A leading consulting firm in Washington is seeking an experienced IDS and IPS Cyber Security Engineer to join their cybersecurity team. The role requires expertise in Linux and YAML configuration management for network intrusion systems. Responsibilities include designing and maintaining IDS/IPS across multiple networks, optimizing YAML configurations, and troubleshooting system issues in a Red Hat environment. The compensation range is competitive, offering a long-term career with strong professional development opportunities.
#J-18808-Ljbffr
A leading tech company based in the US is seeking a Senior Incident Response Security Consultant for Google Cloud, Mandiant. You will lead incident response engagements, investigate, and help organizations effectively respond to cyber threats. The ideal candidate possesses extensive experience in incident response and forensics. This is a remote-eligible role with a competitive salary range of $132,000-$194,000 plus benefits.
#J-18808-Ljbffr
$132k-194k yearly 6d ago
Firewall Security Engineer
Novacoast 3.9
Washington, DC jobs
Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check.
Qualifications
To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments.
Responsibilities
In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls.
Requirements
5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments
Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies
Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management
Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs
US Citizenship is required due to the position being with a Federal Client
If this role is aligned with your next career move, submit your resume today for immediate consideration!
Job Type: Contract
Pay: $60.00 - $68.00 per hour
#J-18808-Ljbffr
$60-68 hourly 5d ago
IDS and IPS Cyber Security Engineer
Booz Allen Hamilton 4.9
Washington, DC jobs
Your growth matters to us - explore our career development opportunities.
BE EMPOWERED TO SUCCEED
Connect with others in our people‑first culture and enhance our collective ingenuity.
SUPPORT YOUR WELLBEING
Learn how we'll support you as you pursue a balanced, fulfilling life.
YOUR CANDIDATE JOURNEY
Discover what to expect during your journey as a candidate with us.
IDS and IPS Cyber Security Engineer
We are seeking an experienced Network Intrusion Detection Engineer to join our cybersecurity team. The ideal candidate must possess strong Linux engineering expertise with experience managing YAML configuration files, and how these configurations integrate and influence the Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS).
You will leverage hands‑on engineering and O & M experience with Suricata or other network‑based IDS capabilities such as Snort, VectraAI, or Corelight. You will play a critical role in deploying, tuning, and maintaining the IDS within a complex enterprise IT environment, primarily running on Red Hat Enterprise Linux.
Work with us as we secure and protect our nation's most sensitive capabilities.
The Opportunity
What You'll Work On:
Designing, deploying, and maintaining IDS / IPS systems across a large enterprise with multiple networks.
Developing, reviewing, and optimizing YAML configuration files to ensure optimal detection capabilities and minimal false positives.
Understanding and managing the interaction between YAML configuration and its runtime engine, including rule loading, protocol decoding, and logging.
Tuning IDS / IPS for optimal performance with NICs, including configuring Direct Memory Access (DMA), RSS queues, interrupt coalescing, and leveraging any NIC‑specific acceleration features.
Collaborating with security teams to integrate IDS / IPS with SIEM and other security monitoring platforms.
Troubleshooting installation and operational issues specific to IDS / IPS on Red Hat Enterprise Linux, addressing compatibility, kernel module requirements, SE‑Linux policies, and performance tuning.
Identifying and mitigating common pitfalls encountered when deploying IDS / IPS in large‑scale enterprise environments, including package dependencies, system resource constraints, and NIC driver or configuration issues.
Providing detailed documentation and runbooks for Suricata configuration, tuning NICs, and deployment processes.
Staying current with platform IDS / IPS software releases, NIC driver updates, and community best practices for network interface tuning and IDS / IPS performance enhancement.
You Have:
Experience working with network IDS / IPS systems such as Snort, Suricata, or Corelight, including hands‑on management of YAML configuration files.
Experience administering Red Hat Enterprise Linux (RHEL) systems, including package management, such as yum or dnf, kernel module management, SE‑Linux configuration, and system optimization via Unix CLI and remote shell access vectors, such as PuTTY or SSH.
