years of experience as a cyber securityanalyst, incident responder, or other closely related cyber security discipline.
* Experience and strong proficiency in hypothesis-based hunting (HMM-4), the Mitre ATT&CK matrix, and mapping adversary TTPs to observed activities.
* Experience and proficiency with SIEM platforms, EDR solutions, network traffic analysis tools, and a deep understanding of cloud environments (AWS, Azure, etc.)
* Experience problem-solving in high-pressure situations, with the ability to translate complex technical findings for both technical and non-technical audiences.
* Relevant industry certifications (e.g., GCIH, CTIA, or CThH)
* Experience with and a solid foundation in network protocols and endpoint security.
Preferred Qualifications
* Bachelors degree in electrical engineering, computer engineering, computer science, or related IT discipline
* 4+ years of experience as a cyber securityanalyst, incident responder, or other closely related cyber security discipline.
Clearance Requirements
* An active/current TS/SCI with Polygraph clearance is required.
Physical Requirements
* Must be able to remain in a stationary position 50% of the time.
* Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
* Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
$69k-90k yearly est. Auto-Apply 6d ago
Cyber Incident Response Analyst
Caci International 4.4
Hampton, VA jobs
Job Title: Cyber Incident Response AnalystJob Category: Information TechnologyTime Type: Full time Minimum Clearance Required to Start: TS/SCIEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Local* * *
The Opportunity:
Our client is seeking a Cyber Incident Response Analyst that will join the Cyber Security Incident Response Team on the DCGS Management Center (DMC) program located at Langley AFB that is highly motivated with a strong system administration background. The ideal candidate will be adept in both Windows and Linux environments, possess hands-on experience with ELK/Elastic Stack for threat detection and analysis, and demonstrate the ability to follow established Incident Response (IR) process with minimal supervision. The successful candidate will perform the following responsibilities onsite:
(SHIFT WORK)
Responsibilities
Lead and assist in incident response investigations through all phases (detection, containment, eradication, recovery, lessons learned) to ensure the confidentiality, integrity, and availability of the OA DCGS weapon system.
Utilize ELK/Elastic Stack to perform log analysis, threat detection, and investigations; Create and maintain security incident reports and dashboards.
Escalate and document internal/external security incidents through appropriate ticketing and reporting processing
Design, implement, and maintain cybersecurity SOPs and incident playbooks
Maintain documentation of IR processes and case notes; Ensure security testing and evaluations are completed and properly documented.
Support proactive threat hunting and vulnerability assessments
Analyze and correlate logs from varied data sources to identify patterns and anomalies
Understand network protocols and establish baselines to identify abnormal activity
Perform cyber threat analysis and reporting on information from both internal and external sources and appropriately apply gathered cyber threat intelligence to defending the enterprise network.
Apply knowledge of Zero-Day vulnerabilities and CVEs to incident handling and remediation
Collaborate with cross-functional teams and external stakeholders as needed
Provide guidance for securinginformation systems and support cyber vulnerability penetration assessments.
Operate independently during shifts and respond to security alerts with urgency
Qualifications:
Required:
Top Secret/SCI security clearance.
Bachelor's degree in IT Technology, Computer Science, or related field. Degree may be substituted with additional years of experience.
Minimum 5 years of related experience
DOD 8140 (8570) IAT Level II (Security+ or equivalent).
Strong system administration skills across Windows and Linux platforms
In-depth understanding of the Incident Response lifecycle
Proficiency in using the Elastic Stack (Elasticsearch, Logstash, Kibana)
Familiarity with enterprise security tools and procedures
Strong problem-solving and analytical skills
Comfortable working with limited supervision in a shift-work setting
Availability to work weekends and holidays as part of our 24/7 operations.
Desired:
AF DCGS experience.
Four to seven years of intelligence network communications or Systems Administration experience.
Knowledge of security best practices and standards, including NIST, ISO, and SOC operations.
Experience with AWS and/or other cloud security platforms
Background as an ISSO, including STIG/SCAP and vulnerability management
Familiarity with tools such as Tanium, Trellix, and ACAS
Understanding of network architecture and traffic analysis
Basic scripting skills (Python, PowerShell, Bash)
Elastic certification or SME-level expertise
Effective written and verbal communication skills for documentation and collaboration
-
_________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
_________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
The proposed salary range for this position is:
$75,200-$158,100
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
$75.2k-158.1k yearly Auto-Apply 5d ago
Cyber Incident Response Analyst
Caci International Inc. 4.4
Hampton, VA jobs
Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local * * * The Opportunity: Our client is seeking a Cyber Incident Response Analyst that will join the Cyber Security Incident Response Team on the DCGS Management Center (DMC) program located at Langley AFB that is highly motivated with a strong system administration background. The ideal candidate will be adept in both Windows and Linux environments, possess hands-on experience with ELK/Elastic Stack for threat detection and analysis, and demonstrate the ability to follow established Incident Response (IR) process with minimal supervision. The successful candidate will perform the following responsibilities onsite:
(SHIFT WORK)
Responsibilities
* Lead and assist in incident response investigations through all phases (detection, containment, eradication, recovery, lessons learned) to ensure the confidentiality, integrity, and availability of the OA DCGS weapon system.
* Utilize ELK/Elastic Stack to perform log analysis, threat detection, and investigations; Create and maintain security incident reports and dashboards.
* Escalate and document internal/external security incidents through appropriate ticketing and reporting processing
* Design, implement, and maintain cybersecurity SOPs and incident playbooks
* Maintain documentation of IR processes and case notes; Ensure security testing and evaluations are completed and properly documented.
* Support proactive threat hunting and vulnerability assessments
* Analyze and correlate logs from varied data sources to identify patterns and anomalies
* Understand network protocols and establish baselines to identify abnormal activity
* Perform cyber threat analysis and reporting on information from both internal and external sources and appropriately apply gathered cyber threat intelligence to defending the enterprise network.
* Apply knowledge of Zero-Day vulnerabilities and CVEs to incident handling and remediation
* Collaborate with cross-functional teams and external stakeholders as needed
* Provide guidance for securinginformation systems and support cyber vulnerability penetration assessments.
* Operate independently during shifts and respond to security alerts with urgency
Qualifications:
Required:
* Top Secret/SCI security clearance.
* Bachelor's degree in IT Technology, Computer Science, or related field. Degree may be substituted with additional years of experience.
* Minimum 5 years of related experience
* DOD 8140 (8570) IAT Level II (Security+ or equivalent).
* Strong system administration skills across Windows and Linux platforms
* In-depth understanding of the Incident Response lifecycle
* Proficiency in using the Elastic Stack (Elasticsearch, Logstash, Kibana)
* Familiarity with enterprise security tools and procedures
* Strong problem-solving and analytical skills
* Comfortable working with limited supervision in a shift-work setting
* Availability to work weekends and holidays as part of our 24/7 operations.
