Computer Network Defense Analyst (CNDA), Senior Associate
Information assurance engineer job at Peraton
Responsibilities
Peraton's Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation's security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world's most difficult challenges.
Peraton is seeking Next Generation Computer Network Defense Analyst (CNDA1) to support our mission to defend and protect our national security.
Responsibilities may include:
Identify potential vulnerabilities, respond to cyber events and defend against events by using information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs)
Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Develop expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Work as part of a team, with government, military, and contractor personnel to develop shared understanding of intelligence needs, mission relevance, and areas of expertise.
Apply analytical skills to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share findings--including any new tradecraft developed with teammates, stakeholders, and intelligence consumers.
#AJ
Qualifications
Basic Qualifications:
4 years' experience with an associate's degree OR 2 years' experience with a bachelor's degree
Experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering
Completion of military trainings such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations may be considered towards the relevant experience requirement. (i.e., 20-24-week JCAC course may count as 6 months of experience) OR may be considered equivalent to a technical associates degree.
Foreign language proficiency and Defense Language Proficiency Test (DLPT) scores may be considered as relevant experience.
Experience in network or system administration required.
Active TS SCI security clearance with a current polygraph is required
Additional Qualifications
Degree in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Ability to conduct computer/network security and target development
Knowledge of all aspects of computer/network security, including firewall administration, encryption technologies and network protocols
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.
#NextGenFF
#AJCM
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyComputer Network Defense Analyst (CNDA), Advisor
Information assurance engineer job at Peraton
Responsibilities
Peraton's Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation's security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world's most difficult challenges.
Peraton is seeking Next Generation Computer Network Defense Analyst (CNDA3) to support our mission to defend and protect our national security.
Responsibilities may include:
Identify potential vulnerabilities, respond to cyber events and defend against events by using information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs)
Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Develop expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Work as part of a team, with government, military, and contractor personnel to develop shared understanding of intelligence needs, mission relevance, and areas of expertise.
Apply analytical skills to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share findings--including any new tradecraft developed with teammates, stakeholders, and intelligence consumers.
#AJ
Qualifications
#25
Basic Qualifications:
10 years' experience with an associate's degree OR 8 years' experience with a bachelor's degree OR 6 years' experience with a master's Degree OR 4 years' experience with a PhD
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering
JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations may be considered towards the relevant experience requirement. (i.e., 20-24-week JCAC course may count as 6 months of experience OR 10-14-week JCAC may count as 3 months of experience) OR may also be considered equivalent to a technical associates degree
Foreign language proficiency and Defense Language Proficiency Test (DLPT) scores may be considered as relevant experience.
Experience in network or system administration required
Active TS SCI security clearance with a current polygraph is required
Additional Qualifications
Degree in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
Ability to conduct computer/network security and target development
Knowledge of all aspects of computer/network security, including firewall administration, encryption technologies and network protocols
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.
#NextGenFF
#AJCM
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyCloud Security Engineer
Philadelphia, PA jobs
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Senior Cyber Defense Analyst
Remote
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a “click-through-the-console” SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$144,500-$170,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
Auto-ApplyInformation Security Governance Specialist - Vice President
New York, NY jobs
About the Role
iCapital is looking to hire a Vice President Information Security Governance Specialist. This individual will be a key person in iCapital's second line of defense team. The ideal candidate will support the organization's security governance program by ensuring compliance with regulatory requirements, security frameworks, and contractual obligations. This role involves reviewing the information security program against industry standards, assessing security clauses in client and vendor contracts, designing and maintaining security controls, and responding to regulatory audits.
Responsibilities
Assist in authoring, maintaining, and updating security governance policies and standards to align with industry frameworks and management direction.
Evaluate the organization's information security program against common frameworks (e.g., ISO 27001, CIS, NIST 800-53, SOC 2) and applicable regulations (e.g., NYDFS, DORA, FFIEC, GDPR).
Identify gaps and recommend control enhancements to align with compliance requirements.
Review and negotiate information security sections of client and vendor contracts in partnership with the Legal team.
Ensure contractual obligations meet internal security standards, regulatory expectations, and reasonability.
Collaborate with Technology, Information Security, and Risk teams to design, document, and enhance security controls for infrastructure, applications, and data.
Coordinate responses for internal and regulatory audits for information security team.
