Information Systems Security Officer (ISSO), Advisor
Information systems security officer job at Peraton
Responsibilities Peraton is preparing for the award of a new mission-critical Cybersecurity and Risk Management contract. We are seeking experienced Information Systems Security Officer (ISSO) professionals to accomplish the following: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NIST RMF.
Qualifications
* Bachelor's degree in Computer Science, Cyber Security, or IT Engineering and 10 years combined work-related experience in the fields of IT, cybersecurity or security authorization
* 4 years of additional related experience may be substituted for a bachelor's degree
* Experience in at least 2 of the following areas: current security tools, hardware/software security implementation; communication protocols; and encryption tools and techniques
* Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services
* DoD 8570 compliance with IAM I (CAP, GSLC and/or Security+ CE)
* Active/current TS/SCI security clearance with a current polygraph
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.
#AJCM
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyComputer Network Defense Analyst (CNDA), Senior Associate
Information systems security officer job at Peraton
Responsibilities
Peraton's Cyber Mission in Annapolis Junction, MD supplies the Intel community with mission essential Next Generation SIGINT Analysts and Cyber professionals that support and defend our nation's security. Be a part of a team of SIGINT, Intelligence and Cyber professionals that are supplying our nation with leading Next Generation cybersecurity solutions. Peraton delivers unique intelligence, analytics, and data management solutions to address the world's most difficult challenges.
Peraton is seeking Next Generation Computer Network Defense Analyst (CNDA1) to support our mission to defend and protect our national security.
Responsibilities may include:
Identify potential vulnerabilities, respond to cyber events and defend against events by using information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs)
Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Develop expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Work as part of a team, with government, military, and contractor personnel to develop shared understanding of intelligence needs, mission relevance, and areas of expertise.
Apply analytical skills to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share findings--including any new tradecraft developed with teammates, stakeholders, and intelligence consumers.
#AJ
Qualifications
Basic Qualifications:
4 years' experience with an associate's degree OR 2 years' experience with a bachelor's degree
Experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering
Completion of military trainings such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations may be considered towards the relevant experience requirement. (i.e., 20-24-week JCAC course may count as 6 months of experience) OR may be considered equivalent to a technical associates degree.
Foreign language proficiency and Defense Language Proficiency Test (DLPT) scores may be considered as relevant experience.
Experience in network or system administration required.
Active TS SCI security clearance with a current polygraph is required
Additional Qualifications
Degree in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Ability to conduct computer/network security and target development
Knowledge of all aspects of computer/network security, including firewall administration, encryption technologies and network protocols
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.
#NextGenFF
#AJCM
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyProduct Security Architect
Palo Alto, CA jobs
We are seeking an experienced Product Security Architect to join our Security Center of Excellence team and lead security initiatives across our cloud-based SaaS product portfolio. This role requires a unique blend of deep technical expertise, architectural vision, and collaborative leadership to ensure our products are built with security at their core. The ideal candidate will work at the intersection of security, development, and product design to create robust, secure solutions that protect our customers and their data.
Key Responsibilities
Security Architecture & Design
Design and implement comprehensive security architectures for cloud-based SaaS products, ensuring security is embedded throughout the product lifecycle
Conduct thorough threat modeling exercises for new and existing product features, identifying potential vulnerabilities and attack vectors
Define security requirements, patterns, and best practices for product development teams
Review and approve architectural designs from a security perspective, providing actionable guidance and recommendations
Product Security Assessment
Perform in-depth security assessments of products at the code, configuration, and architectural levels
Identify security vulnerabilities, weaknesses, and gaps in existing and proposed product implementations
Conduct code reviews with a focus on security, analyzing Java, Python, and React codebases for security flaws
Evaluate third-party integrations, APIs, and dependencies for security risks
Collaboration & Enablement
Partner closely with development teams to integrate security controls and best practices into the software development lifecycle
Work with QE teams to develop security test strategies, including penetration testing, vulnerability scanning, and security automation
Provide security guidance and mentorship to engineering teams, fostering a security-first culture
Translate complex security concepts into clear, actionable recommendations for technical and non-technicaål stakeholders
Cloud & Infrastructure Security
Design and implement security controls for cloud infrastructure and services (AWS, Azure, GCP)
Architect and implement IAM strategies including role-based access control (RBAC), attribute-based access control (ABAC), least privilege principles, and identity federation
Design secure network architectures including VPCs, security groups, network ACLs, microsegmentation, and zero-trust network access
Establish cloud configuration security standards and guardrails to prevent misconfigurations and ensure secure-by-default deployments
Ensure proper implementation of cloud security best practices including data encryption (at rest and in transit), secrets management, and compliance
Monitor and respond to emerging cloud security threats and vulnerabilities
Security Standards & Compliance
Establish and maintain security standards, policies, and procedures aligned with industry frameworks
Support compliance efforts including SOC 2, ISO 27001, GDPR, and other relevant standards
Stay current with evolving security threats, vulnerabilities, and industry best practices
Required Qualifications
Experience
8+ years of experience in information security, with at least 5 years specifically in product security architecture
Proven track record as a Product Security Architect in a SaaS or cloud-based company
Extensive experience with threat modeling methodologies (STRIDE, PASTA, or similar)
Hands-on experience identifying and remediating security vulnerabilities in production environments
Strong background working collaboratively with development and QE teams in agile environments
Technical Expertise
Deep understanding of secure coding practices and common vulnerability patterns (OWASP Top 10, CWE/SANS Top 25)