Experience tuning Suricata for high‑performance packet capture with Napatech NICs or advanced network interface cards.
Experience with NIC‑specific features such as DMA, Receive Side Scaling (RSS), interrupt moderation, and off‑load capabilities, and how to configure them for Suricata.
Experience troubleshooting Suricata's interaction with NIC drivers and kernel modules in an enterprise environment.
Knowledge of configuration structure, syntax, and how it controls detection rules, logging, and output modules.
Active TS/SCI clearance; willingness to take a polygraph exam.
Associate's degree and 5+ years of experience supporting IT projects and activities or Bachelor's degree and 3+ years of experience supporting IT projects and activities or Master's degree and 1+ years of experience supporting IT projects and activities.
DoD 8570 IAT Level II Certification, including Security+ CE, CCNA‑Security, GSEC, SSCP, CySA+, GICSP, or CND Certification.
Ability to obtain a DoD 8570 Cyber Security Service Provider - Infrastructure Support Certification, including CEH, CySA+, GICSP, SSCP, CHFI, CFR, Cloud+, or CND Certification, within 60 days of start date.
Nice If You Have:
Experience with scripting languages, such as Bash, Python, YAML, or Ansible to automate Suricata configuration and deployment tasks.
Experience integrating Suricata with Splunk or other SIEM solutions.
Experience with Detection and Response (NDR) solutions, including with Trellix or FireEye, Corelight, Endace, Vectra AI, Darktrace, Cisco Security Network Analytics, Open XDR, Fortinet FortiNDR, or Trend Vision.
Knowledge of network protocols, intrusion detection methodologies, and security event correlation.
Knowledge of containerized deployments of Suricata, such as Docker or Kubernetes, in enterprise environments.
Ability to be a self‑starter, work without considerable direction, and work with a team.
Possession of excellent verbal and written communication skills, including client briefings and coordinating efforts.
Clearance
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well‑being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work‑life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full‑time and part‑time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract‑specific affordability and organizational requirements. The projected compensation range for this position is $99,000.00 to $225,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people‑first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.
Commitment to Non‑Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
$75k-100k yearly est. 2d ago
Remote Principal Security Consultant & Pre-Sales Tech Lead
Reversinglabs 3.6
Boston, MA jobs
A cybersecurity firm in Boston seeks a Principal Lead, Security Consultant with a strong background in threat detection and malware analysis. This role encompasses leading technical pre-sales efforts across various modules, conducting Proof-of-Value (POV) assessments, and managing security consultant teams. Ideal candidates should possess 8-10 years of experience in cybersecurity, proven communication skills, and deep technical knowledge. Join us in forging a transformative journey in enterprise cybersecurity.
#J-18808-Ljbffr
$90k-117k yearly est. 4d ago
Remote Security Observability Engineer - Data Pipelines
Openai 4.2
San Francisco, CA jobs
A leading company, OpenAI, is seeking a Software Engineer, Security Observability to enhance their security infrastructure in a collaborative environment. The role focuses on designing scalable systems, improving data visibility, and requires strong software engineering skills, particularly in Python and Golang. Expansion into cloud platforms like Azure is also essential in this high-impact position.
#J-18808-Ljbffr
A leading AI research company in San Francisco is hiring a Security Engineer, specializing in application security. Responsibilities include conducting security assessments, developing security tools, and collaborating with development teams to integrate security best practices throughout the software development lifecycle. The ideal candidate has extensive experience in cybersecurity and strong programming skills. This role offers a hybrid work model with relocation assistance.
#J-18808-Ljbffr
$125k-175k yearly est. 3d ago
Mandarin Language Analyst - TS/SCI+Poly | US Citizen
Altamira Technologies Corp 4.1
McLean, VA jobs
A defense contracting firm is seeking a qualified Chinese-Mandarin Language Analyst in McLean, Virginia. The role involves conducting translations and transcriptions while leveraging cultural knowledge. Candidates must possess a TS/SCI clearance with polygraph and have at least 4 years of experience in crypto language processing. This opportunity is open only to U.S. citizens due to federal contract requirements. Join a team dedicated to providing innovative solutions within national security.