Qualifications
7-10 years of experience in information security governance, compliance, or risk management in a financial service, fintech, or technology-driven environment
Bachelor's degree in information security, risk management, or a related field
Strong written and verbal communication skills
Excellent analytical and problem-solving skills
Able to manage multiple priorities and deadlines in a fast-paced environment
Comfortable engaging with senior leaders
Knowledge of cybersecurity frameworks (ISO, CIS, NIST, SOC 2) and audit processes
CISM, CRISC, or CISSP certifications are preferred
Benefits
The base salary range for this role is $150,000 to $180,000. iCapital offers a compensation package which includes salary, equity for all full-time employees, and an annual performance bonus. Employees also receive a comprehensive benefits package that includes an employer matched retirement plan, generously subsidized healthcare with 100% employer paid dental, vision, telemedicine, and virtual mental health counseling, parental leave, and unlimited paid time off (PTO).
We believe the best ideas and innovation happen when we are together. Employees in this role will work in the office Monday-Thursday, with the flexibility to work remotely on Friday.
For additional information on iCapital, please visit **************************************** Twitter: @icapitalnetwork | LinkedIn: ***************************************************** | Awards Disclaimer: ****************************************/recognition/
iCapital is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender, sexual orientation, gender identity, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Auto-ApplySenior Cyber Defense Analyst
San Francisco, CA jobs
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
Auto-ApplyDistributed Systems Engineer: Secure Sandboxes
San Francisco, CA jobs
Magic's mission is to build safe AGI that accelerates humanity's progress on the world's most important problems. We believe the most promising path to safe AGI lies in automating research and code generation to improve models and solve alignment more reliably than humans can alone. Our approach combines frontier-scale pre-training, domain-specific RL, ultra-long context, and inference-time compute to achieve this goal.
About the role
As a Software Engineer on the Supercomputing Platforms and Infrastructure team, you will build the next generation systems that power large scale AI research and deployment. You will focus on sandboxed execution environments, distributed systems orchestration, and performance optimized compute workflows. You will work closely with ML and Research teams and infrastructure teams to deliver both high throughput, scale, and strong isolation guarantees in a cluster environment.
What you might work on
Build highly scalable, highly performant, software that facilitates arbitrary code execution with strong isolation guarantees.
Design and build systems that allow our AI models to interface with machines in various modes, interactive terminal, GUI applications, etc.
Provision and operate high density compute and storage nodes (NVMe, high IOPS SSDs, high bandwidth networks), and build software that performs efficient load balancing, and resource utilization across them.
Instrument and optimize end to end performance including storage IO, network bandwidth, CPU, memory, and endurance constraints.
Develop APIs, self service platforms, and automation and tools so researchers and engineers can deploy and monitor workloads at scale.
Troubleshoot complex infrastructure issues across OS, drivers, hardware, storage systems (local NVMe, block storage, NFS), networking, namespace isolation, and cloud or hybrid environments.
Produce clean, documented code and developer workflows, and collaborate with SRE and security teams to ensure safe, reliable, and self serviceable compute offerings.
What we are looking for
Strong software engineering background (C, C++, Go, Rust, or similar systems languages).
Experience designing or operating sandboxed or isolated execution environments (namespaces, cgroups, container runtime internals), or strong interest in this area.
Experience building or operating distributed systems or parallel processing frameworks (scatter aggregate processing, worker pools, multi thread and multi process coordination, shared memory, atomics, merging strategies).
Solid understanding of storage and IO subsystems (NVMe, SSD endurance, write amplification), network performance, CPU and memory resource constraints in high performance compute clusters.
Comfortable working on low level systems (OS, threading, memory management, synchronization) as well as higher level orchestration or automation.
Experience with cloud infrastructure (GCP, AWS, Azure, etc.) including IaC tools such as OpenTofu, Terraform, Pulumi, or CDK is a plus.
Intellectual curiosity, strong ownership, and the ability to make tradeoffs in ambiguous environments such as latency versus throughput and isolation versus performance.
Nice to haves
Prior experience with GPU scheduling, RDMA networking, or bare metal HPC clusters
Contributions to open source container runtimes or sandboxing frameworks
Experience with kernel internals, device drivers, or SSD and NVMe endurance modeling
Familiarity with Rust for systems programming or Go for infrastructure orchestration
Why join us
You will work at the cutting edge of AI infrastructure including large compute clusters, advanced metrics engines, and next generation sandboxing systems for untrusted workloads.
The problems you solve will be foundational, for example how to securely and efficiently run arbitrary research code across thousands of GPUs or high end SSDs.