Proficiency in code-level security analysis across multiple languages, particularly Java, Python, and React/JavaScript
Strong knowledge of cloud security architectures and services (AWS, Azure, or GCP)
Expert-level knowledge of IAM principles and implementation including multi-factor authentication, single sign-on, privileged access management, service accounts, and identity lifecycle management
Deep understanding of network security including firewalls, IDS/IPS, VPN, TLS/SSL, DDoS protection, API gateways, and secure network segmentation
Extensive experience with cloud configuration security including infrastructure-as-code security, cloud security posture management, configuration drift detection, and automated compliance checking
Experience with authentication and authorization frameworks (OAuth 2.0, OpenID Connect, SAML, JWT, RBAC, ABAC)
Understanding of containerization and orchestration security (Docker, Kubernetes)
Knowledge of API security, microservices architecture, and distributed systems security
Familiarity with DevSecOps practices and security automation tools (SAST, DAST, SCA)
Certifications
CISSP (Certified Information Systems Security Professional) required
Additional relevant certifications valued:
Cloud security: CCSP, AWS Certified Security Specialty, Azure Security Engineer, Google Cloud Professional Security Engineer
Security architecture: CSSLP, SABSA
Penetration testing: CEH, OSCP, GPEN
Network security: CCNP Security, GIAC certifications
Preferred Qualifications
Experience with Infrastructure as Code (Terraform, CloudFormation) and security policy as code
Knowledge of zero-trust architecture principles and implementation
Experience with security incident response and vulnerability management programs
Background in software development or engineering
Experience with regulatory compliance frameworks and security audits
Published security research, conference presentations, or contributions to open-source security projects
Master's degree in Computer Science, Cybersecurity, or related field
Technical Skills
Programming & Scripting:
Java (enterprise application security)
Python (security automation, scripting)
JavaScript/React (frontend security)
Additional languages a plus (Go, Rust, C/C++)
Security Tools & Platforms:
SAST/DAST tools (Checkmarx, Fortify, Veracode, etc.)
Vulnerability scanners and penetration testing tools
Security information and event management (SIEM) platforms
Cloud security posture management (CSPM) tools
Cloud Platforms & Configuration:
AWS, Azure, or Google Cloud Platform
IAM services (AWS IAM, Azure AD, GCP IAM, identity federation)
Network security services (VPC, Security Groups, Network ACLs, WAF, Cloud Firewall)
Cloud configuration management and security scanning tools
Cloud-native security services and controls (GuardDuty, Security Hub, Azure Defender, Security Command Center)
Secrets management (AWS Secrets Manager, Azure Key Vault, HashiCorp Vault)
Serverless architecture security
Development & DevOps:
CI/CD pipelines and security integration
Version control systems (Git)
Containerization and orchestration
Agile/Scrum methodologies
Personal Attributes
Strong analytical and problem-solving skills with attention to detail
Excellent communication skills with the ability to influence and educate diverse audiences
Self-motivated with the ability to work independently and as part of a team
Passionate about security and staying ahead of emerging threats
Pragmatic approach to balancing security with business needs and user experience
What We Offer
Opportunity to shape security architecture for cutting-edge Cybersecurity SaaS products
Collaborative environment with highly talented engineering teams
Professional development and growth opportunities
Competitive compensation and benefits package
We are an equal opportunity employer and value diversity in our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Information Systems Security Officer (ISSO) Level 2
Columbia, MD jobs
Information Systems Security Officer Level 2 BTS Software Solutions is seeking an Information Systems Security Officer to execute the Information Assurance mission. This opportunity is for a future award expected in Oct 2025 Job Description: Provide support for a program, organization, system, or enclaves information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the
system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems
security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Primary Location: Annapolis Junction, MD
Clearance Requirement: Top Secret/SCI with Poly
Degree Requirement:
Bachelors degree in computer science or related discipline from an accredited college or university is required.
Relevant Experience:
* Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
* Assist with preparation and maintenance of documentation
* Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
* Assist with the CM for information system security software, hardware, and firmware
* Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades
* Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
* Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
* Provide CM for security-relevant information system software, hardware, and firmware
* Develop system security policy and ensures compliance
* Evaluate security solutions to ensure they meet security requirements for processing classified information
* Maintain operational security posture for an information system or program
* Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
* Develop and update the system security plan and other IA documentation
* Assist with the management of security aspects of the information system and perform day today security operations of the system
* Obtain C&A for ISs under their purview
* Provide support for a program, organization, system, or enclave's information assurance program
* Plan and coordinate the IT security programs and policies
* Manage and control changes to the system and assess the security impact of those changes
* Provide daily oversight and direction to contractor ISSOs
* (U) Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives
Education and Experience:
Eight (8) years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required. Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption and encryption techniques/tools. Bachelor's degree in Computer
Science, Cyber Security or IT Engineering is required. In lieu of a Bachelors degree, four (4) additional years of work-related experience may be substituted. DoD 8570 compliance with IAM I is required.
Pay Range: $125,000-$148,000
The BTS pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting offers considers various factors to establish an equitable and competitive compensation package. These considerations include, but are not limited to, the extent and intricacy of the roles responsibilities, the candidates educational background, their work experience, and the specific competencies crucial for success in the role.
Company Overview:
BTS Software Solutions is a Service-Disabled Veteran-Owned Small Business who are community-focused innovators who transform ideas into technology to serve people. We recognize that innovation is only valuable when applied towards a needed solution. Technology has no value without the hard work to turn ideas into reality. Our roots are in helping save Soldiers lives through technology. We bring that ethos to serving our community. We create solutions that touch people's lives - products to communicate, to connect companies with customers, to stay informed, to save lives, and to enhance lives.