#J-18808-Ljbffr
$65k-86k yearly est. 2d ago
Chinese-Mandarin Language Analyst
Altamira Technologies Corp 4.1
McLean, VA jobs
Altamira Technologies has a long and successful history of providing innovative solutions throughout the U.S. National Security community. Headquartered in McLean, Virginia, Altamira serves the defense, intelligence, and homeland security communities worldwide by focusing on creating innovative solutions leveraging common standards in architecture, data, and security. Altamira believes that our people and our company's culture differentiate us from other companies. We focus on recruiting talented, self-motivated employees who strive to find a way to get things done.
Position Summary
Altamira is hiring a qualified Chinese-Mandarin Language Analyst.
Position Description
Conduct translation, transcription, and summaries/gists of various language materials
Leverage knowledge of language origins and cultural context to provide meaningful, nuanced translations
Conduct triage analysis on incoming language materials to determine priority and process accordingly
Proficiently use various tools and databases to process language materials and annotate required data
Must have a strong command of the English language and ensure proper grammar is always used
Required Qualifications
Must have a TS/SCI Clearance with Polygraph for consideration
4 years performing crypto language processing - translating/gisting sophisticated written and/or spoken materials and demonstrating all lower OLA skills (2 of the 4 yrs primary duty: translating, transcribing, and/or gisting)
Must have ILR Skill Level 3 in Audio or Graphic
Due to Federal contract requirements for this role, we can only consider US citizens for this position
#J-18808-Ljbffr
$65k-86k yearly est. 2d ago
Senior AI Platform Engineer for Autonomous Security
Hackerone Inc. 4.2
Seattle, WA jobs
A leading cybersecurity firm is seeking a Senior Software Applied AI Engineer to develop cutting-edge AI solutions aimed at enhancing cybersecurity. You will build and enhance the AI security agent 'Hai', creating tools that allow organizations to develop more secure software while combating emerging threats. The role embraces flexible remote work within the Seattle area, and offers competitive compensation with substantial benefits.
#J-18808-Ljbffr
$122k-165k yearly est. 5d ago
Intrusion Analyst
QED National 4.6
Washington, DC jobs
REMOTE Travel Required: Up to 10% Clearance Required: Active TS clearance with SCI eligibility Contract: Long Term What You Will Do: In support of a large federal law enforcement agency, this opportunity is for an Intrusion Analyst role providing technical expertise to confront complex cyber challenges. The position centers on conducting advanced digital forensic analysis, preserving evidence integrity, and supporting investigative activities through detailed technical assessments and clear reporting.
* Conduct advanced digital forensic investigations of devices, data, and systems to uncover evidence for legal or investigative purposes.
* Collect, preserve, and analyze data from multiple sources while ensuring integrity for legal admissibility.
* Perform scientific analysis of devices in both static and dynamic states and thoroughly document findings and conclusions.
* Provide expert witness testimony and successfully complete mock examinations, including courtroom defense exercises.
* Analyze forensic artifacts and intrusion activity across multiple operating systems (Windows, Linux, mac OS, mobile).
* Examine volatile memory captures, log exports, and other pre-acquired forensic datasets.
* Identify Indicators of Compromise (IOCs) and attacker Tactics, Techniques, and Procedures (TTPs).
* Use forensic tools such as Magnet Axiom, X-Ways, FTK, Volatility, Splunk, ELK Stack, and relevant open-source utilities.
* Correlate data from multiple sources (host artifacts, logs, network captures, cloud logs) to reconstruct attack timelines and scope.
* Detect persistence mechanisms, privilege escalation, lateral movement, and data exfiltration indicators.
* Apply scripting and automation (Python, PowerShell, Bash) for artifact parsing, data correlation, and workflow acceleration.
* Communicate findings clearly and effectively for technical and non-technical audiences.
* Support operational investigative activities, which may require extended or irregular work hours across multiple locations.
* Conduct in-depth technical analysis for complex cyber and computer intrusion cases.
* Coordinate and facilitate cyber and computer intrusion investigations.