Desired:
* AF DCGS experience.
* Four to seven years of intelligence network communications or Systems Administration experience.
* Knowledge of security best practices and standards, including NIST, ISO, and SOC operations.
* Experience with AWS and/or other cloud security platforms
* Background as an ISSO, including STIG/SCAP and vulnerability management
* Familiarity with tools such as Tanium, Trellix, and ACAS
* Understanding of network architecture and traffic analysis
* Basic scripting skills (Python, PowerShell, Bash)
* Elastic certification or SME-level expertise
* Effective written and verbal communication skills for documentation and collaboration
* ________________________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
Learn more about CACI here.
________________________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here.
The proposed salary range for this position is:
$75,200-$158,100
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
$75.2k-158.1k yearly 27d ago
Cyber Incident Response Analyst
Caci International 4.4
Hampton, VA jobs
Job Title: Cyber Incident Response Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local * * * **The Opportunity:** Our client is seeking a Cyber Incident Response Analyst that will join the Cyber Security Incident Response Team on the DCGS Management Center (DMC) program located at Langley AFB that is highly motivated with a strong system administration background. The ideal candidate will be adept in both Windows and Linux environments, possess hands-on experience with ELK/Elastic Stack for threat detection and analysis, and demonstrate the ability to follow established Incident Response (IR) process with minimal supervision. The successful candidate will perform the following responsibilities onsite:
**(SHIFT WORK)**
**Responsibilities**
+ Lead and assist in incident response investigations through all phases (detection, containment, eradication, recovery, lessons learned) to ensure the confidentiality, integrity, and availability of the OA DCGS weapon system.
+ Utilize ELK/Elastic Stack to perform log analysis, threat detection, and investigations; Create and maintain security incident reports and dashboards.
+ Escalate and document internal/external security incidents through appropriate ticketing and reporting processing
+ Design, implement, and maintain cybersecurity SOPs and incident playbooks
+ Maintain documentation of IR processes and case notes; Ensure security testing and evaluations are completed and properly documented.
+ Support proactive threat hunting and vulnerability assessments
+ Analyze and correlate logs from varied data sources to identify patterns and anomalies
+ Understand network protocols and establish baselines to identify abnormal activity
+ Perform cyber threat analysis and reporting on information from both internal and external sources and appropriately apply gathered cyber threat intelligence to defending the enterprise network.
+ Apply knowledge of Zero-Day vulnerabilities and CVEs to incident handling and remediation
+ Collaborate with cross-functional teams and external stakeholders as needed
+ Provide guidance for securinginformation systems and support cyber vulnerability penetration assessments.
+ Operate independently during shifts and respond to security alerts with urgency
**Qualifications:**
**_Required:_**
+ Top Secret/SCI security clearance.
+ Bachelor's degree in IT Technology, Computer Science, or related field. Degree may be substituted with additional years of experience.
+ Minimum 5 years of related experience
+ DOD 8140 (8570) IAT Level II (Security+ or equivalent).
+ Strong system administration skills across Windows and Linux platforms
+ In-depth understanding of the Incident Response lifecycle
+ Proficiency in using the Elastic Stack (Elasticsearch, Logstash, Kibana)
+ Familiarity with enterprise security tools and procedures
+ Strong problem-solving and analytical skills
+ Comfortable working with limited supervision in a shift-work setting
+ Availability to work weekends and holidays as part of our 24/7 operations.
**_Desired:_**
+ AF DCGS experience.
+ Four to seven years of intelligence network communications or Systems Administration experience.
+ Knowledge of security best practices and standards, including NIST, ISO, and SOC operations.
+ Experience with AWS and/or other cloud security platforms
+ Background as an ISSO, including STIG/SCAP and vulnerability management
+ Familiarity with tools such as Tanium, Trellix, and ACAS
+ Understanding of network architecture and traffic analysis
+ Basic scripting skills (Python, PowerShell, Bash)
+ Elastic certification or SME-level expertise
+ Effective written and verbal communication skills for documentation and collaboration
-
**_________________________________________________________________________**
**What You Can Expect:**
**A culture of integrity.**
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
**An environment of trust.**
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
**A focus on continuous growth.**
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
**Your potential is limitless.** So is ours.
**_________________________________________________________________________**
**Pay Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
The proposed salary range for this position is:
$75,200-$158,100
_CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
$75.2k-158.1k yearly 27d ago
Cyber Security Analyst
Caci International 4.4
Chantilly, VA jobs
Job Title: Cyber SecurityAnalystJob Category: EngineeringTime Type: Full time Minimum Clearance Required to Start: TS/SCI with PolygraphEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Outside Continental US* * *
The Opportunity:
CACI is seeking a SecurityAnalyst to conduct technical analysis to drive operations, including but not limited to: technical development, work with various partners, network analysis to understand target networks, developing network maps, profiling network security posture and technical overwatch. In this role you will leverage knowledge, provide technical analysis, conduct network analysis and reconnaissance, document analysis and code in accordance with the industry and client's best practices and leverage applications and scripting capabilities. You will also be able to partner with and conduct briefings across the client's organization and their components in support of technical analysis and operational goals.
Be part of a department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and between programs with peers who are dedicated to advancing national security. Participate in fun team outings and team building events where you get to engage with your co-workers and expand your career network. We are a fun, engaging environment with a management team focused on growing your career and making you a part of our future. We offer bonus compensation plans that demonstrate you being appreciated for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. You can learn more about our program by accessing the landing page: VORPAL Jobs .
Responsibilities:
Solve cyber problems, identify and develop methodologies to advance cyber operations
Provide technical development and analysis
Network analysis to understand target networks and developing network maps
Profiling network security posture and technical overwatch
Conduct network analysis and reconnaissance
Document analysis and code in accordance with industry and client's best practices
Leverage applications and scripting capabilities
Conduct briefings across the client's organization
Qualifications:
Required
:
Active Top Secret/Sensitive Compartmented Information (TS/SCI) clearance, with polygraph.
Bachelor's degree in a related scientific or technical discipline
Approximately 7+ years of related work experience
Working knowledge of cyber operations and/or penetration testing
Ability to conduct network forensics and internet traffic characterization
Strong analytic and critical thinking skills, including the ability to think strategically
Ability to effectively express complex ideas and insights verbally and in writing to a variety of audiences, both technical and non-technical
Knowledge of analytic tools
Scripting (e.g., python, bash)
Comfortable with Windows and Linux command line tools (PowerShell, bash, etc.)