We have a small company persona with a large company ethos and capabilities; we create elegant solutions for complex problems that will enrich peoples lives. We offer one of the best benefits packages in the industry: Competitive health benefits package, PTO, 401K matching and vested from day one to name just a few of our benefits and perks.
BTS Software Solutions is an Equal Opportunity Employer (EOE). All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Cyber Defense Analyst
Remote
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a “click-through-the-console” SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$144,500-$170,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
Auto-ApplyInformation Security Governance Specialist - Vice President
New York, NY jobs
About the Role
iCapital is looking to hire a Vice President Information Security Governance Specialist. This individual will be a key person in iCapital's second line of defense team. The ideal candidate will support the organization's security governance program by ensuring compliance with regulatory requirements, security frameworks, and contractual obligations. This role involves reviewing the information security program against industry standards, assessing security clauses in client and vendor contracts, designing and maintaining security controls, and responding to regulatory audits.
Responsibilities
Assist in authoring, maintaining, and updating security governance policies and standards to align with industry frameworks and management direction.
Evaluate the organization's information security program against common frameworks (e.g., ISO 27001, CIS, NIST 800-53, SOC 2) and applicable regulations (e.g., NYDFS, DORA, FFIEC, GDPR).
Identify gaps and recommend control enhancements to align with compliance requirements.
Review and negotiate information security sections of client and vendor contracts in partnership with the Legal team.
Ensure contractual obligations meet internal security standards, regulatory expectations, and reasonability.
Collaborate with Technology, Information Security, and Risk teams to design, document, and enhance security controls for infrastructure, applications, and data.
Coordinate responses for internal and regulatory audits for information security team.
Qualifications
7-10 years of experience in information security governance, compliance, or risk management in a financial service, fintech, or technology-driven environment
Bachelor's degree in information security, risk management, or a related field
Strong written and verbal communication skills
Excellent analytical and problem-solving skills
Able to manage multiple priorities and deadlines in a fast-paced environment
Comfortable engaging with senior leaders
Knowledge of cybersecurity frameworks (ISO, CIS, NIST, SOC 2) and audit processes
CISM, CRISC, or CISSP certifications are preferred
Benefits
The base salary range for this role is $150,000 to $180,000. iCapital offers a compensation package which includes salary, equity for all full-time employees, and an annual performance bonus. Employees also receive a comprehensive benefits package that includes an employer matched retirement plan, generously subsidized healthcare with 100% employer paid dental, vision, telemedicine, and virtual mental health counseling, parental leave, and unlimited paid time off (PTO).
We believe the best ideas and innovation happen when we are together. Employees in this role will work in the office Monday-Thursday, with the flexibility to work remotely on Friday.
For additional information on iCapital, please visit **************************************** Twitter: @icapitalnetwork | LinkedIn: ***************************************************** | Awards Disclaimer: ****************************************/recognition/
iCapital is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender, sexual orientation, gender identity, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Auto-ApplyInformation System Security Officer II (TS/SCI Clearance Required)
Centennial, CO jobs
Sierra Space Careers: Dare to Dream
We honor those that are not afraid to dream big dreams, those that tenaciously chase their dreams even when others say it cannot be done, those that achieve big dreams and change everything. Those are Dreams Worth Chasing.
At Sierra Space we envision a future where humanity lives and works in space, on moons, and on distant planets. Our mission isn't restricted to the few, instead we see a future where all people can choose to live, work, discover and explore beyond our planet. Our company is building a platform in space to benefit life on Earth and together we will alter the course of humanity.
We have a bold mission. We are a bold company. Together, we are an extraordinary team.
About the RoleWe are seeking a highly skilled and experienced Information Systems Security Officer (ISSO) with a strong emphasis on the Risk Management Framework (RMF). The ISSO will be responsible for ensuring the security and integrity of our information systems by implementing and managing security measures in accordance with RMF guidelines. The ideal candidate will have a deep understanding of RMF processes, cybersecurity principles, and compliance requirements.About You
Our mission is driven by the unwavering passion to push the boundaries of what is possible. We seek those who Dare to Dream - to envision the extraordinary and pursue it relentlessly - to join us on this transformational journey.
We're looking for dreamers who align with our values, vision and audacious goals - while also meeting the minimum qualifications below. The preferred qualifications are a bonus, not a requirement.
Key Responsibilities:
Develop, implement, and maintain security policies, procedures, and controls in accordance with RMF guidelines.
Conduct risk assessments to identify potential security threats and vulnerabilities.
Develop and maintain System Security Plans (SSPs) and other required documentation.
Ensure compliance with federal, state, and organizational security regulations and standards.
Perform continuous monitoring of information systems to detect and respond to security incidents.
Collaborate with system owners, administrators, and other stakeholders to ensure security controls are effectively implemented.
Conduct security control assessments and audits to evaluate the effectiveness of security measures.
Provide guidance and support for the development and implementation of security controls.
Prepare and present security status reports to management and other stakeholders.
Stay current with emerging security trends, threats, and technologies.
Minimum Qualifications:
Requires Bachelor's degree in a related field (or equivalent work experience in lieu of degree).
Typically 2+ years of related experience.
Certifications: (1 or more required) GIAC (Global Information Assurance Certification), network technology
certifications such as a CCNP (Cisco Certified Network Professional), or SANS level 200 courses.
Knowledge of secure software development.
Knowledge of cyber supply chain threat monitoring.
An active Top Secret with SCI eligibility and the ability to obtain a CI polygraph U.S. Security Clearance.
Preferred Qualifications:
In-depth knowledge of RMF processes, NIST SP 800-37, NIST SP 800-53, and other relevant standards.
Experience with security assessment and authorization (A&A) processes.
Strong understanding of cybersecurity principles, including risk management, incident response, and vulnerability management.