You will join a collaborative and hands-on team where you are building rather than only modeling.
Excellent compensation and equity, generous benefits, and high impact.
Our culture:
Integrity. Words and actions should be aligned
Hands-on. At Magic, everyone is building
Teamwork. We move as one team, not
N
individuals
Focus. Safely deploy AGI. Everything else is noise
Quality. Magic should feel like magic
Compensation and benefits (US)
Annual salary range: 225,000 USD to 550,000 USD depending on seniority
Significant equity component
401(k) with matching, comprehensive health, dental, and vision insurance, unlimited paid time off, visa sponsorship and relocation support
Fast paced, mission driven environment focused on safely advancing AGI for humanity
Auto-ApplySystems Cybersecurity
Warner Robins, GA jobs
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH.
This job is onsite on Robins AFB, GA.
Requirements
Responsibilities include, but are not limited to the duties listed below
At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001).
Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management.
To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology.
Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
Education, Requirements and Qualifications
Active TS/SCI required
Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations.
OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations.
Excellent written and verbal communication skills
Job may require the employee to be:
Willingness to travel if needed.
In a stationary position 50% of the time
Able to ascend/descend stairs as needed
Able to move equipment not to exceed 25 lbs. as needed.
Please join us, as together we build a better world one mission at a time powered by technology and its people!
#LI-Onsite
#veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Short Term & Long Term Disability
System Security Engineer - Cleared
Washington, DC jobs
RDTS is seeking a Cleared System Security Engineer to support the U.S. Dept of Treasury in Washington, D.C. This position shall support one of Treasury's mission-critical Information Technology systems. The primary function of the Security Engineer is to maintain the Trellix/McAfee ePO system being utilized. This role is fully onsite in downtown DC, full-time, Monday-Friday with standard office hours (i.e. 8:00am-5:00pm), and available upon a favorable federal background check.
RESPONSIBILITIES:
Provide daily security oversight for all TFIN systems and network components; Provide configuration management and oversight of security components;
Provide operational oversight of network security and firewall settings; Provide evaluation and oversight of STIG implementation, compliance, and operations;
Provide system hardening and vulnerability resolution; Assist in the engineering and maintaining of the antivirus architecture, evaluating solutions, troubleshooting server and client related antivirus incidents, and upgrading servers and clients;
Provide malware and virus analysis and removal; Create indicators from analysis for use with IDS systems to prevent and to deter future threats; Assist in conducting computer forensic operations;
Provide operational and maintenance support to Host Based Security System (HBSS) (or its replacement system), Tripwire, Nessus or Retina (or current system), Splunk (or its replacement), any IDS components, and any other security tool that is installed on TFIN as applies to items; Maintain/configuring/monitoring virus protection software and email applications;
Ensure HBSS set up conforms to requirements and recommendations IAW Intelligence Community Security Coordination Center (ICSCC); Operate and maintain the current HBSS System and provide reports to the ISSOs for evaluation as required;
Prepare and review test and exercise plans; Support counterintelligence efforts to manage insider threat and other human factors risks;
Prepare indicator creations for IDS systems; Provide security impact assessment, evaluation, and recommendations to the Architect and TFIN Change Control Board (CCB);
Assist in technical incident response exercises and activities.
Requirements
Active Security Clearance
Bachelor's degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
3-5 years of experience in DoD or federal cybersecurity operations.
Minimum 3 years of experience working within classified environments.
Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls.
Core Technical Knowledge Certificates Preferred: Security+, CEH, , Linux/Windows.
Familiarity with McAfee ePO server, Host IPS, and firewall policy tuning.
Understanding of DISA STIGs and how to implement them across systems; Experience with STIG Viewer and compliance tools.
Proficiency with Tripwire, Nessus, Retina, and interpreting scan results.
Experience with Splunk.
All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, age, marital status, pregnancy, genetic information, or other legally protected status.
Systems Engineer - Active Security Clearance
Reston, VA jobs
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
This Systems Engineer position is located in Northern Virginia with flexible core hours and includes 10% or less domestic travel.
The Systems Engineer is responsible for developing, engineering, and deploying technical solutions within a dedicated network. This individual will work within a small, mission focused team of network and systems engineers to implement technical solutions to challenging collaboration and data protection problems.