Knowledge of IT defensive best practices
Ability to pay attention to details, ensuring accuracy in documentation and data
Can handle working multiple projects at once with minimal guidance
Network analysis skills (understanding of TCP/IP packet analysis using GUI and command-line tools)
Ability to create logical network diagrams from various, often incomplete data sources (such as network device configurations, endpoint survey date and other collected information)
Understanding of TCP/IP routing
Ability to draw detailed diagrams and write clear documentation
Desired
:
Master's degree in a related scientific or technical discipline
Self-motivated, creative problem solver
Manipulating and parsing files of various structured and unstructured formats and extracting relevant technical data
Experience leveraging advanced analytical and partnering with data scientists to answer technical questions
-
_________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
_________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
The proposed salary range for this position is:
$113,200 - $237,800
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
$69k-91k yearly est. Auto-Apply 5d ago
Cyber Threat Analyst
Caci International 4.4
Chantilly, VA jobs
Job Title: Cyber Threat AnalystJob Category: EngineeringTime Type: Full time Minimum Clearance Required to Start: TS/SCI with PolygraphEmployee Type: RegularPercentage of Travel Required:Type of Travel: Local* * *The Opportunity:If chosen, YOU will get to work with an agile, fast paced team focused on defending our client's global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will challenged to dig into various platforms to discover data anomalies. This person should have a wide range knowledge and skills, such as computer forensics/mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity to work on highly visible projects that directly make an impact to the Nations mission. YOU will be a motivated, passionate leader with the ability to drive our long-term strategic goals with daily tactical objectives. YOU will be a critical component in taking complex problems and delivering solutions that are simple yet elegant.Responsibilities:
Use GOTS, commercial, and/or open source data exploitation and visualization tools for analysis, preferably broad in scope.
Analyze data sets (both small and large) for trends and patterns.
Produce informational, contextual, and/or intelligence products that embody and explain findings for a variety of audiences.
Script and/or programming experience (e.g. Python, Bash, R, Spark, C#, Java.)
Work with intrusion sets TTPs and the ability to apply knowledge to future analysis.
Work with social media platforms.
Be part of a department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and between programs with peers who are dedicated to advancing national security. Participate in fun team outings and team building events where you get to engage with your co-workers and expand your career network. We are a fun, engaging environment with a management team focused on growing your career and making you a part of our future. We offer bonus compensation plans that demonstrate you being appreciated for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. To learn more, you can visit our program's landing page: VORPAL Jobs .Qualifications:
Required:
Active TS/SCI with required polygraph clearance.
Bachelors degree.
Minimum of 7 years of experience in technical analysis, digital forensics, technical targeting, or similar relevant technical experience.
Fundamental understanding of networking, with basic knowledge of Linux and Windows operating systems
Comfortable with Windows and Linux command line tools (PowerShell)
Proficient in data exploitation and data analysis.
Proficient in analyzing log files from web hosting services and other technical infrastructure.
Proficient in analyzing and exploiting RAW PCAP collections.
Ability to articulate technical information to non-technical audiences.
Strong analytical and critical thinking skills, ability to think strategically.
Ability to express complex ideas and insights verbally and in writing to a variety of audiences.
Ability to remain open minded and change opinions based on new information and requirements.
Ability to pay attention to details, ensuring accuracy in documentation.
Knowledge of IT defensive best practices.
Demonstrated experience employing visualization tools to display network graphs, workflows using COTS products or custom scripts
This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.
_________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
_________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
The proposed salary range for this position is:
$113,200 - $237,800
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
$69k-91k yearly est. Auto-Apply 5d ago
Cyber Threat Analyst
Caci International 4.4
Chantilly, VA jobs
Job Title: Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Type of Travel: Local * * * **The Opportunity:** **If chosen, YOU will get to work with an agile, fast paced team focused on defending our client's global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will challenged to dig into various platforms to discover data anomalies. This person should have a wide range knowledge and skills, such as computer forensics/mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity to work on highly visible projects that directly make an impact to the Nations mission. YOU will be a motivated, passionate leader with the ability to drive our long-term strategic goals with daily tactical objectives. YOU will be a critical component in taking complex problems and delivering solutions that are simple yet elegant.**
**Responsibilities:**
**Use GOTS, commercial, and/or open source data exploitation and visualization tools for analysis, preferably broad in scope.**
**Analyze data sets (both small and large) for trends and patterns.**
**Produce informational, contextual, and/or intelligence products that embody and explain findings for a variety of audiences.**
**Script and/or programming experience (e.g. Python, Bash, R, Spark, C#, Java.)**
**Work with intrusion sets TTPs and the ability to apply knowledge to future analysis.**
**Work with social media platforms.**
**Be part of a department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and between programs with peers who are dedicated to advancing national security. Participate in fun team outings and team building events where you get to engage with your co-workers and expand your career network. We are a fun, engaging environment with a management team focused on growing your career and making you a part of our future. We offer bonus compensation plans that demonstrate you being appreciated for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. To learn more, you can visit our program's landing page: VORPAL Jobs (******************************** .**
**Qualifications:**
**_Required:_**
**Active TS/SCI with required polygraph clearance.**
**Bachelors degree.**
**Minimum of 7 years of experience in technical analysis, digital forensics, technical targeting, or similar relevant technical experience.**
**Fundamental understanding of networking, with basic knowledge of Linux and Windows operating systems**
**Comfortable with Windows and Linux command line tools (PowerShell)**
**Proficient in data exploitation and data analysis.**
**Proficient in analyzing log files from web hosting services and other technical infrastructure.**
**Proficient in analyzing and exploiting RAW PCAP collections.**
**Ability to articulate technical information to non-technical audiences.**
**Strong analytical and critical thinking skills, ability to think strategically.**
**Ability to express complex ideas and insights verbally and in writing to a variety of audiences.**
**Ability to remain open minded and change opinions based on new information and requirements.**
**Ability to pay attention to details, ensuring accuracy in documentation.**
**Knowledge of IT defensive best practices.**
**Demonstrated experience employing visualization tools to display network graphs, workflows using COTS products or custom scripts**
This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.