Relevant certifications such as CISSP, CISM, CAP, or similar are highly desirable.
Excellent analytical, problem-solving, and communication skills.
Ability to work independently and as part of a team in a fast-paced environment.
Compensation:
Pay Range:
$94,050.00 - $129,318.75
Your actual base compensation will be determined on a case-by-case basis and may vary based on job-related knowledge and skills, education, experience, internal equity and market competitiveness.
IMPORTANT NOTICE:
This position requires current/active Top Secret with SCI eligibility and current CI polygraph U.S. Security Clearance. U.S. Citizenship status is required as this position needs an active U.S. Security Clearance for employment. Non-U.S. Citizens may not be eligible to obtain a security clearance. The Department of Defense Consolidated Adjudications Facility (DoD CAF), a federal government agency, handles the adjudicative aspects of the security clearance eligibility process for industry applicants. Adjudicative factors which affect the outcome of the eligibility determination include, but are not limited to, allegiance to the U.S., foreign influence, foreign preference, criminal conduct, security violations and illegal drug use.
Elevate Your Career
At Sierra Space, we are committed to your personal and professional development. We empower you to make profound and meaningful contributions and foster a vibrant culture of collaboration, where teamwork ignites breakthrough innovations.
Sierra Space offers annual incentive pay based upon performance that is commensurate with the level of the position.
We also offer a generous benefit package, including medical, dental, and vision plans, 401(k) with 150% match up to 8%, life insurance, 3 weeks paid time off, and more.
At Sierra Space we are at the very doorstep of unlocking the future and the work in front of us is hard, but it is truly important and meaningful. Achieving our mission requires dedication, relentless pursuit of a dream and an unwavering passion for pushing the boundaries to accomplish what others might believe to be impossible. We seek those who too, Dare to Dream and will join us in a pursuit to achieve the extraordinary.
Application Deadline: This role will remain posted until a qualified pool of candidates is
identified.
Please note: Sierra Space does not accept unsolicited resumes from contract agencies or search firms. Any unsolicited resumes submitted to our website or to Sierra Space team members not through our approved vendor list or Talent Acquisition will be considered property of Sierra Space, and we will not be obligated to pay any referral fees.
Sierra Space Corporation is an equal opportunity employer and is committed to working with and providing reasonable accommodations to applicants with disabilities. If you need special assistance or a reasonable accommodation related to applying for employment with Sierra Space or at any stage of the recruitment process, please contact us.
Auto-ApplyInformation System Security Officer I (TS/SCI Required)
Louisville, CO jobs
Sierra Space Careers:
At Sierra Space, we build the missions and systems that keep our world secure in the domain above Earth.
Sierra Space team members share a spirit of innovation and collaboration and a belief that we can deliver on the boldest missions in space today. Together with our customers, we aim to safeguard our nation, sustain human presence in space, and secure the freedom of operations in low Earth orbit and beyond.
Our success is measured by the trust of those who rely on what we build and deliver, and our technologies keep the United States and its allies mission-ready throughout space.
We are mission-driven, and together, we are an extraordinary team.
About the RoleThe Cybersecurity Engineer I is an entry-level position responsible for designing, implementing, and maintaining security measures to protect the organization's information systems. This role involves working with various security technologies, including, encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. They will have foundational knowledge of computer networking concepts, protocols, and network security methodologies, as well as an understanding of cybersecurity and privacy principles. The Cybersecurity Engineer I will work closely with senior engineers and cross-functional teams to ensure the security and integrity of the organization's information systems. This position offers the opportunity to gain hands-on experience in cybersecurity engineering, stay updated with the latest industry trends, and contribute to the continuous improvement of the organization's security posture.
In this role, you will support the design, implementation, and maintenance of security measures such as encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. You will assist in the configuration, deployment, and management of security tools and technologies, while also implementing and managing network security measures to protect data, systems, and networks. Conducting vulnerability assessments and penetration testing to identify and mitigate security risks will be a key responsibility, along with developing and maintaining security policies, procedures, and documentation. You will collaborate with cross-functional teams to integrate security best practices into system designs and deployments, monitor and respond to security incidents and alerts, and provide technical support and troubleshooting. Staying updated with the latest industry trends, emerging threats, and regulatory requirements will be essential, as will participating in security audits and assessments to ensure compliance with cybersecurity frameworks.About You
Our mission is driven by an unyielding commitment to advancing space-based technology in service of our customers and safeguarding national security. We seek individuals who are passionate about innovating beyond boundaries and relentlessly pursuing solutions that protect, preserve and empower - to join us in this critical mission.
We're looking for team members who align with our values, mission and goals - while also meeting the minimum qualifications below. The preferred qualifications are a bonus, not a requirement.
Minimum Qualifications:
Requires Bachelor's degree in a related field (or equivalent work experience in lieu of degree).
Typically entry-level 0 - 2 years of experience.
Certifications: (1 or more required) Network+, A+ Certified Ethical Hacker, SANS (SysAdmin, Audit, Network and Security) level 100 courses or similar.
Knowledge of computer networking concepts, protocols, and network security methodologies.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of audit and logging techniques.
Knowledge of structure, architectures, designs, and cybersecurity technologies used in modern communication networks.
Knowledge of common cybersecurity frameworks.
Preferred Qualifications:
Certifications: Security+, CySA+, GSEC, or equivalent.
Familiarity with security information and event management (SIEM) tools.
Basic understanding of cloud security platforms such as AWS, Azure, or Google Cloud.
Strong problem-solving skills and attention to detail.
Excellent communication and teamwork skills.
Willingness to learn and adapt to new technologies and methodologies.
