Information Security Engineer jobs at Public Consulting Group - 1793 jobs
Senior Security Engineer
Ladder 4.4
Palo Alto, CA jobs
Senior SecurityEngineer (Must have 3-5 years exp, Google SecOps & Security Command Center Enterprise) About Ladder
We saw a problem within the life insurance industry: getting covered took too long, involved too much paperwork, and required too many in-person meetings with sales agents. Having lost his father at a young age, our CEO, Jamie, was determined to make it easier for people to get the coverage they needed to provide for their families. So, we got to work. We developed a method of real-time underwriting leveraging AI and, in doing so, reduced the months-long process of applying for life insurance to minutes. Our digital experience is quick (instant decisions!), loved by users (check out our Trustpilot or Google reviews) and prolific ($74 billion+ in coverage provided).
About the role
We're looking for a Senior SecurityEngineer to help us build out our monitoring and detection capabilities.
Please note, this can be a hybrid role based in our Palo Alto headquarters or a remote role based role in one of the 23 States Ladder is currently hiring in - AZ, CA, CO, CT, FL, GA, IA, KS, MA, MD, MN, NC, NH, NJ, NV, NY, OH, OR, PA, TX, VA, WA, WI.
Please note, Ladder is not currently sponsoring or transferring OPT or H1-B visa's.
What You'll Do
Improve ongoing monitoring and detection capabilities by adding data sources, creating detections, and building workflows in Google SecOps and Security Command Center Enterprise
Ensure we are protected against the latest threat by staying current on emerging security threats and actively monitoring various threat intelligence sources for latest trends, campaigns, and adversary TTPs
Collaborate with our Engineering and Product teams via threat modeling and design reviews
Help secure our Googlebased corporate and production environments
Assist IT in manage our SaaS applications and make sure people have access to what they should and not more
Iterate on cloud, network, application, personnel, and device security
Assess and secure internal and external applications, APIs, and CI/CD processes
Assist with SOC2 and compliance program control implementation
Triage alerts and respond to security incidents
Collaborate with peers and stakeholders across the company to ensure our customers are protected as best as possible at all times
Who You Are
3-5 years of experience in informationsecurity, with a strong focus on application security and/or detection engineering
1-2 years of experience in information technology
Working knowledge of secure coding practices, application security frameworks, and common vulnerabilities
OSCP, HTB-CPTS, PNPT, eCPPTv2, or equivalent training/certs
Apple workstation security experience
Familiarity with Google Cloud Platform, Datadog, Google SecOps (Chronicle), JAMF Protect, etc
Passion for building security tooling to enhance and automate security processes
Contributions to open-source projects or communities
Experience in securing AI/ML models and pipelines
What We Offer
Whether you work in our beautiful office in Palo Alto or remotely, Ladder is highly collaborative and fun. To support you in your role, we offer fantastic perks and benefits that reflect our mission of care and support, including:
Excellent medical, dental, and vision coverage | We offer competitive healthcare and dental plans for you and your family.
Flexible paid time off | Take the time that you need to rest and recharge, including our week-long winter holiday closure.
Stock options | We offer competitive stock option packages to participate in the success of building Ladder.
A rewarding 401k match program | We'll match up to 4% of your contributions as you save for your retirement goals.
Commuter benefits | When you work from the office, you will receive pre-tax benefits for your commute and free parking.
A stocked, beautiful new office | Located in downtown Palo Alto, our office was specifically designed to accommodate all working styles. We've invested in technology to support our hybrid team, plus we provide office snacks and catered lunches so that team members can work well and have fun together.
Paid parental leave | We think it's crucial that new parents have time to adjust to their new lives without worrying about work, so we provide all parents inclusive of birthing, adoption, or fostering ten weeks of paid baby bonding.
Work-from-home flexibility and support | We recognize that everyone's homelife is different and support remote and hybrid work. Upon joining, we provide a one‑time $500 remote office stipend for all team members and then a monthly $150 stipend to cover WFH costs such as the internet.
Fun company-wide events | Whether we work locally or remotely, we genuinely enjoy spending time together. That's why we plan fun virtual and in‑person events to let loose and laugh.
The base pay range targeted for this position is $140,000.00 - $184,000.00 per year. Base pay is determined by market location and may vary depending on job‑related knowledge, skills, and experience. This role is eligible for equity and benefits as shared above.
Voluntary Self-Identification
For government reporting purposes, we ask candidates to respond to the below self‑identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.
Voluntary Self-Identification of Disability
Form CC-305
Page 1 of 1
OMB Control Number 1250-0005
Expires 04/30/2026
Why are you being asked to complete this form?
We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years.
Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at ******************
How do you know if you have a disability?