* Develop recommendations for process improvement.
What You Will Need:
* Minimum 8 years of experience in digital forensics or equivalent certifications/work history.
* Active TS clearance with SCI eligibility.
* Expertise in intrusion-focused forensic analysis across multiple operating systems.
* Strong knowledge of forensic artifacts, persistence mechanisms, and lateral movement indicators.
* Proficiency with scripting languages (Python, PowerShell, Bash) for automation.
* Excellent communication skills and ability to defend findings in courtroom exercises.
* Applied knowledge of forensic, network, and malware analysis.
* Experience working in team environments for software development.
* Ability to perform reverse engineering of compiled software, functional analysis of source code/scripts, and hardware/firmware analysis.
What Would Be Nice To Have:
* Advanced certifications in digital forensics.
* Experience supporting FBI or federal cyber investigations.
* Experience managing and developing for multiple environments.
* Strong oral and written communication skills.
Pay Range: $70-$85/hr W2
About Seneca Resources:
At Seneca Resources, we are more than just a staffing and consulting firm-we are a trusted career partner. With offices across the U.S. and clients ranging from Fortune 500 organizations to government agencies, we connect professionals with opportunities that drive meaningful impact and support long-term career growth.
When you join Seneca, you gain a team committed to your success. We offer competitive compensation, comprehensive health, dental, and vision coverage, 401(k) plans, and continuous support throughout your assignment. Our recruiters and account managers invest in understanding your goals and placing you in roles aligned with your talents and ambitions.
Seneca Resources is proud to be an Equal Opportunity Employer, dedicated to building a diverse and inclusive workplace where all qualified applicants are encouraged to apply.
$70-85 hourly 4d ago
Staff Information Security Analyst
Playstation 4.8
San Mateo, CA jobs
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information SecurityAnalyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 2d ago
SOC Cyber Defense Analyst - SME (Journeyman)
Akira Technologies Inc. 4.1
Norfolk, VA jobs
Akira Technologies is seeking a SOC Cyber Defense Analyst (SME / Journeyman) to support a government client in Norfolk, VA. This role provides hands-on cybersecurity monitoring, incident response, and forensic analysis across Operational Technology (OT), Industrial Control Systems (ICS), and enterprise network environments, including on-premises and cloud systems.
The ideal candidate has 5-7 years of cybersecurity operations experience, operates independently on complex incidents, and serves as a technical subject matter expert within the SOC while supporting and mentoring junior analysts.
This is an onsite position supporting NAVFAC in Norfolk, VA. This role requires Top Secret or higher clearance.
Key Responsibilities
Perform cyber defense monitoring and forensic analysis across host and network systems, including malware triage, log correlation, and timeline reconstruction.
Investigate security incidents using MITRE ATT&CK and Cyber Kill Chain methodologies.
Support containment, eradication, and recovery actions in accordance with established incident response procedures.
Serve as a journeyman-level SME, providing technical guidance and mentoring to junior SOC analysts.
Monitor, tune, and enhance SIEM platforms (e.g., Splunk Enterprise Security, Elastic SIEM, Cribl) to improve detection and threat visibility.
Develop and maintain SIEM correlation rules, dashboards, and continuous monitoring content using data models and tstats.
Evaluate system and network configurations for vulnerabilities and recommend remediation aligned with DoD cybersecurity standards.
Support STIG compliance activities and assist with Information Assurance Vulnerability Management (IVAM) actions.
Utilize asset mapping and inventory tools to validate authorized devices and identify unauthorized or anomalous systems.
Handle digital evidence in accordance with government forensic and chain-of-custody best practices.
Produce concise technical and executive-level reports detailing findings, impacts, and mitigation recommendations.
Collaborate with SOC leadership and government stakeholders to improve SOC workflows, threat hunting, and operational effectiveness.
Required Qualifications
Active Top Secret clearance (or higher).
5-7 years of experience in cybersecurity operations, SOC analysis, or incident response.
Strong knowledge of Windows and Linux operating systems, network traffic analysis, and security monitoring.