Compensation:
Pay Range:
$74,085.00 - $101,887.50
Your actual base compensation will be determined on a case-by-case basis and may vary based on job-related knowledge and skills, education, experience, internal equity and market competitiveness.
Elevate Your Career
At Sierra Space, we are committed to your personal and professional development. We empower you to make profound and meaningful contributions and foster a vibrant culture of collaboration, where teamwork ignites breakthrough innovations.
We also offer a generous benefit package, including medical, dental, and vision plans, 401(k) with 150% match up to 6%, life insurance, 3 weeks paid time off, and more.
Sierra Space is an industry-leading space and defense technology company providing satellites, spacecraft, and enabling mission systems and components. We deliver mission-proven technologies to our customers that safeguard our nation, protect space-based assets and enable space exploration.
Application Deadline: This role will remain posted until a qualified pool of candidates is
identified.
Please note: Sierra Space does not accept unsolicited resumes from contract agencies or search firms. Any unsolicited resumes submitted to our website or to Sierra Space team members not through our approved vendor list or Talent Acquisition will be considered property of Sierra Space, and we will not be obligated to pay any referral fees.
Sierra Space Corporation is an equal opportunity employer and is committed to working with and providing reasonable accommodations to applicants with disabilities. If you need special assistance or a reasonable accommodation related to applying for employment with Sierra Space or at any stage of the recruitment process, please contact us.
Auto-ApplyInformation System Security Officer I (TS/SCI Required)
Centennial, CO jobs
Sierra Space Careers:
At Sierra Space, we build the missions and systems that keep our world secure in the domain above Earth.
Sierra Space team members share a spirit of innovation and collaboration and a belief that we can deliver on the boldest missions in space today. Together with our customers, we aim to safeguard our nation, sustain human presence in space, and secure the freedom of operations in low Earth orbit and beyond.
Our success is measured by the trust of those who rely on what we build and deliver, and our technologies keep the United States and its allies mission-ready throughout space.
We are mission-driven, and together, we are an extraordinary team.
About the RoleThe Cybersecurity Engineer I is an entry-level position responsible for designing, implementing, and maintaining security measures to protect the organization's information systems. This role involves working with various security technologies, including, encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. They will have foundational knowledge of computer networking concepts, protocols, and network security methodologies, as well as an understanding of cybersecurity and privacy principles. The Cybersecurity Engineer I will work closely with senior engineers and cross-functional teams to ensure the security and integrity of the organization's information systems. This position offers the opportunity to gain hands-on experience in cybersecurity engineering, stay updated with the latest industry trends, and contribute to the continuous improvement of the organization's security posture.
In this role, you will support the design, implementation, and maintenance of security measures such as encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. You will assist in the configuration, deployment, and management of security tools and technologies, while also implementing and managing network security measures to protect data, systems, and networks. Conducting vulnerability assessments and penetration testing to identify and mitigate security risks will be a key responsibility, along with developing and maintaining security policies, procedures, and documentation. You will collaborate with cross-functional teams to integrate security best practices into system designs and deployments, monitor and respond to security incidents and alerts, and provide technical support and troubleshooting. Staying updated with the latest industry trends, emerging threats, and regulatory requirements will be essential, as will participating in security audits and assessments to ensure compliance with cybersecurity frameworks.About You
Our mission is driven by an unyielding commitment to advancing space-based technology in service of our customers and safeguarding national security. We seek individuals who are passionate about innovating beyond boundaries and relentlessly pursuing solutions that protect, preserve and empower - to join us in this critical mission.
We're looking for team members who align with our values, mission and goals - while also meeting the minimum qualifications below. The preferred qualifications are a bonus, not a requirement.
Minimum Qualifications:
Requires Bachelor's degree in a related field (or equivalent work experience in lieu of degree).
Typically entry-level 0 - 2 years of experience.
Certifications: (1 or more required) Network+, A+ Certified Ethical Hacker, SANS (SysAdmin, Audit, Network and Security) level 100 courses or similar.
Knowledge of computer networking concepts, protocols, and network security methodologies.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of audit and logging techniques.
Knowledge of structure, architectures, designs, and cybersecurity technologies used in modern communication networks.
Knowledge of common cybersecurity frameworks.
Preferred Qualifications:
Certifications: Security+, CySA+, GSEC, or equivalent.
Familiarity with security information and event management (SIEM) tools.
Basic understanding of cloud security platforms such as AWS, Azure, or Google Cloud.
Strong problem-solving skills and attention to detail.
Excellent communication and teamwork skills.
Willingness to learn and adapt to new technologies and methodologies.
Compensation:
Pay Range:
$74,085.00 - $101,887.50
Your actual base compensation will be determined on a case-by-case basis and may vary based on job-related knowledge and skills, education, experience, internal equity and market competitiveness.
Elevate Your Career
At Sierra Space, we are committed to your personal and professional development. We empower you to make profound and meaningful contributions and foster a vibrant culture of collaboration, where teamwork ignites breakthrough innovations.
We also offer a generous benefit package, including medical, dental, and vision plans, 401(k) with 150% match up to 6%, life insurance, 3 weeks paid time off, and more.
Sierra Space is an industry-leading space and defense technology company providing satellites, spacecraft, and enabling mission systems and components. We deliver mission-proven technologies to our customers that safeguard our nation, protect space-based assets and enable space exploration.
Application Deadline: This role will remain posted until a qualified pool of candidates is
identified.
Please note: Sierra Space does not accept unsolicited resumes from contract agencies or search firms. Any unsolicited resumes submitted to our website or to Sierra Space team members not through our approved vendor list or Talent Acquisition will be considered property of Sierra Space, and we will not be obligated to pay any referral fees.