A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:
Alcohol or other substance use disorder (not currently using drugs illegally)
Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
Blind or low vision
Cancer (past or present)
Cardiovascular or heart disease
Celiac disease
Cerebral palsy
Deaf or serious difficulty hearing
Diabetes
Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
Epilepsy or other seizure disorder
Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
Intellectual or developmental disability
Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
Missing limbs or partially missing limbs
Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
Nervous system condition, for example, migraine headaches, Parkinson's disease, multiple sclerosis (MS)
Neurodivergence, for example, attention‑deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
Partial or complete paralysis (any cause)
Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
Short stature (dwarfism)
Traumatic brain injury
Public burden statement: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.
EEO Statement
Ladder is building a diverse team of talented and enthusiastic people. We are an equal opportunity workplace. At Ladder, differences are celebrated and supported to benefit our people, products, and community. Let us know why you're interested in this position and what unique contributions you can make to the Ladder team. We look forward to hearing from you.
Interested in building your career at Ladder? Get future opportunities sent straight to your email.
#J-18808-Ljbffr
A technology company is seeking a Senior SecurityEngineer to enhance its security monitoring and detection processes. This role requires 3-5 years of experience in informationsecurity, focusing on application security and detection engineering. Candidates will work collaboratively, ensuring the protection of corporate environments. The position offers flexibility to work from the office in Palo Alto or remotely across multiple states. Excellent benefits include competitive healthcare, stock options, and a supportive work environment.
#J-18808-Ljbffr
$143k-189k yearly est. 5d ago
Sr. Distinguished Engineer - Digital Assets Security
Early Warning Services LLC 4.7
San Francisco, CA jobs
* Collaborates closely with Engineering leaders, Architecture, Security, and external partners* Minimum 15+ years of software engineering experience* Minimum 10+ years of leading efforts or processes in a Technology organization, with deep experience architecting or scaling payment systems, digital asse* Demonstrated experience with payment networks, FX, liquidity, and reconciliation systems* Experience with smart contract design, auditing, threat models, and security best practices**CURRENT EMPLOYEES: Apply for open positions via Job Hub in your Workday Account.** for an assistance request.E-Verify***.***## Privacy Notice***Effective:** May 2, 2025*This privacy notice is intended to inform California residents of the personal information we collect, how it's used and disclosed, and the rights you have in regard to such information.Click below for the full privacy notice
#J-18808-Ljbffr
$129k-176k yearly est. 4d ago
Cyber Security Engineer
Hirepower Staffing Solution 4.0
Hartford, CT jobs
Are you seeking to grow and enhance your technical career to new heights in a full-time, W-2 opportunity?
What if an organisation existed solely for the purpose of investing in YOU, being of service to YOU, showing you how, and supporting you every step of the way?
Let's make it happen - together!
Please fill out the Google form for immediate assistance: https://tinyurl.com/ConsultantCareerForm
What This Role Requires:
1-4 years of experience working within a networking or security-related enterprise environment.
Understanding of the OSI model, TCP/IP Networking Concepts & Key Protocols
Basic knowledge of systems administration in Linux and/or Windows
High-level understanding of the security CIA Triad (Confidentiality, Integrity, Availability)
Exposure to Cloud computing such as AWS, Azure, or GCP
Basic knowledge of languages such as Python, Bash, and PowerShell scripting.
Preferred to have active Certifications like Security+, Linux+, Network+, CCNA, CKA/CKS
To Qualify:
Strong English written and verbal communication skills
You should be willing to relocate anywhere in the US on a client project-to-project basis
Bachelor's Degree in Cyber Security, Computer Science, Information Systems, Electrical Engineering, Mathematics, or any related IT field.
What's In It For YOU?
Full time, W-2 employment, paid 8-week training in Cyber SecurityEngineering (a highly in-demand skill) at our headquarters in Atlanta, GA
Complete and total support during training, post training and during Client projects
Paid corporate-sponsored housing during training
Relocation assistance for training and all projects, as needed
Robust W2 employee benefits like Yearly Salary Increment, Insurance & Pension
Work visa sponsorship for Foreign Nationals
Who Are We?
We are a premier IT consulting firm specializing in delivering top-tier Android solutions to companies across various sectors such as finance, energy, e-commerce, logistics, travel, retail, entertainment, automotive, and healthcare. Our clientele includes industry giants like Microsoft, Google, Johnson & Johnson, Fannie Mae, Walmart, PayPal, T-Mobile, McDonald's, CVS, Verizon, Charter, Nike, Dell, Wells Fargo, Capital One, and Charles Schwab, among many others. As a consultant, joining our team means you'll also have the opportunity to work with these renowned and leading companies and gain valuable, career-accelerating experience.
Company Highlights
Our Expertise: Providing IT consulting services.