Experience working within DoD cybersecurity frameworks and compliance-driven environments.
Hands-on experience with tools such as Splunk (Enterprise Security preferred), Palo Alto, Elastic SIEM, Cribl, Nessus, CrowdStrike, VMware, or similar technologies.
Demonstrated ability to independently lead investigations and communicate findings to technical and non-technical audiences.
Preferred Qualifications
Experience supporting OT / ICS / SCADA environments.
Advanced Splunk Enterprise Security content development experience.
Familiarity with GrayNoise, Shodan, MODBus, PCAP analysis, or industrial protocols.
Relevant certifications such as GCIH, CEH, GCED, OSCP, CISSP, or equivalent.
Leveling Summary
Performs independently on complex incidents.
Acts as a technical SME within the SOC.
Mentors junior analysts without formal program or SOC ownership.
Escalates advanced or strategic issues to senior or lead analysts.
Salary Range: $125,000 - $140,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
$125k-140k yearly Auto-Apply 27d ago
SOC Cyber Defense Analyst - SME (Journeyman)
Akira Technologies Inc. 4.1
Norfolk, VA jobs
Akira Technologies is seeking a SOC Cyber Defense Analyst (SME / Journeyman) to support a government client in Norfolk, VA. This role provides hands-on cybersecurity monitoring, incident response, and forensic analysis across Operational Technology (OT), Industrial Control Systems (ICS), and enterprise network environments, including on-premises and cloud systems.
The ideal candidate has 5-7 years of cybersecurity operations experience, operates independently on complex incidents, and serves as a technical subject matter expert within the SOC while supporting and mentoring junior analysts.
This is an onsite position supporting NAVFAC in Norfolk, VA. This role requires Top Secret or higher clearance.
Key Responsibilities
Perform cyber defense monitoring and forensic analysis across host and network systems, including malware triage, log correlation, and timeline reconstruction.
Investigate security incidents using MITRE ATT&CK and Cyber Kill Chain methodologies.
Support containment, eradication, and recovery actions in accordance with established incident response procedures.
Serve as a journeyman-level SME, providing technical guidance and mentoring to junior SOC analysts.
Monitor, tune, and enhance SIEM platforms (e.g., Splunk Enterprise Security, Elastic SIEM, Cribl) to improve detection and threat visibility.
Develop and maintain SIEM correlation rules, dashboards, and continuous monitoring content using data models and tstats.
Evaluate system and network configurations for vulnerabilities and recommend remediation aligned with DoD cybersecurity standards.
Support STIG compliance activities and assist with Information Assurance Vulnerability Management (IVAM) actions.
Utilize asset mapping and inventory tools to validate authorized devices and identify unauthorized or anomalous systems.
Handle digital evidence in accordance with government forensic and chain-of-custody best practices.
Produce concise technical and executive-level reports detailing findings, impacts, and mitigation recommendations.
Collaborate with SOC leadership and government stakeholders to improve SOC workflows, threat hunting, and operational effectiveness.
Required Qualifications
Active Top Secret clearance (or higher).
5-7 years of experience in cybersecurity operations, SOC analysis, or incident response.
Strong knowledge of Windows and Linux operating systems, network traffic analysis, and security monitoring.
Experience working within DoD cybersecurity frameworks and compliance-driven environments.
Hands-on experience with tools such as Splunk (Enterprise Security preferred), Palo Alto, Elastic SIEM, Cribl, Nessus, CrowdStrike, VMware, or similar technologies.
Demonstrated ability to independently lead investigations and communicate findings to technical and non-technical audiences.
Preferred Qualifications
Experience supporting OT / ICS / SCADA environments.
Advanced Splunk Enterprise Security content development experience.
Familiarity with GrayNoise, Shodan, MODBus, PCAP analysis, or industrial protocols.
Relevant certifications such as GCIH, CEH, GCED, OSCP, CISSP, or equivalent.
Leveling Summary
Performs independently on complex incidents.
Acts as a technical SME within the SOC.
Mentors junior analysts without formal program or SOC ownership.