Duties: This Systems Engineer performs the following core functions:
Develop / Test / Scale / Deploy / Maintain technology solutions
Build solutions with a focus on information security principals
Work extensively with Microsoft technologies and virtualization platforms
Monitor networks
Performs other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in Computer Science, Information Systems, Engineering, Business, or a scientific or technical discipline related to the specific skill
No degree + ten (10) years relevant experience
Associate's degree + eight (18) years relevant experience
Bachelor's degree + six (6) years relevant experience
Minimum of six (6) years of relevant experience in the areas of Computer Science, Engineering, Information Technology, Information Systems (or comparable documented work experience)
Ability to travel on an infrequent, but as needed basis, primarily domestic
Knowledge of and hands on experience with modern server operating systems and virtualization technologies
Knowledge of and hands on experience with Virtual Desktop technologies
Knowledge of and hands on experience with Cloud platforms
Knowledge of and hands on experience with collaboration and ticketing tools
Knowledge of high availability technologies and concepts
Knowledge and hands on experience with networking and network security technologies
Experience with managing engineering projects (i.e., design, build, deploy)
Knowledge and hands on experience with scripting languages such as, Bash, Powershell, Python, etc.
Knowledge of and hands on experience implementing IT and Cyber Security best practices
Ability to assess emerging technologies, determine their impact on corporate systems and incorporate them into technical plans
Strong analytical and problem-solving skills; demonstrated ability to analyze complex situations, determine course of action and act promptly and effectively when problems arise
Demonstrated outstanding interpersonal skills and strong verbal and written communications skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Poly dates within the last five years
Experience building, deploying, maintaining, Windows and RedHat/CentoS servers
Experience building, deploying, maintaining, Citrix VDI Desktops
Knowledge and hands on experience with Microsoft Azure, and Azure Stack Hub
Experience building, deploying, maintaining, Atlassian products such as JIRA and Confluence
Experience building, deploying, maintaining, Microsoft Exchange
Experience building, deploying, maintaining clusters, load balancers, multi-datacenter applications
Experience with Cisco Application Centric Infrastructure (ACI)
Experience designing, building, deploying, and maintaining sensitive networks
Experience with Enterprise database platforms such as MS SQL Server and Oracle databases
Experience with One Way Transfer Solutions and data flow management
Knowledge of SIEM and security analytical technologies (e.g. Splunk, pcap, Netflow, etc)
Experience with Active Directory and identity management
Experience with hyper-converged infrastructure such as Cisco HX, Microsoft Storage Spaces Direct
Knowledge of DevOps/DevSecOps methodologies and tools
Systems Engineer - Active Security Clearance
Reston, VA jobs
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
This Systems Engineer position is located in Northern Virginia with flexible core hours and includes 10% or less domestic travel.
The Systems Engineer is responsible for developing, engineering, and deploying technical solutions within a dedicated network. This individual will work within a small, mission focused team of network and systems engineers to implement technical solutions to challenging collaboration and data protection problems.
Duties: This Systems Engineer performs the following core functions:
Develop / Test / Scale / Deploy / Maintain technology solutions
Build solutions with a focus on information security principals
Work extensively with Microsoft technologies and virtualization platforms
Monitor networks
Performs other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in Computer Science, Information Systems, Engineering, Business, or a scientific or technical discipline related to the specific skill
No degree + ten (10) years relevant experience
Associate's degree + eight (18) years relevant experience
Bachelor's degree + six (6) years relevant experience
Minimum of six (6) years of relevant experience in the areas of Computer Science, Engineering, Information Technology, Information Systems (or comparable documented work experience)
Ability to travel on an infrequent, but as needed basis, primarily domestic
Knowledge of and hands on experience with modern server operating systems and virtualization technologies
Knowledge of and hands on experience with Virtual Desktop technologies
Knowledge of and hands on experience with Cloud platforms
Knowledge of and hands on experience with collaboration and ticketing tools
Knowledge of high availability technologies and concepts
Knowledge and hands on experience with networking and network security technologies
Experience with managing engineering projects (i.e., design, build, deploy)
Knowledge and hands on experience with scripting languages such as, Bash, Powershell, Python, etc.