**_________________________________________________________________________**
**What You Can Expect:**
**A culture of integrity.**
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
**An environment of trust.**
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
**A focus on continuous growth.**
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
**Your potential is limitless.** So is ours.
**_________________________________________________________________________**
**Pay Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
The proposed salary range for this position is:
$113,200 - $237,800
_CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
$69k-91k yearly est. 60d+ ago
Cyber Security Analyst / ISSO
Scientific Research Corporation 4.5
Reston, VA jobs
The Cyber SecurityAnalyst / Information System Security Officer (ISSO) will be a member of a small team focusing on developing services and applications in a DevSecOps based environment in support of the Defense Intelligence Agency (DIA). Engineering will be performed on Joint Worldwide Intelligence Communications System (JWICS) and National Security Agency Network (NSANet) connected systems. As a Cyber SecurityAnalyst/ ISSO, this position is responsible for supporting the Information System Owner to complete security assessment, continuous monitoring, and configuration management responsibilities. Responsibilities include, but are not limited to:
* Developing and updating assessment and authorization documentation (Body of Evidence) for management and continuous monitoring of information systems
* Performing ongoing compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Secure Content Automation Protocol (SCAP), and Trellis Virus Scan Enterprise reviewing, documenting, and maintaining all results
* Verifying patches and virus definitions to the systems using existing automated tools
* Adhering to pre-defined configuration management and change management policies and procedures for authorizing software prior to its implementation on systems
* Performing security audits using to track multiple events including any signs of inappropriate or unusual activity, intrusion events, data transfers, etc.
* Performing security assessments of DoD Family of Systems in accordance with National Institute of Standards and Technology (NIST), Navy, and NAVINTEL IA guidance, working with system engineers to take corrective action to resolve identified problems
* Becoming a NAVINTEL IA ICOP Trusted Agent within 6-months
* Performing Site Based Security Assessments (SBSAs) of systems and recommending authorization to the Designated Authorizing Official (DAO) as a certified Trusted Agent
* Reporting security incidents in accordance with the Command Incident Response Plan
* Ensuring systems are operated, used, maintained, and disposed of in accordance with all applicable security policies and practices
#LI-AM1
Requirements
* Must possess an active Top Secret, SCI eligible clearance
* Ability to obtain CI Poly clearance
* 5 years of cybersecurity experience
* Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months, CE/OS certificate may include Windows or Linux
* Experience with System Security Plans (SSPs), eMASS and/or Xacta, POA&Ms, ACAS/Nessus, SCAP, and DISA STIGs
* Experience with Risk Management Framework processes
* Experience working within a Zero Trust (ZT) Environment
* Experience conducting ISSO functions for containers and Virtual Machines (VMs)
* Have developed communication skills and the ability to express thoughts and ideas clearly and concisely
* Must be a team player, dedicated to program support, capable of multitasking and working several complex and diverse tasks with simultaneous or near simultaneous deadlines
* Be a self-starter who is accountable and requires minimal direction and supervision
* Be open to new and innovative ideas
* Must be able to be appointed ISSO for NCS systems within 6-months of employment
Desired Skills
* Bachelor's degree in relative technical discipline
* Active TS/SCI with CI Poly
* Extensive training or experience with Windows based Information Systems standards with a working knowledge of networking devices
* Knowledge of Container Security and best practices securing containerized applications
* Knowledge of configuration of various SQL databases: MS SQL, PostgreSQL, MongoDB, MariaDB, MySQL, Elasticsearch
* Knowledge of Web Servers: Apache Web Server, Apache Tomcat, Red Hat JBOSS, nginx, MS IIS
* Knowledge of data flows and the ability to work up readable network topology and data flow diagrams
* Experience with NAVINTEL IA Enterprise Services (Continuous Monitoring)
* Experience with the following systems/platforms/tools: HBSS, ACAS/Nessus, and SPLUNK
Clearance Information
SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT. THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL with CI POLY ELIGIBILITY
Travel Requirements
* 20% annual travel
About Us
Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.
SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
EEO
Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law.
Scientific Research Corporation endeavors to make ************** accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact *************** for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
$68k-87k yearly est. Auto-Apply 14d ago
Cyber Analyst (Mid-Level)
Perspecta 4.5
Hampton, VA jobs
Responsibilities
We are seeking a highly skilled and experienced Cyber Analyst to join our team at Joint Base Langley-Eustis (JBLE), supporting the 480th ISR Wing (480 ISRW). The Cyber Analyst will play a critical role in cryptologic support to the 480 ISRW's mission of providing timely all-domain battlespace awareness and ISR-centric problem-solving for theater air components. This position requires expertise in cyber threat analysis, cryptologic support, and the ability to work in a fast-paced, mission-driven environment.
Key Responsibilities:
Conduct cyber threat analysis aligned with 480 ISRW Analysis & Exploitation Team (AET) mission requirements to monitor the disposition of adversary forces, provide actionable assessments for air component leadership and warfighters.
Collaborate with cross-functional teams to integrate cyber domain analysis into target development and operational planning.
Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems.
Ensure compliance with all security protocols, policies, and regulatory requirements.
Some travel may be required (
Qualifications
Required Qualifications:
Experience Level: At least 6 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years.
Required Education: Bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education or have associate's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 4 years of related experience, for a total of 10 years, as a substitute to the bachelor's
degree.
Technical Expertise:
Expertise in cryptologic support, cybersecurity operations, and proficiency in system administration.
Familiarity with cyber defense tools, network security, and incident response methodologies.
Strong understanding of cyber threat analysis and mitigation strategies.
Skills:
Exceptional analytical and problem-solving skills.
Strong written and verbal communication skills for producing reports and collaborating with teams.
Ability to work effectively in a high-pressure, mission-critical environment.
Security Clearance: Active Top Secret/SCI clearance is required.
This role may require CI Polygraph eligibility.
Preferred Qualifications:
Experience supporting 480 ISRW or similar military organization.
Knowledge of cryptologic systems, tools, and methodologies.
Familiarity with Air Force cybersecurity policies and procedures.
Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.
DOD 8/140 Compliance based on functional role: Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification.
Active CI Polygraph.
Why Join Us?
Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations.
Work in a dynamic and collaborative environment at Joint Base Langley-Eustis, a hub for Air Force intelligence and cyber defense excellence.
Access to professional development opportunities and career growth within the intelligence and cybersecurity community.
#AFACC
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $86,000 - $138,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$86k-138k yearly Auto-Apply 30d ago
Security Specialist Sr - C
Telos Corporation 4.6
Virginia Beach, VA jobs
The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This position is contingent on contract award.
This position will be based at Virginia Beach, VA.
Responsibilities:
The Information System Security Specialist II provides cybersecurity compliance and accreditation support for Navy information systems under the Naval Surface Warfare Center Dahlgren Division (NSWCDD). The role ensures information systems meet all DoD cybersecurity and Risk Management Framework (RMF) requirements throughout the system lifecycle - from design and implementation through sustainment and re-accreditation.
The position supports both afloat and shore-based systems, working closely with engineers, system administrators, and program managers to identify vulnerabilities, develop mitigation strategies, and maintain Authorization to Operate (ATO) compliance.
Key Responsibilities
Accreditation & Compliance Support
* Develop, maintain, and update RMF documentation including Security Plans (SP), POA&Ms, Risk Assessments, and Continuous Monitoring Strategies.