Longevity: 15+ years of combined domestic and international experience in IT consulting serving hundreds of Fortune 1000, 500, and innovative start-up clients.
$77k-104k yearly est. 3d ago
Cyber Analyst, Digital Forensics Incident Response
Bay 4.7
Remote
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Fully Remote
Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
$80k-115k yearly Auto-Apply 60d+ ago
Cyber Security Analyst II
Cybersheath 3.7
Reston, VA jobs
Job Description
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments.
Key Responsibilities
Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments
Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations
Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket)
Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns
Analyze federation security including ADFS token-based attacks and SAML token manipulation
Configure and tune WAF/firewall rule sets and investigate related security incidents
Develop network segmentation strategies and identify lateral movement attempts
Develop and maintain incident response playbooks for various attack scenarios
Coordinate incident response activities with cross-functional teams
Required Qualifications
3-5 years in cybersecurity with 2+ years SOC experience
Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD)
Experience with SIEM platforms and security monitoring tools
Scripting proficiency (PowerShell, Python)
Strong analytical and communication skills
Microsoft Certified: Security Operations Analyst (SC-200)
One additional security certification: EC-Council CSA, CompTIA Security+, or similar
Preferred Qualifications
Microsoft Certified: Azure SecurityEngineer (AZ-500)
Microsoft Certified: Identity and Access Administrator (SC-300)
CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification
CISSP, SSCP, CCSP
Skills & Expertise
Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps)
Azure Sentinel KQL query development and alert configuration
Azure AD/Entra ID security configuration and attack path analysis
Active Directory security assessment including GPOs, trust relationships, and delegation
Email security and phishing detection/response
Cloud security posture management
Incident handling and digital forensics
Threat intelligence analysis and implementation
Work Environment
CyberSheath is a fully remote organization, and this will be a work-from-home position
This schedule for this role is:
Week One - Friday - Monday: 8:00PM - 8:00AM
Week Two - Friday - Sunday: 8:00PM - 8:00AM
Travel requirements: 0-5% yearly.
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range$70,000-$100,000 USD
$70k-100k yearly 6d ago
Cyber Threat Analyst
Us Government Other Agencies and Independent Organizations 4.2
Washington, DC jobs
Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Summary
Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
Overview
Help
Accepting applications
Open & closing dates
10/01/2025 to 09/30/2026
Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15
Location
Many vacancies in the following location:
Washington, DC
Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted
Promotion potential
15
Job family (Series)
* 0132 Intelligence
Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No
Announcement number 23-11942190-6868/AHD Control number 722102800
This job is open to
Help
The public
U.S. Citizens, Nationals or those who owe allegiance to the U.S.
Federal employees - Competitive service
Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales.
Federal employees - Excepted service
Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria.
Videos
Duties
Help
As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests.
In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community.
You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings.
Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government.
Requirements
Help
Conditions of employment
* You must be physically in the United States or one of its territories when you submit your resume via MyLINK.
* You must be registered for the Selective Service, if applicable.
* You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible).
* You must be willing to move to the Washington, DC area.
* You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation.
* For further information, please visit: ****************************************
Qualifications
Minimum Qualifications
Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin.
A mix of international and technical studies, to include a bachelor's or master's degree in the following fields:
* International Relations, Foreign Affairs, or Security Studies
* Cyber Security
* Computer Science
* Digital Forensics
* Telecommunications
* Information Assurances
* Interest in international affairs
* Awareness of U.S. national security interests
* At lease a 3.0 GPA on a 4-point scale is preferred
* Ability to work under tight deadlines
* Excellent analytic abilities and relevant experience
* Strong critical thinking, problem solving skills, and ability to think creatively
* Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation
Desired Qualifications
* Foreign language proficiency
* Strong verbal presentation skills
* Demonstrated ability to write clear, concise text
* Research experience in international affairs
* Ability to work in a team environment
* Interest in a career that requires regular writing assignments
Education
* Bachelor's or master's degree in one of the following fields:
* Computer Science
* Computer Engineering
* Digital Forensics
* Cyber Security
* Telecommunications
* Information Assurances
* Security Studies
* A mix of international and technical studies
* At least a 3.0 GPA on a 4-point scale is preferred
Additional information
Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
How you will be evaluated
You will be evaluated for this job based on how well you meet the qualifications above.
For further information about this position, please visit: *****************************
Benefits
Help
A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits.
Review our benefits
Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered.
Required documents
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
How to Apply
Help
This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself.
Agency contact information
Central Intelligence Agency
Website ***********************
Next steps
After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information.
Fair and transparent
The Federal hiring process is set up to be fair and transparent. Please read the following guidance.