Escalates advanced or strategic issues to senior or lead analysts.
Salary Range: $125,000 - $140,000
Akira's pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
$125k-140k yearly Auto-Apply 25d ago
Network Sniffer Analysis
E*Pro 3.8
McLean, VA jobs
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-115k yearly est. 19h ago
Network Sniffer Analysis
E Pro Consulting 3.8
McLean, VA jobs
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email: [email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
$83k-115k yearly est. 60d+ ago
Lead Cyber Defense Forensics Analyst
Harmonia Holdings Group, LLC 4.3
Washington, DC jobs
Job Description
Harmonia Holdings Group, LLC is an award-winning, rapidly growing federal government contractor committed to providing innovative, high-performing solutions to our government clients and focused on fostering a workplace that encourages growth, initiative, creativity, and employee satisfaction.
Description
Title: Lead Cyber Defense Forensics Analyst
Location: Washington D.C.
Terms: Full-time
Clearance: Ability to obtain a MBI Public Trust
Travel: 0%
Position Description
The Lead Cyber Defense Forensics Analyst supports leading digital forensic investigations and incident response efforts across enterprise IT environment. This role is responsible for overseeing the collection, preservation, analysis, and reporting of digital evidence related to cyber incidents, insider threats, and compliance requirements. The lead analyst provides technical expertise, mentors team members, and ensures forensic capabilities meet federal standards and best practices.
Responsibilities:
Lead and coordinate digital forensic investigations involving systems, networks, endpoints, and cloud environments.
Oversee the collection, preservation, and analysis of electronic evidence in support of incident response, legal, HR, and compliance activities.
Perform in-depth forensic analysis of compromised systems, malware, and artifacts to determine root cause, impact, and remediation strategies.
Develop and maintain forensic methodologies, standard operating procedures, and chain-of-custody documentation in accordance with federal guidelines.
Collaborate with SOC, threat intelligence, and incident response teams to support rapid detection, containment, and recovery from cyber incidents.
Prepare detailed forensic reports, executive summaries, and presentations for technical and non-technical audiences, including leadership and external stakeholders.
Support e-discovery, litigation, and regulatory investigations as required.
Mentor and train junior analysts, and contribute to the continuous improvement of forensic and incident response capabilities.
Stay current with emerging threats, forensic tools, and investigative techniques relevant to the federal sector.
Requirements
Bachelor's degree in Information Security, Computer Science, Digital Forensics, or related field.
5+ years of experience in digital forensics, incident response, or cybersecurity operations.
Advanced expertise with forensic tools and platforms (e.g., EnCase, FTK, X-Ways, Volatility, Cellebrite).
Strong knowledge of evidence handling, chain-of-custody, and federal investigative standards.
Experience with malware analysis, memory forensics, and cloud forensics.
Excellent analytical, communication, and report writing skills.
Proven leadership and mentoring abilities.
Ability to pass an MBI (Minimum Background Investigation) clearance.
Desired
Professional certifications such as GCFA, GCFE, CCE, EnCE, or CISSP.
Experience supporting federal or public sector environments.
Familiarity with e-discovery processes and legal/regulatory requirements.
Exposure to cloud and hybrid infrastructure forensics.
#LI #DICE
___________________________________________________________________________________________________________
Here at Harmonia we are pleased to have been repeatedly recognized for our outstanding work culture, the innovative work we do, and the employees on our team who make a difference each day. Some of these recognitions include:
Recognized as a Top 20 "Best Place to Work in Virginia"
Recipient of Department of Labor's HireVets Gold Medallion
Great Place to Work Certification for five years running
A Virginia Chamber of Commerce Fantastic 50 company
A Northern Virginia Technology Council Tech 100 company
Inc. 5000 list of fastest growing companies for eleven years
Two-time SBA SBIR Tibbett's Award winner
Virginia Values Veterans (V3) Certification
We recognize that every bit of our success is the result of our teams of hard-working, motivated, and innovative professionals who are proud to call themselves part of the Harmonia family! In addition to competitive compensation, a family-focused culture, and a dynamic, productive work environment, we offer all full-time employees a variety of benefits including, but not limited to
Traditional and HSA- eligible medical insurance plans w/ Wellness Incentives for employees and family
100% employer-paid dental and vision insurance options
100% employer-sponsored STD, LTD, and life insurance
Veterans Cohort
Gym membership reimbursement
401(k) matching
Dollar-for-dollar 501(c)(3) donation matching
Flexible-schedules and teleworking options
Paid holidays and Flexible Paid Time Off
Adoption Expense Reimbursement
Paid Parental Leave
Professional development and career growth opportunities and paid training days
Employer-sponsored Employee Assistance Program for employee and family
Team and company-wide events, recognition, and appreciation-- and so much more!