Sierra Space Corporation is an equal opportunity employer and is committed to working with and providing reasonable accommodations to applicants with disabilities. If you need special assistance or a reasonable accommodation related to applying for employment with Sierra Space or at any stage of the recruitment process, please contact us.
Auto-ApplyInformation Systems Security Officer (ISSO) II
Columbia, MD jobs
BTS Software Solutions is seeking an Information Systems Security Officer (ISSO) II with an active TS/SCI w/ POLY to join our team in Ft. Meade, MD What You'll Get To Do: * Provides support for a program, organization, system, or enclaves information assurance program.
* Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
* Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
* Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
* Evaluate security solutions to ensure they meet security requirements for processing classified information.
* Performs vulnerability/risk assessment analysis to support certification and accreditation.
* Provides configuration management (CM) for information system security software, hardware, and firmware.
* Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
* Supports security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Skills You'll Bring:
* Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
* Assist with the preparation and maintenance of documentation
* Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
* Assist with the CM for information system security software, hardware, and firmware
* Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
* Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
* Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
* Provide CM for security-relevant information system software, hardware, and firmware
* Develop system security policy and ensure compliance
* Evaluate security solutions to ensure they meet security requirements for processing classified information
* Maintain operational security posture for an information system or program
* Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
* Develop and update the system security plan and other IA documentation
* Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
* Administer the user identification and authentication mechanism of the Information System (IS)
* Obtain C&A for ISs under their purview
* Provide support for a program, organization, system, or enclaves information assurance program
* Plan and coordinate the IT security programs and policies
* Manage and control changes to the system and assess the security impact of those changes
* Serve as the Approval Authority for ISs under their control
Education/Qualifications:
* Ten (10) years of experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
* Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
* Bachelors degree in Computer Science or a related discipline from an accredited college or university is required.
* DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
* Four (4) years of additional experience as an ISSO may be substituted for a bachelors degree
About BTS Software Solutions
BTS Software Solutions is a Service Disabled Veteran Owned Small Business who are community-focused innovators who transform ideas into technology to serve people. We recognize that innovation is only valuable when applied towards a needed solution. Technology has no value without the hard work to turn ideas into reality. Our roots are in helping save Soldiers lives through technology. We bring that ethos to serving our community. We create solutions that touch people's lives - products to communicate, to connect companies with customers, to stay informed, to save lives, and to enhance lives.
We have a small company persona with a large company ethos and capabilities; we create elegant solutions for complex problems that will enrich peoples lives. BTS offers one of the best benefits packages in the industry: 100% Company PAID health benefits, PTO, 401K matching and vested from day one of employment, to name just a few of our benefits and perks. To learn more about BTS Software Solutions visit us at ****************************
BTS Software Solutions is an Equal Opportunity Employer (EOE). All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Information Security Governance Specialist - Vice President
Greenwich, CT jobs
About the Role
iCapital is looking to hire a Vice President Information Security Governance Specialist. This individual will be a key person in iCapital's second line of defense team. The ideal candidate will support the organization's security governance program by ensuring compliance with regulatory requirements, security frameworks, and contractual obligations. This role involves reviewing the information security program against industry standards, assessing security clauses in client and vendor contracts, designing and maintaining security controls, and responding to regulatory audits.
Responsibilities
Assist in authoring, maintaining, and updating security governance policies and standards to align with industry frameworks and management direction.
Evaluate the organization's information security program against common frameworks (e.g., ISO 27001, CIS, NIST 800-53, SOC 2) and applicable regulations (e.g., NYDFS, DORA, FFIEC, GDPR).
Identify gaps and recommend control enhancements to align with compliance requirements.
Review and negotiate information security sections of client and vendor contracts in partnership with the Legal team.
Ensure contractual obligations meet internal security standards, regulatory expectations, and reasonability.
Collaborate with Technology, Information Security, and Risk teams to design, document, and enhance security controls for infrastructure, applications, and data.
Coordinate responses for internal and regulatory audits for information security team.
Qualifications
7-10 years of experience in information security governance, compliance, or risk management in a financial service, fintech, or technology-driven environment
Bachelor's degree in information security, risk management, or a related field
Strong written and verbal communication skills
Excellent analytical and problem-solving skills
Able to manage multiple priorities and deadlines in a fast-paced environment
Comfortable engaging with senior leaders
Knowledge of cybersecurity frameworks (ISO, CIS, NIST, SOC 2) and audit processes
CISM, CRISC, or CISSP certifications are preferred
Benefits
The base salary range for this role is $150,000 to $180,000. iCapital offers a compensation package which includes salary, equity for all full-time employees, and an annual performance bonus. Employees also receive a comprehensive benefits package that includes an employer matched retirement plan, generously subsidized healthcare with 100% employer paid dental, vision, telemedicine, and virtual mental health counseling, parental leave, and unlimited paid time off (PTO).
We believe the best ideas and innovation happen when we are together. Employees in this role will work in the office Monday-Thursday, with the flexibility to work remotely on Friday.
For additional information on iCapital, please visit **************************************** Twitter: @icapitalnetwork | LinkedIn: ***************************************************** | Awards Disclaimer: ****************************************/recognition/
iCapital is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender, sexual orientation, gender identity, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Auto-ApplySr. Information System Security Officer
Elizabeth City, NC jobs
Job Description
Who We Are: Oasys International, LLC (Oasys) is a rapidly expanding firm that has been recognized on Inc. 5000 magazine's list of the fastest-growing companies for five consecutive years. We are a dynamic organization dedicated to providing world-class technology consulting services through our team of expert technologists, consultants, engineers, and subject matter experts. At Oasys, we prioritize continuous learning, a healthy work-life balance, and a collaborative work environment. Our culture is merit-based, recognizing and rewarding performance and fostering a supportive and social atmosphere.