Knowledge of and hands on experience implementing IT and Cyber Security best practices
Ability to assess emerging technologies, determine their impact on corporate systems and incorporate them into technical plans
Strong analytical and problem-solving skills; demonstrated ability to analyze complex situations, determine course of action and act promptly and effectively when problems arise
Demonstrated outstanding interpersonal skills and strong verbal and written communications skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Poly dates within the last five years
Experience building, deploying, maintaining, Windows and RedHat/CentoS servers
Experience building, deploying, maintaining, Citrix VDI Desktops
Knowledge and hands on experience with Microsoft Azure, and Azure Stack Hub
Experience building, deploying, maintaining, Atlassian products such as JIRA and Confluence
Experience building, deploying, maintaining, Microsoft Exchange
Experience building, deploying, maintaining clusters, load balancers, multi-datacenter applications
Experience with Cisco Application Centric Infrastructure (ACI)
Experience designing, building, deploying, and maintaining sensitive networks
Experience with Enterprise database platforms such as MS SQL Server and Oracle databases
Experience with One Way Transfer Solutions and data flow management
Knowledge of SIEM and security analytical technologies (e.g. Splunk, pcap, Netflow, etc)
Experience with Active Directory and identity management
Experience with hyper-converged infrastructure such as Cisco HX, Microsoft Storage Spaces Direct
Knowledge of DevOps/DevSecOps methodologies and tools
Job Posted by ApplicantPro
Information Security Analyst
Indianapolis, IN jobs
. Must live in the Indianapolis area.
Pay: $42.70/hour
In this role you will:
• Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement
• Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment
• Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53)
• Develop Standard Operating Procedures (SOP) for implementing security polices
• Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems
• Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data
• Develop and implement procedures for use of information security management software
• Propose information security software enhancements
• Perform periodic audits to assure security policies and standards are being followed and are effective
• Develop recommendations for enhancements and generates reports where necessary
• Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Washington, DC jobs
Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS)
Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET
JOB DESCRIPTION
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Job Posted by ApplicantPro
T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Washington, DC jobs
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Data and System Security Engineer
Lincolnshire, IL jobs
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
Data and System Security Engineer
Lincolnshire, IL jobs
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients.
Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
Systems Security Engineer
Prior Lake, MN jobs
Are you an identity innovator ready to jump in, look at a system, and take it somewhere? Join us as a Systems Security Engineer - a role that blends the technical depth of IAM with the creativity to improve and automate how access happens across the enterprise. This isn't your typical side of cybersecurity - it's where code development, system management, and smart integration meet. From auditing permissions and refining processes to collaborating across teams, you'll have the opportunity to make a wide variety of impacts every day. Enjoy weekly pay, 401(k) starting day one, and health benefits. Whatever your career goals may be, let Mystic Lake Casino help get you there!
Job Overview: Provide engineering development and support for Identity and Access (IAM) management activities related to system software, hardware, performance, problem determination or resource management requiring communication and coordination with vendors, technicians, clients, and management. Actively integrate identity system with other operational systems to achieve single view of all identity access, while providing efficient automation for identity access changes. Perform procedures necessary to manage security and account permissions to protect information systems across the enterprise. Validate information security procedures are updated, communicated and followed. Audit and grant account permissions to network resources and applications. Perform reviews of security logs and controls. Facilitate the remediation of vulnerabilities and inconsistencies. Document and track information security issues or incidents. Assist with security assessments based on the direction of the Director of Cybersecurity.
Elevate & Thrive: Key Responsibilities:
Work with Identity Access Management (IAM) suite of products and processes; developing and providing support services for IAM deployment; defining and standardizing IAM processes; code development; performing analysis of various projects and requests; developing designs for projects that have medium to high complexity; formulating procedures and implementing business solutions.
Building Identity and Access (IAM) management systems integrations across various applications, technologies and cloud services, providing both identity and data governance to entire organization.
Work closely with business units, application teams, infrastructure areas and vendors to identity, review and evaluate the solution requirements.
Review and provide recommendation on new technologies, roadmaps and vendor product offerings specific to server, software technologies and other products.
Provide consultation and work closely with other functional infrastructure areas on multiple initiatives to meet common organizational business goals and objectives.
Participate in and provide consulting to project teams on design development, integration opportunities, planning of systems and assures it is aligned to our established strategies, guiding principles, rationales and practices.
Ensure IAM solution provides best in class governance, availability and operational efficiency to meet business needs.