* Support preparation, submission, and tracking of Assessment and Authorization (A&A) packages using tools such as eMASS.
* Review and apply DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to ensure systems meet DoD compliance standards.
* Participate in A&A and cybersecurity readiness reviews, providing technical recommendations to system owners.
* Ensure all assigned systems maintain an active Authorization to Operate (ATO) and adhere to DoD, NAVSEA, and SECNAV cybersecurity policies.
Cybersecurity Engineering and Risk Management
* Conduct risk assessments and vulnerability analyses using automated scanning and compliance tools (e.g., ACAS, STIG Viewer, SCAP, Security Content Automation Protocol).
* Identify, document, and assist in remediation of system vulnerabilities and security incidents.
* Contribute to cybersecurity architecture planning, ensuring implementation of secure configurations, least privilege, and zero-trust principles.
* Review and maintain Interconnection Security Agreements (ISAs) and other boundary documentation to ensure continuous authorization alignment.
* Support implementation of Defense-in-Depth and supply chain risk management strategies.
Operations & Maintenance
* Provide ongoing cybersecurity monitoring and auditing support for operational systems.
* Track and report system vulnerabilities in accordance with Navy's Vulnerability Remediation Asset Management (VRAM) system.
* Coordinate with system owners and administrators to ensure timely implementation of IAVAs, security patches, and configuration updates.
* Assist in incident response procedures and forensic investigations, documenting findings and mitigation actions
Job Requirements
Qualifications:
* Education: Bachelor's degree in Cybersecurity, Information Systems, Information Technology, Computer Science, or related discipline.
* Experience: Minimum 5 years of professional experience in information system security, accreditation, or RMF compliance roles (3 years acceptable with advanced degree).
Certifications:
* Must meet DoD 8570.01-M IAM Level II certification requirements (e.g., CAP, CISM, CISSP [Associate], GSLC, or CASP+ CE).
* Must comply with DFARS ************ Information Assurance Contractor Training and Certification.
Clearance: Active SECRET security clearance; ability to obtain and maintain TS/SCI as required.
Preferred Qualifications
* Hands-on experience with Navy or DoD RMF processes and A&A toolsets (eMASS, XACTA, VRAM, ACAS).
* Working knowledge of NIST SP 800-37, 800-53, 800-171, and CNSSI 1253 security control frameworks.
* Experience developing and maintaining security documentation and policy artifacts.
* Familiarity with network, system, and software engineering concepts relevant to DoD environments.
* Ability to brief technical content to government leadership and participate in CCB/IAWG meetings.
Desired Attributes
* Strong attention to detail and documentation discipline.
* Ability to work independently and collaboratively in a multi-contractor team environment.
* Analytical mindset with the ability to interpret complex cybersecurity compliance requirements and translate them into actionable tasks.
* Effective written and verbal communication skills for technical and executive audiences.
The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship.
Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment.
Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future.
Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: **********************************
Telos Corporation is an EEO/AA employer.
Job Type
Full-Time
Location
Virginia Beach, VA 23461 US (Primary)
Telos offers an excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos and its subsidiaries are an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
$100k-134k yearly est. 60d+ ago
Security Specialist Sr - C
Telos 4.6
Virginia Beach, VA jobs
The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This position is contingent on contract award.
This position will be based at Virginia Beach, VA.
Responsibilities:
The Information System Security Specialist II provides cybersecurity compliance and accreditation support for Navy information systems under the Naval Surface Warfare Center Dahlgren Division (NSWCDD). The role ensures information systems meet all DoD cybersecurity and Risk Management Framework (RMF) requirements throughout the system lifecycle - from design and implementation through sustainment and re-accreditation.
The position supports both afloat and shore-based systems, working closely with engineers, system administrators, and program managers to identify vulnerabilities, develop mitigation strategies, and maintain Authorization to Operate (ATO) compliance.
Key Responsibilities
Accreditation & Compliance Support
• Develop, maintain, and update RMF documentation including Security Plans (SP), POA&Ms, Risk Assessments, and Continuous Monitoring Strategies.
• Support preparation, submission, and tracking of Assessment and Authorization (A&A) packages using tools such as eMASS.
• Review and apply DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to ensure systems meet DoD compliance standards.
• Participate in A&A and cybersecurity readiness reviews, providing technical recommendations to system owners.
• Ensure all assigned systems maintain an active Authorization to Operate (ATO) and adhere to DoD, NAVSEA, and SECNAV cybersecurity policies.
Cybersecurity Engineering and Risk Management
• Conduct risk assessments and vulnerability analyses using automated scanning and compliance tools (e.g., ACAS, STIG Viewer, SCAP, Security Content Automation Protocol).
• Identify, document, and assist in remediation of system vulnerabilities and security incidents.
• Contribute to cybersecurity architecture planning, ensuring implementation of secure configurations, least privilege, and zero-trust principles.
• Review and maintain Interconnection Security Agreements (ISAs) and other boundary documentation to ensure continuous authorization alignment.
• Support implementation of Defense-in-Depth and supply chain risk management strategies.
Operations & Maintenance
• Provide ongoing cybersecurity monitoring and auditing support for operational systems.
• Track and report system vulnerabilities in accordance with Navy's Vulnerability Remediation Asset Management (VRAM) system.
• Coordinate with system owners and administrators to ensure timely implementation of IAVAs, security patches, and configuration updates.
• Assist in incident response procedures and forensic investigations, documenting findings and mitigation actions
Requirements
Qualifications:
Education: Bachelor's degree in Cybersecurity, Information Systems, Information Technology, Computer Science, or related discipline.
Experience: Minimum 5 years of professional experience in information system security, accreditation, or RMF compliance roles (3 years acceptable with advanced degree).
Certifications:
Must meet DoD 8570.01-M IAM Level II certification requirements (e.g., CAP, CISM, CISSP [Associate], GSLC, or CASP+ CE).
Must comply with DFARS ************ Information Assurance Contractor Training and Certification.
Clearance: Active SECRET security clearance; ability to obtain and maintain TS/SCI as required.
Preferred Qualifications
Hands-on experience with Navy or DoD RMF processes and A&A toolsets (eMASS, XACTA, VRAM, ACAS).
Working knowledge of NIST SP 800-37, 800-53, 800-171, and CNSSI 1253 security control frameworks.
Experience developing and maintaining security documentation and policy artifacts.
Familiarity with network, system, and software engineering concepts relevant to DoD environments.
Ability to brief technical content to government leadership and participate in CCB/IAWG meetings.
Desired Attributes
Strong attention to detail and documentation discipline.
Ability to work independently and collaboratively in a multi-contractor team environment.
Analytical mindset with the ability to interpret complex cybersecurity compliance requirements and translate them into actionable tasks.