Position Summary:
Oasys is seeking a Sr. Information System Security Officer to support the United States Coast Guard (USCG) at the Aviation Logistics Center (ALC)-Information Systems Division (ISD). The Sr. Information System Security Officer (ISSO) will provide subject matter expertise in Risk Management Framework (RMF) execution, security control validation, continuous monitoring, and audit readiness to sustain the Authorization to Operate (ATO) lifecycle for mission-critical systems.
The Senior ISSO will play a central role in ensuring systems maintain compliance with federal cybersecurity standards including NIST 800-53, FISMA, and DHS 4300A, and will serve as a key security liaison across development, operations, and governance teams.
Primary Responsibilities:
Serve as the lead security representative for system RMF lifecycle activities, including control selection, implementation, testing, and documentation.
Develop, review, and maintain key RMF artifacts such as System Security Plans (SSPs), Security Assessment Reports (SARs), Contingency Plans (CPs), and POA&Ms.
Ensure systems maintain a valid Authorization to Operate (ATO) through continuous monitoring, vulnerability assessments, and compliance reporting.
Validate the implementation of security controls and document evidence in Enterprise Mission Assurance Support Service (eMASS).
Collaborate with cybersecurity engineers, auditors, and control assessors to prepare for internal and external security audits and inspections.
Analyze and respond to scan results, SIEM alerts, audit logs, change management actions, and potential cybersecurity incidents.
Support the integration of security into DevSecOps pipelines, ensuring secure configuration management, patching, and container security practices.
Provide security engineering guidance to development and infrastructure teams in areas such as encryption, access controls, secure protocols, and authentication methods.
Lead the execution of cybersecurity training, awareness initiatives, and policy compliance briefings for staff and stakeholders.
Identify, assess, and mitigate risks associated with system design, implementation, and operational posture.
Provide oversight for managing privacy-related data, insider threat indicators, and incident handling workflows in accordance with federal mandates.
All other duties as assigned by management.
Skills/Qualifications:
Advanced understanding of NIST RMF, NIST SP 800-37, 800-53 Rev. 5, DHS 4300A, and FISMA compliance requirements.
Hands-on experience with SIEM tools, eMASS, vulnerability scanning platforms, and ATO documentation processes.
Proven ability to develop and maintain ATO documentation and assess control effectiveness across multiple systems.
Experience implementing cybersecurity best practices in complex hybrid environments (on-premise, virtual, and cloud-based).
Strong working knowledge of Active Directory, Linux/Windows administration, and secure infrastructure hardening.
Familiarity with Agile/DevSecOps development cycles and secure code integration principles.
Excellent analytical, organizational, and communication skills, with an ability to brief senior stakeholders and deliver formal documentation.
Education/Experience Requirements:
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of six (6) years experience in information security/information assurance.
Minimum of five (5) years of experience in the risk management framework.
Hands-on experience with Active Directory, Windows/UNIX systems, and relational databases in secure environments.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Clearance:
U.S. citizenship required
Must have an active DoD Secret Clearance.
Certification Requirement
IAM (Information Assurance Management) Level II certification required (CompTIA Security+, CompTIA CySA, (ISC)² SSCP, CCNA Security, GSEC, CND, or CompTIA PenTest+)
Additional certifications (Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), ITIL Foundation, TOGAF, or other cybersecurity architecture certifications) are a plus.
Work Location:
Elizabeth City, NC - Hybrid
North Carolina Region - Must be able to go on-site at least three days a week
Oasys is proud to be an equal opportunity employer for all protected groups, including protected veterans and individuals with disabilities.
Cyber Defense Analyst
San Francisco, CA jobs
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
Auto-ApplyCOMPUTER NETWORK DEFENSE ANALYST (Levels I-IV)
Columbia, MD jobs
COMPUTER NETWORK DEFENSE ANALYST BTS Software Solutions is seeking COMPUTER NETWORK DEFENSE ANALYST (CNDAs) to support Department of Defense IC missions at Annapolis Junction, MD. As an CNDA, you will be given the opportunity to showcase your SIGINT/CYBER analysis talent and expertise while supporting missions that are vital to our national security.
Primary Location: Annapolis Junction, MD
Secondary Locations: Augusta, GA; Wahiawa, HI; Dayton, OH; Hill AFB, UT; various locations
Clearance: Active TS/SCI with Polygraph
What Youll Get to Do
As a CNDA, you will:
* Use information collected from a variety of sources to identify and analyze vulnerabilities and report potential or actual events.
* Identify, analyze, map, and/or protect against vulnerabilities, intrusions, and threats to computer network systems
Youll Bring These Qualifications:
Degree Requirements:
* Degree in Network Engineering, Systems Engineering, Information Technology, or related fields (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
* Note that 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree.
Specific Experience:
* Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
* Completion of military training in a relevant area such as Joint Cyber Analysis Course (JCAC), Undergraduate Cyber Training, Network Warfare Bridge Course/intermediate Network Warfare Training, and Cyber Defense Operations.
Education and Experience:
Entry level positions require an Associate's degree plus 4 years of relevant experience, or a Bachelor's degree and 2 years of relevant experience. Higher positions require up to and including an Associate's degree plus 13 years of relevant experience, a Bachelor's degree and 11 years of relevant experience OR a Master's Degree and 9 years of relevant experience.
Pay Range: $120,000-$260,000
The BTS pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting offers considers various factors to establish an equitable and competitive compensation package. These considerations include, but are not limited to, the extent and intricacy of the roles responsibilities, the candidates educational background, their work experience, and the specific competencies crucial for success in the role.