Job Requirements:
Bachelor's degree required (Cybersecurity or an equivalent discipline preferred)
5+ years of IT experience with 3+ years of Information Security experience
Strong scripting knowledge (PowerShell, Beanshell and JavaScript) preferred
Sailpoint IAM product suite experience preferred
Demonstrate a strong understanding of tools, technologies, security strategies and their implications on the broader business environment
Have a strong understanding of Information Security concepts, protocols, industry best practices and strategies
Have experience with Active Directory security administration in a large Windows network
Demonstrated background of Windows NTFS and Share Permissions
Ability to develop internal processes and procedures as it relates to day-to-day system security administration
Have experience with common Information Security Management frameworks, such as International Standards Organization (ISO) 17799/27001, the IT Infrastructure Library (ITIL) and the National Institute of Standards and Technology (NIST) frameworks
Have excellent technical knowledge of mainstream operating systems (for example, Microsoft Windows and Unix/Linux) and a range of security technologies such as identity and access management systems
Experience in general technical knowledge of current network hardware/software, protocols, and standards
Experience in conducting research into information security issues, reviewing logs and evaluating security controls
Outstanding Benefits & Awesome Perks: Enjoy competitive weekly pay, outstanding benefits, and advancement opportunities at the SMSC Gaming Enterprise. Eligible Team Members are offered a comprehensive benefits package include medical, dental, life and disability insurance, onsite medical clinics and pharmacy, 401(k) retirement plan, paid time off, wellness programs and more. Plus, take advantage of perks like discounts on childcare, fuel, bus passes and fitness membership, free uniforms and free uniform cleaning, and tuition reimbursement.
Who We Are: We're not just in the business of entertainment; we're in the business of crafting unforgettable experiences. We believe in the power of possibility, to unite and uplift, rallying around every triumph, big and small. At Mystic Lake and Little Six, every moment is a chance to be the experience.
Different backgrounds, different strengths, and different passions, we value the diversity that everyone brings to the table. Our values are a direct reflection of the diverse communities that we proudly serve, represent, and invest in. We invite you to the place to learn, grow, thrive and lead. Let's create moments that matter, celebrate diversity, and build a brighter future for all.
Be the Experience. Be Bold. Be Mystic.
Network Analyst - Active Security Clearance
Reston, VA jobs
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Network Analyst - Active Security Clearance
Reston, VA jobs
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Job Posted by ApplicantPro
Information Security/Privacy Analyst
Information assurance engineer job at Peraton
Responsibilities
Peraton is seeking an Information Security/Privacy Analyst for its' Product Data Systems Support program within our Cyber Mission Sector.
Location: Robins Air Force Base, GA. This is a full-time on-site role.
In this role, you will:
Ensure that security policies, procedures, and directives of the National Industrial Security Program Operating Manual NISPOM manuals are followed.
Maintain oversight and compliance of existing information systems through technical reviews and system auditing.
Interface with program management and customers on security requirements implementation, required documentation, and classification management.
Provide information systems security guidance awareness and training and participates in customer security inspections and reviews.
Manage, develop, prepare, implement, and maintain security plans, standard operating procedures (SOPs), security tests, and evaluation plans.
Collaborate with internal security and IT staff to ensure the continued compliance and secure operation of accredited information systems.
Keep abreast of industry best practices and trends, as well as new technologies, and then plans and advises for implementation.
Manage 3 A&A packages utilizing eMASS for system approval.
Submit POA&Ms for TCNO, STIG, or other system deficiencies.
Coordinate with systems administrators, developers, and other team members for issue resolution, coordination or clarification.
Review change requests for system security impacts.
Review System Access Requests for the systems administered by the organization.
Revalidate email organizational accounts.
Create and modify security group requests, adding and removing users to groups.
Answer cyber related security questions from team members within organization.
Ensure compliance with DoD/AF instructions, directives, EOs and other regulations.
Qualifications
Required:
Bachelor's degree with a minimum of 5 years of relevant experience, Master's degree with 3+ years of relevant experience, Associate's degree with an minimum of 7 years of relevant experience, or 9 years of relevant experience in lieu of a degree.
Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls.
Experience in analysis of security plans and policies.
Demonstrated ability to be self-motivated, self-supervisory, and results oriented.
Demonstrated organizational skills and strong verbal/written communication skills.
The ability to obtain/maintain Security+ certification within 6 weeks of hire date.
The ability to obtain a Common Access Card (CAC).
U.S. citizenship required.
The ability to obtain a DoD level Secret security clearance.
Preferred:
General experience with DoD networks.
Current Security+ certification.
Current CISM, CIPA, CISSP professional certification.
An active DoD level Secret security clearance.
Experience with Enterprise Mission Assurance Support Service (eMASS).
Benefits:
At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We're fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-Apply