Effective written and verbal communication skills for technical and executive audiences.
The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship.
Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment.
Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future.
Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: **********************************
Telos Corporation is an EEO/AA employer.
$100k-134k yearly est. 60d+ ago
Cyber Targeting Analyst
Perspecta 4.5
Chantilly, VA jobs
Responsibilities
The Cyber Analyst shall provide cyber and technology expertise to advance the offices cyber related capabilities and help drive cyber related strategies. Analyst will perform cyber research and analysis as a member of a government and contractor team that conducts cyber, signal, imagery, and multi-source intelligence analysis. Analyst will leverage cyber tools to provide analysis of threats, patterns, and events to enable operational analysts to understand, manage, and respond to potential threats. Analyst will monitor multiple types of activities to identify and track changes related to topics of interest. Analyst will produce high-quality reports, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Qualifications
Required:
Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA
Active Top Secret/SCI with Poly
Bachelor's degree in a relevant technical field, or 4 additional years of relevant technical experience may be accepted as equivalent
6+ years of cyber analysis or cyber targeting experience
Skilled in Technical Analysis and exploitation of Data Sets
Prior experience leveraging telecommunications tools for analysis
Knowledgeable on telecommunications topics of interest to the IC
Digital Network Analysis experience
Desired:
Proven ability to effectively communicate and collaborate with multiple offices/organizations with a team-focused mentality
Skilled at IC report writing and using IC tools/databases
Experience leveraging Python, Anaconda, Splunk, and/or SQL to support operations
Experience with Tableau, Jupyter Notebooks, and/or Virus Total
Experience with Cloud Service Providers (AWS, Microsoft, Oracle, and/or Google) in classified environments
Industry certification(s) - CISSP, CCNA, CEH, etc.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$63k-80k yearly est. Auto-Apply 20d ago
Cyber Analyst (Junior)
Perspecta 4.5
Hampton, VA jobs
Responsibilities
We are seeking a skilled and motivated Cyber Analyst to join our team at Joint Base Langley-Eustis (JBLE), supporting the 363rd ISR Wing (363 ISRW). The Cyber Analyst will play a critical role in cryptologic support to the 363 ISRW's analysis & targeting mission. This position requires cyber threat analytical skills or cryptologic support experience, and the ability to work in a fast-paced, mission-driven environment.
Key Responsibilities:
Conduct cyber threat analysis aligned with 363 ISRW analytical mission requirements and intermediate target development.
Provide non-kinetic analysis to include Cyber, EW and Technical ELINT to support 363 ISRW requirements and associated mission partners.
Collaborate with cross-functional teams to integrate cyber analysis into target development and operational planning.
Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems.
Ensure compliance with all security protocols, policies, and regulatory requirements.
Some travel may be required (
Qualifications
Required Qualifications:
Experience Level: Minimum 3 years of experience conducting analysis relevant to the specific labor category, with at least a portion of the experience within the last 2 years.
Required Education: Associate's degree from a college or university accredited by an agency recognized by the U.S. Department of Education. An additional 2 years of experience in the specific labor category, for a total of 5 years of experience in the specific labor category, may be substituted for an associate's degree
Technical Expertise:
Familiarity in cryptologic support and cybersecurity operations.
Basic understanding of cyber threat analysis and mitigation strategies.
Skills:
Exceptional analytical and problem-solving skills.
Strong written and verbal communication skills for producing reports and collaborating with teams.
Ability to work effectively in a high-pressure, mission-critical environment.
Security Clearance: Active Top Secret/SCI clearance is required.
This role may require CI Polygraph Eligibility.
Preferred Qualifications:
Experience supporting 363 ISRW or similar ISR organizations.
Knowledge of cryptologic systems, tools, and methodologies.
Familiarity with Air Force cybersecurity policies and procedures.
Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.
DOD 8140 Compliance based on functional role: Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification.
Active CI Polygraph.
Why Join Us?
Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations.
Work in a dynamic and collaborative environment at Joint Base Langley-Eustis, a hub for Air Force intelligence and cyber defense excellence.
Access to professional development opportunities and career growth within the intelligence and cybersecurity community.
#AFACC
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $66,000 - $106,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$66k-106k yearly Auto-Apply 30d ago
Cyber Analyst, SME
Perspecta 4.5
Hampton, VA jobs
Responsibilities
We are seeking a highly skilled and experienced Cyber Analyst to join our team at Joint Base Langley-Eustis (JBLE), supporting the Air Combat Command (ACC) Intelligence Directorate (A2). The Cyber Analyst will play a critical role in cryptologic support, cybersecurity operations, and system administration to protect mission-critical systems and networks. This position requires expertise in cyber threat analysis, cryptologic operations, and the ability to work in a fast-paced, mission-driven environment.
Key Responsibilities:
Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems.
Conduct cyber threat analysis to identify vulnerabilities, assess risks, and recommend threat mitigation.
Support the development and implementation of cyber defense measures to protect against emerging threats.
Monitor, analyze, and respond to cyber incidents, ensuring timely resolution and reporting.
Provide system administration support, including configuration, maintenance, and troubleshooting of enterprise and local network devices.
Collaborate with cross-functional teams to integrate cybersecurity measures into ISR operations.
Ensure compliance with all security protocols, policies, and regulatory requirements.
Travel may be required (Up to 15%)
Qualifications
Required Qualifications:
Experience Level: Masters Degree and 15 plus years or have a bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 5 years of related expert experience, for a total of 20 years, as a substitute to the master's degree.
Technical Expertise:
Expertise in cryptologic support, cybersecurity operations, and proficiency in system administration.
Familiarity with cyber defense tools, network security, and incident response methodologies.
Strong understanding of cyber threat analysis and mitigation strategies.
Skills:
Exceptional analytical and problem-solving skills.
Strong written and verbal communication skills for producing reports and collaborating with teams.
Ability to work effectively in a high-pressure, mission-critical environment.
Security Clearance: Active Top Secret/SCI clearance is required.
This role may require CI Polygraph eligibility.
Preferred Qualifications:
Experience supporting Air Force Major Command (MAJCOM) Intelligence Directorate or similar military organization.
Knowledge of cryptologic systems, tools, and methodologies.
Familiarity with Air Force cybersecurity policies and procedures.
Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.
DOD 8/140 Compliance based on functional role: Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification.
Active CI Polygraph.
Why Join Us?
Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations.
Work in a dynamic and collaborative environment at Joint Base Langley-Eustis, a hub for Air Force intelligence and cyber defense excellence.
Access to professional development opportunities and career growth within the intelligence and cybersecurity community.