Check out our LinkedIn, Facebook, and Instagram to find out a little more about who we are and if we are the right next step for your career!
Harmonia is an Equal Opportunity Employer providing equal employment opportunity to all employees and applicants for employment without regard to race, color, religion, national origin, age, gender, gender identity, sexual orientation, disability, or genetics.
Harmonia does and will take affirmative action to employ and advance in employment individuals with disabilities and protected veterans. To perform the above job successfully, an individual must possess the knowledge, skills, and abilities listed; meet the education and work experience required; and must be able to perform each essential duty and responsibility satisfactorily. Other duties in addition to those listed may be assigned as necessary to meet business needs. Reasonable accommodation will be made to enable an applicant with a disability to successfully apply for and/or perform the essential duties of the job. If you are in need of an accommodation, please contact ***************.
$63k-86k yearly est. 6d ago
Networking Security Analyst
Oak Grove Technologies LLC 4.3
Fort Belvoir, VA jobs
Job DescriptionDescription:
Oak Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated Mid-Level Networking SecurityAnalyst to join our team and support the Defense Threat Reduction Agency's (DTRA) Advance Red Cyber program in executing Red Team Assessments. In this role you will support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
Oak Grove Technologies is a Service-Disabled Veteran-Owned Business based in Raleigh, NC, with a Test and Training Center located near Fort Bragg and Camp Mackall. With over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful solutions.
Oak Grove Technologies offers a competitive compensation and benefits package.
Requirements:
What You'll Be Doing
Support continuous monitoring and risk mitigation of sensitive networks and systems in alignment with DoD cybersecurity policies, procedures, and best practices.
Configure, scan, monitor, alert, and generate reports using security tools.
PCAP collection and analysis.
What Desired Skills You'll Bring
Experience with PCAP collection and analysis.
Prior experience as a SOC analyst.
Familiarity with red teaming or offensive cyber activities.
Desired Certifications: Certified Information Systems Security Professional (CISSP), CSA, CompTIA Security+ (Sec+), CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Windows Security Administrator (GCWN), GIAC Certified Enterprise Defender (GCED), or Certified Ethical Hacker (CEH).
What Required Skills You'll Bring
U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (
Highly qualified candidates with a Secret Clearance may also be considered.)
3+ years of experience in continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
Experience with configuring, scanning, monitoring, alerting, and reporting security tools.
Bachelor's degree in a relevant field, or additional years of experience in lieu of a degree.
Willingness and ability to travel up to 15% (CONUS/OCONUS).
Security Clearance Requirements:
U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (
Highly qualified candidates with a Secret Clearance may also be considered.)
Compensation and Benefits:
Competitive Pay, PTO, Health Benefits.
If you are a highly motivated Networking SecurityAnalyst and ready to apply your expertise in a high-impact role, we encourage you to join our mission.
Oak Grove Technologies is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Oak Grove Technologies, LLC participates in E-Verify to determine an individual's identity and employment eligibility to work in the United States. E-Verify is a service of DHS and SSA.
$74k-101k yearly est. 7d ago
Networking Security Analyst
Oak Grove Technologies, LLC 4.3
Fort Belvoir, VA jobs
Oak Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated Mid-Level Networking SecurityAnalyst to join our team and support the Defense Threat Reduction Agency's (DTRA) Advance Red Cyber program in executing Red Team Assessments. In this role you will support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
Oak Grove Technologies is a Service-Disabled Veteran-Owned Business based in Raleigh, NC, with a Test and Training Center located near Fort Bragg and Camp Mackall. With over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful solutions.