Company Overview:
BTS Software Solutions is a Service-Disabled Veteran Owned Small Business who are community-focused innovators who transform ideas into technology to serve people. We recognize that innovation is only valuable when applied towards a needed solution. Technology has no value without the hard work to turn ideas into reality. Our roots are in helping save Soldiers lives through technology. We bring that ethos to serving our community. We create solutions that touch people's lives - products to communicate, to connect companies with customers, to stay informed, to save lives, and to enhance lives.
We have a small company persona with a large company ethos and capabilities; we create elegant solutions for complex problems that will enrich peoples lives. We offer one of the best benefits packages in the industry: Competitive health benefits package, PTO, 401K matching and vested from day one to name just a few of our benefits and perks.
BTS Software Solutions is an Equal Opportunity Employer (EOE). All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law
Systems Cybersecurity
Warner Robins, GA jobs
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH.
Requirements
Responsibilities include, but are not limited to the duties listed below
At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001).
Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management.
To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology.
Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
Education, Requirements and Qualifications
Active TS/SCI required
Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations.
OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations.
Excellent written and verbal communication skills
Job may require the employee to be:
Willingness to travel if needed.
In a stationary position 50% of the time
Able to ascend/descend stairs as needed
Able to move equipment not to exceed 25 lbs. as needed.
Please join us, as together we build a better world one mission at a time powered by technology and its people!
#LI-Onsite
#veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Short Term & Long Term Disability
Information Security Analyst
Indianapolis, IN jobs
. Must live in the Indianapolis area.
Pay: $42.70/hour
In this role you will:
• Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement
• Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment
• Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53)
• Develop Standard Operating Procedures (SOP) for implementing security polices
• Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems
• Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data
• Develop and implement procedures for use of information security management software
• Propose information security software enhancements
• Perform periodic audits to assure security policies and standards are being followed and are effective
• Develop recommendations for enhancements and generates reports where necessary
• Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
Information Security Analyst
Indianapolis, IN jobs
Job Description
. Must live in the Indianapolis area.
Pay: $42.70/hour
In this role you will:
• Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement
• Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment
• Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53)
• Develop Standard Operating Procedures (SOP) for implementing security polices
• Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems
• Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data
• Develop and implement procedures for use of information security management software
• Propose information security software enhancements
• Perform periodic audits to assure security policies and standards are being followed and are effective
• Develop recommendations for enhancements and generates reports where necessary
• Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
Systems Engineer - Active Security Clearance
Reston, VA jobs
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
This Systems Engineer position is located in Northern Virginia with flexible core hours and includes 10% or less domestic travel.
The Systems Engineer is responsible for developing, engineering, and deploying technical solutions within a dedicated network. This individual will work within a small, mission focused team of network and systems engineers to implement technical solutions to challenging collaboration and data protection problems.
Duties: This Systems Engineer performs the following core functions:
Develop / Test / Scale / Deploy / Maintain technology solutions
Build solutions with a focus on information security principals
Work extensively with Microsoft technologies and virtualization platforms
Monitor networks
Performs other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in Computer Science, Information Systems, Engineering, Business, or a scientific or technical discipline related to the specific skill
No degree + ten (10) years relevant experience
Associate's degree + eight (18) years relevant experience
Bachelor's degree + six (6) years relevant experience
Minimum of six (6) years of relevant experience in the areas of Computer Science, Engineering, Information Technology, Information Systems (or comparable documented work experience)
Ability to travel on an infrequent, but as needed basis, primarily domestic
Knowledge of and hands on experience with modern server operating systems and virtualization technologies
Knowledge of and hands on experience with Virtual Desktop technologies
Knowledge of and hands on experience with Cloud platforms
Knowledge of and hands on experience with collaboration and ticketing tools
Knowledge of high availability technologies and concepts
Knowledge and hands on experience with networking and network security technologies
Experience with managing engineering projects (i.e., design, build, deploy)
Knowledge and hands on experience with scripting languages such as, Bash, Powershell, Python, etc.
Knowledge of and hands on experience implementing IT and Cyber Security best practices
Ability to assess emerging technologies, determine their impact on corporate systems and incorporate them into technical plans
Strong analytical and problem-solving skills; demonstrated ability to analyze complex situations, determine course of action and act promptly and effectively when problems arise
Demonstrated outstanding interpersonal skills and strong verbal and written communications skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Poly dates within the last five years
Experience building, deploying, maintaining, Windows and RedHat/CentoS servers
Experience building, deploying, maintaining, Citrix VDI Desktops
Knowledge and hands on experience with Microsoft Azure, and Azure Stack Hub
Experience building, deploying, maintaining, Atlassian products such as JIRA and Confluence
Experience building, deploying, maintaining, Microsoft Exchange
Experience building, deploying, maintaining clusters, load balancers, multi-datacenter applications
Experience with Cisco Application Centric Infrastructure (ACI)
Experience designing, building, deploying, and maintaining sensitive networks
Experience with Enterprise database platforms such as MS SQL Server and Oracle databases
Experience with One Way Transfer Solutions and data flow management
Knowledge of SIEM and security analytical technologies (e.g. Splunk, pcap, Netflow, etc)
Experience with Active Directory and identity management
Experience with hyper-converged infrastructure such as Cisco HX, Microsoft Storage Spaces Direct
Knowledge of DevOps/DevSecOps methodologies and tools
Network Analyst - Active Security Clearance
Reston, VA jobs
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Network Analyst - Active Security Clearance
Reston, VA jobs
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Job Posted by ApplicantPro