#AFACC
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$63k-81k yearly est. Auto-Apply 35d ago
Information Systems Security Officer (ISSO) - JB
Telos 4.6
Reston, VA jobs
The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This position will be based at Reston, VA
Job Description:
As an ISSO on our program, you'll detect, evaluate, and document the security configuration of developmental and operational tools and security impacts, and make improvement recommendations.
Coordinate work with in-house teams, subcontractors, and vendors to identify the right mix of tools and techniques to translate your customers' IT needs and future goals into a plan that will enable secure and effective solutions.
As an ISSO on our team, you'll advise the client, leading the discovery of their cyber risks, understanding applicable policies, and developing a mitigation plan.
You'll oversee the analysis of technical, environmental, and personnel details from technical subject matter experts and engineers as your team reviews the entire threat landscape. Then, you'll guide your client through a plan of action with presentations, whitepapers, and milestones.
Your client will rely on you to translate security concepts, so they can make the best decisions to secure their mission-critical systems.
Requirements
Basic Qualifications:
3+ years of experience as an Information System Security Officer (ISSO) or Information System SecurityAnalyst (ISSA)
Experience conducting tools assessments and configuration analysis against best practices, vendor specifications, and government security guidelines and requirements
Experience with the implementation, oversight, and maintenance of the security configuration, practices, and procedures for systems
Experience with implementing controls from NIST 800-53, FedRAMP, ICD 503, RMF, and DoD Information Levels, including applying them to the design and implementation of information technology solutions to achieve an authorization to operate (ATO)
Experience with eMASS or Xacta IA Manager
Ability to perform risk analysis
Active TS/SCI clearance; willingness to take a polygraph exam
Associate's degree and 5+ years of experience supporting IT projects and activities, Bachelor's degree and 3+ years of experience supporting IT projects and activities, or Master's degree and 1+ years of experience supporting IT projects and activities
DoD 8570 IAT Level II Certification, including CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP Certification
Must obtain a DoD 8570.01-M CSSP Infrastructure Support Certification, including CEH, CySA+, GICSP, SSCP, CHFI, CFR, Cloud+, or CND certification prior to start date on the contract
Additional Qualifications:
Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tool
Experience assessing configuration changes, such as new COTS tools or web application upgrades, to system security boundary
Experience drafting tool implementation CONOPS and reviewing tool or capabilities topologies, CONOPS, and vulnerability scans to assess risk
Experience with cyber-related tools such as Ansible, Terraform, Splunk, or STIG Viewer
Knowledge of cloud-native security tools, including HBSS
Knowledge of Zero Trust principles and concepts
Ability to plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks
Ability to work within a collaborative team and a fast-paced dynamic environment
Possession of excellent written, organizational, presentation, and verbal communication skills
AWS, Azure, or GCP Certification
The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship.
Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment.
Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future.
Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: **********************************
Telos Corporation is an EEO/AA employer.
$73k-102k yearly est. 37d ago
Information System Security Officer
Telos Corporation 4.6
Tysons Corner, VA jobs
The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This position will be based at Tysons, VA
Responsibilities:
* Perform duties in tasks in support of maintaining System Security Plans (SSPs), Risk Assessment Reports (RARs), and Plans of Action and Milestones (POA&Ms).
* Perform regular self-assessments and internal audits to ensure the system maintains its Authorization to Operate (ATO).
* Maintain and update supporting Governance, Risk, and Compliance (GRC) assets in the customer's GRC tools.
* Coordinate with technical teams to track the remediation of vulnerabilities identified in scans (e.g., Nessus, ACAS).
* Help develop and deliver security awareness materials to staff, ensuring a culture of security throughout the organization.
* Work with various stakeholders to ensure the systems meet their continuous monitoring requirements and metrics.
* Identify "bottlenecks" in our current security workflows and propose automated or streamlined solutions.
Job Requirements
Qualifications:
* This position requires an active TS/SCI with a Full Scope Polygraph clearance.
* Bachelor's degree in computer science, engineering, information assurance, or a related discipline and has at least 5 or more years of experience in an information technology role. Additional experience may be substituted for a degree.
* Is currently DOD 8140 certified or possesses certifications to be eligible for DOD 8140 certification.
* Experience with cloud service providers such as AWS, Azure, GCP, etc.
* Experience in information assurance and or governance risk and compliance is required.
* Excellent analytical, problem-solving, and critical thinking skills.
* Strong attention to detail and ability to document findings accurately.
* Effective communication and interpersonal skills to collaborate with diverse stakeholders.
* Ability to work independently and as part of a team.
* Ability to demonstrate "self-starter" traits.
* Knowledge of contract management and legal compliance principles is a plus.
Job Type
Full-Time
Location
Tysons, VA 22102 US (Primary)
Telos offers an excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos and its subsidiaries are an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
$73k-102k yearly est. 22d ago
Senior Information Systems Security Officer (ISSO)
Perspecta 4.5
McLean, VA jobs
Responsibilities
Peraton is seeking a motivated Senior Information Systems Security Officer (ISSO) to join our team of technical and business experts providing operational and mission support to a SI/SETA mission for a classified customer in Virginia.
The Senior Information Systems Security Officer (ISSO) serves as the Information Systems Security Officer (ISSO) providing system security support for ongoing and future system development within the Customer organization
Our unique team of technical and business disciplines provide operational support for Systems Engineering/Integration, Mission Planning, and Business Operations to multiple functional mission areas. The team is responsible for technical design, operations, and mission planning and business operations for the full life cycle of customer specific operations (from concept through development and installation/O&M).
The Senior Information Systems Security Officer (ISSO) will be responsible for the following but not limited to:
Support organization-wide activities to maintain A&A compliance of all systems and full-lifecycle.
Closely collaborate with the ISSM staff to manage ongoing issues and accreditations.
Serve as the focal POC between the project teams and the accreditation office.
Review/assess network diagrams and schematics.
Review and interpret system vulnerability scans and work with project teams to resolve security issues.
Resolve inconsistencies and irregularities in the submission of A&A documentation.
Required to put together assessment reports to provide organizational risk, ad hoc customer responses mostly dealing with analysis and policy interpretation.
Will handle software management, laptop compliance, certification and accreditation of systems, patch management, continuous monitoring/scanning.
Develop and maintain SSPs.
Maintaining systems as well as working with SETA and development contractors to prepare SSPs and work through the A&A processes.
Generate and review the Body of Evidence (BOE) and artifacts.
**This role requires the candidate to perform duties on-site Mon-Fri.**
Qualifications
Required Qualifications:
Active/current TS/SCI w/ a relevant polygraph is required.
Bachelor's degree in engineering, science, or other related technical discipline and 12 years relevant experience; or a Master's degree and 10 years of relevant experience; or a PhD and seven (7) years of relevant experience.