Oak Grove Technologies offers a competitive compensation and benefits package.
Requirements
What You'll Be Doing
* Support continuous monitoring and risk mitigation of sensitive networks and systems in alignment with DoD cybersecurity policies, procedures, and best practices.
* Configure, scan, monitor, alert, and generate reports using security tools.
* PCAP collection and analysis.
What Desired Skills You'll Bring
* Experience with PCAP collection and analysis.
* Prior experience as a SOC analyst.
* Familiarity with red teaming or offensive cyber activities.
* Desired Certifications: Certified Information Systems Security Professional (CISSP), CSA, CompTIA Security+ (Sec+), CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Windows Security Administrator (GCWN), GIAC Certified Enterprise Defender (GCED), or Certified Ethical Hacker (CEH).
What Required Skills You'll Bring
* U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (Highly qualified candidates with a Secret Clearance may also be considered.)
* 3+ years of experience in continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
* Experience with configuring, scanning, monitoring, alerting, and reporting security tools.
* Bachelor's degree in a relevant field, or additional years of experience in lieu of a degree.
* Willingness and ability to travel up to 15% (CONUS/OCONUS).
Security Clearance Requirements:
U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (Highly qualified candidates with a Secret Clearance may also be considered.)
Compensation and Benefits:
Competitive Pay, PTO, Health Benefits.
If you are a highly motivated Networking SecurityAnalyst and ready to apply your expertise in a high-impact role, we encourage you to join our mission.
Oak Grove Technologies is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Oak Grove Technologies, LLC participates in E-Verify to determine an individual's identity and employment eligibility to work in the United States. E-Verify is a service of DHS and SSA.
$74k-101k yearly est. Auto-Apply 60d+ ago
Networking Security Analyst
Oak Grove Technologies 4.3
Fort Belvoir, VA jobs
Oak Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated Mid-Level Networking SecurityAnalyst to join our team and support the Defense Threat Reduction Agency's (DTRA) Advance Red Cyber program in executing Red Team Assessments. In this role you will support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
Oak Grove Technologies is a Service-Disabled Veteran-Owned Business based in Raleigh, NC, with a Test and Training Center located near Fort Bragg and Camp Mackall. With over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful solutions.
Oak Grove Technologies offers a competitive compensation and benefits package.
Requirements
What You'll Be Doing
Support continuous monitoring and risk mitigation of sensitive networks and systems in alignment with DoD cybersecurity policies, procedures, and best practices.
Configure, scan, monitor, alert, and generate reports using security tools.
PCAP collection and analysis.
What Desired Skills You'll Bring
Experience with PCAP collection and analysis.
Prior experience as a SOC analyst.
Familiarity with red teaming or offensive cyber activities.
Desired Certifications: Certified Information Systems Security Professional (CISSP), CSA, CompTIA Security+ (Sec+), CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Windows Security Administrator (GCWN), GIAC Certified Enterprise Defender (GCED), or Certified Ethical Hacker (CEH).
What Required Skills You'll Bring
U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (
Highly qualified candidates with a Secret Clearance may also be considered.)
3+ years of experience in continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
Experience with configuring, scanning, monitoring, alerting, and reporting security tools.
Bachelor's degree in a relevant field, or additional years of experience in lieu of a degree.
Willingness and ability to travel up to 15% (CONUS/OCONUS).
Security Clearance Requirements:
U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. (
Highly qualified candidates with a Secret Clearance may also be considered.)
Compensation and Benefits:
Competitive Pay, PTO, Health Benefits.
If you are a highly motivated Networking SecurityAnalyst and ready to apply your expertise in a high-impact role, we encourage you to join our mission.
Oak Grove Technologies is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Oak Grove Technologies, LLC participates in E-Verify to determine an individual's identity and employment eligibility to work in the United States. E-Verify is a service of DHS and SSA.