Risk Management and the Certification and Accreditation processes and related policies.
System Administrator Security Course.
Proven experience in Information Systems Security to include:
Direct project management experience with patch management, continuous monitoring, and vulnerability scanning/remediation activities - this includes devising or implementing a continuous monitoring plan across multiple security domains and familiarity with tools used in compliance and vulnerability assessments.
Familiarity with cloud computing and related security concepts, as well as, cross-domain solutions.
Working knowledge of digital communications and related IT communications technologies.
Good time management skills.
Ability to support multiple projects.
Ability to multitask and manage.
Must be a team player and possess a strong ability to work collaboratively with a diverse team as well as work independently with minimal supervision.
Demonstrated ability to quickly ramp up to support customer's needs, clearly communicate (orally and written) ideas, take initiative to provide creative solutions to challenges and/or systemic problems.
Proactive and forward-leaning.
Strong interpersonal skills.
Previous experience with customer.
Desired Qualifications:
Prior experience as an ISSM, ISSO, ISSE with the customer.
Salary Range Estimates:
The estimate displayed represents the typical salary range for this position and is just one component of Peraton's total compensation package for employees.
Benefits:
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and eligible to participate in an attractive bonus plan.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$59k-78k yearly est. Auto-Apply 20d ago
Cyber Threat Hunt Analyst
Mantech 4.5
Information security analyst job at ManTech
**MANTECH** seeks a skilled and innovative **Cyber Threat Hunt Analyst** to support our cybersecurity operations in **McLean, VA.** As a Cyber Threat Hunter, you will be responsible for proactively detecting, investigating, and mitigating cyber threats within our large enterprise environment. Your primary focus will be on hypothesis-based threat hunting utilizing the HMM-4 approach and leveraging the Mitre ATT&CK framework. You will collaborate closely with cross-functional teams, including endpoint, network, offensive, threat intelligence, cloud, and data science experts, to identify, analyze, and respond to emerging threats.
**Responsibilities include but are not limited to:**
+ Conduct proactive threat hunting using the HMM-4 approach and Mitre ATT&CK framework.
+ Develop and refine hypotheses for targeted threat hunts based on threat intelligence, internal data, and analysis of attacker tactics, techniques, and procedures (TTPs).
+ Collaborate with internal teams to collect and analyze security event data from various sources, such as logs, alerts, network traffic, and endpoint telemetry.
+ Utilize cutting-edge tools and technologies to identify indicators of compromise (IOCs) and anomalies that may indicate potential threats.
+ Perform in-depth analysis of identified threats, assess their impact, and recommend appropriate mitigation and response strategies.
+ Document investigative objectives and progress throughout threat hunt. Produce detailed reports and provide clear and concise communication on findings, to include root cause analysis and recommendations for remediation and risk mitigation. Propose enhanced detections where possible defensive gaps are identified.
+ Stay up to date with the latest cyber threats, attack techniques, and security technologies through continuous learning and knowledge sharing.
**Minimum Qualifications**
+ 3+ years of experience as a cyber securityanalyst, incident responder, or other closely related cyber security discipline.
+ Experience and strong proficiency in hypothesis-based hunting (HMM-4), the Mitre ATT&CK matrix, and mapping adversary TTPs to observed activities.
+ Experience and proficiency with SIEM platforms, EDR solutions, network traffic analysis tools, and a deep understanding of cloud environments (AWS, Azure, etc.)
+ Experience problem-solving in high-pressure situations, with the ability to translate complex technical findings for both technical and non-technical audiences.
+ Relevant industry certifications (e.g., GCIH, CTIA, or CThH)
+ Experience with and a solid foundation in network protocols and endpoint security.
**Preferred Qualifications**
+ Bachelors degree in electrical engineering, computer engineering, computer science, or related IT discipline
+ 4+ years of experience as a cyber securityanalyst, incident responder, or other closely related cyber security discipline.
**Clearance Requirements**
+ An active/current TS/SCI with Polygraph clearance is required.
**Physical Requirements**
+ Must be able to remain in a stationary position 50% of the time.
+ Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
+ Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
$69k-90k yearly est. 29d ago
Cyber Security Analyst
Mantech International Corporation 4.5
Information security analyst job at ManTech
General information Requisition # R64178 Posting Date 11/21/2025 Security Clearance Required TS/SCI w/ Poly Remote Type Onsite Time Type Full time Description & Requirements Unlock the secrets of intelligence with MANTECH! Join a dynamic team at the forefront of national security, providing advanced solutions to government intelligence agencies. Since 1968, we've been solving the toughest challenges with groundbreaking tech. Explore thrilling projects in Digital Transformation, Cybersecurity, IT, Data Analytics and Software Development. Elevate your career and make a difference. Your adventure begins now-unleash your potential with MANTECH!
* This is for a future opportunity*
MANTECH seeks a motivated, career and customer-oriented Cyber SecurityAnalyst to join our team onsite in Herndon, VA or Reston, VA in support of a high-priority mission at one of our National Intelligence Customers.
Responsibilities include but are not limited to:
* Responsible for supporting the acceptance of an Authorization to Operate (ATO) for the new Modern Data Platform (MDP) transformation
* Support the documenting and navigating the customer's accreditation process for ATO
* Work closely with Security Engineers to ensure security solutions are meeting customer accreditation requirements and following security controls
* Will use RMF (Risk Management Framework) NIST 800-53, NISPOM, and ICDs for cybersecurity and informationsecurity protocols to drive tasking and ensure compliance
* ISSE/ISSO tasking in support of documenting and navigating the customer's accreditation process for ATO
Minimum Qualifications:
* Bachelor's degree in a related field OR additional equivalent work experience
* 5+ years of experience relevant to this position
* Experience with Software Development Lifecycle, application security, Cloud principles and engineering
* Expert in System Accreditation process and protocols within the Intelligence Community
* Experience with NIST 800-53 and implementing Risk Management Framework
* Understanding of vulnerability assessment tools like Rapid7 or Nessus
* Knowledge of User Access Monitoring and Identity Access Management
* Experience creating and reviewing system design documents and workflows
Preferred Qualifications:
* Experience with Terraform, SIEM and AI/ML Governance
* Knowledge of cross-domain solutions, Zero Trust, and/or IDP (Identity Provider) integration skills
* DoD 8570-compliant certification (e.g., Security+, CYSA+, CEH, or CISSP)
* Experience with security tools such as Splunk, CrowdStrike, or Wireshark
* Familiarity with SCAP tools, STIGs, or automated compliance reporting
* Knowledge of incident response and digital forensics processes
Clearance Requirements:
* Must have active TS/SCI with Polygraph
Physical Requirements:
* Must be able to remain in a stationary position 50% of the time
* Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
* Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.