Criminal history inquiries Equal Employment Opportunity (EEO) Policy
Financial suitability New employee probationary period
Privacy Act Reasonable accommodation policy
Selective Service Signature and false statements
Social security number request
Required Documents
Help
For further information about this position, please visit: *****************************
If you are relying on your education to meet qualification requirements:
Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education.
Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
$63.3k-156.8k yearly 38d ago
Cyber Security Analyst | ED&F Man | Houston or Miami
Ed&F Man Holdings Ltd. 3.3
Houston, TX jobs
We are looking for a Cyber Security Analyst to join our global security team. This role will suit a technically capable individual with experience in security operations who is looking to broaden their exposure across security monitoring, engineering, and incident response within a dynamic environment.
The role provides hands-on involvement in triaging and investigating security alerts, acting as an escalation point for the outsourced Security Operations Centre (SOC), supporting major incident response activities. The successful candidate will work closely with infrastructure and network teams to manage and optimise endpoint, email, identity, and vulnerability management platforms, while contributing to continuous improvement of the organisation's security posture.
This role offers the opportunity to evaluate and transition between security tools, maintain policy continuity and develop a broad, practical skillset across enterprise cyber security functions.
Business Overview
Established in 1783, ED&F Man is an employee-owned agricultural commodities merchant with 2,800 people in 43 countries and annual revenue in excess of $8bn. We trade sugar, coffee, molasses, animal feed and fish oils. Corporate responsibility is ingrained in our culture. We are passionate about sustainable production, take care to limit the environmental impact of our operations and actively support the communities in which we work.
Key Accountabilities
* Act as the escalation point for the outsourced SOC, receiving and triaging alerts that require deeper investigation.
* Conduct thorough investigations to produce high-quality, actionable insights for incident resolution.
* Participate actively in major security incidents, contributing to containment, eradication and recovery efforts
* Document incident timelines and contribute to post-incident reviews and lessons learned.
* Respond to detections, triage alerts and update SOC tickets with investigation findings
* Maintain and update policies in line with vendor best practice and internal Change Advisory Board protocols.
* Monitor agent health, audit version compliance and remediate orphaned or non-compliant clients.
* Attend monthly vendor meetings to review support cases and incorporate best practice guidance.
* Design and refine SOC playbooks and response actions, evaluating new security technologies through structured proof-of-concept trials and creating scoring matrices to compare vendors.
* Manage block and safe listings to maintain email hygiene, troubleshooting false positives and tune detection rules.
* Perform email investigations as required in response to phishing or BEC attempts, producing monthly vulnerability reports and prioritising remediation efforts based on risk.
* Work with infrastructure and application teams to test patches and drive vulnerability counts down.
* Attend monthly TAM meetings to review support cases and best practices.
* Maintain agility to substitute security products as business requirements evolve, ensuring policy continuity throughout transitions.
Skills and Experience
* 5+ years' experience in a Cyber Security Analyst or similar role, with strong incident response and major incident handling expertise.
* Hands-on experience with EDR (alert triage, policy management, sensor deployment), preferably CrowdStrike Falcon.
* Experience developing SOC playbooks, response actions, and running proof-of-concept evaluations and vendor comparisons.
* Confident, proactive communicator able to engage senior stakeholders, clearly explain complex security issues, and recommend actions.
* Collaborative and approachable, building trust with technical peers and supporting service desk and front-line teams.
* Calm, effective, and resilient under pressure, particularly during security incidents in a front-facing role.
* Formal qualifications not essential; proven hands-on experience and delivery record valued.
Technical Capabilities:
* Experience with SIEM platforms (e.g. Rapid7), Email Security and Data Security/DLP solutions (e.g. Varonis).
* Strong knowledge of Entra ID security features including Conditional Access and PIM, plus familiarity with PAM tools including BeyondTrust, Osirium and Okta.
* Solid networking fundamentals (TCP/IP, DNS, firewalls, proxies, SSL/TLS) and vulnerability management experience (Qualys/Rapid7 preferred).
* Cloud security experience across Azure and/or AWS.
* Scripting skills in Python and/or AutoIT for automation and tooling.
* Desirable certifications include CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and relevant vendor certifications (e.g., CrowdStrike, Qualys, Palo Alto).
We recognise that talent comes in many forms, and we value potential just as much as experience. If this role excites you but you don't meet every requirement, we still encourage you to apply.
Our Offer
We provide a fast-paced, stimulating and truly global environment, which will stretch your abilities and channel your talents. We also offer competitive salary and benefits combined with outstanding career development opportunities in one of the global leaders in soft commodity trading.
Our Values
Respect, Integrity, Meritocracy, Client Focus, Entrepreneurship
Our values define who we are. They are the fundamental beliefs that determine our actions and guide our behaviour. They influence the way we communicate and collaborate, and define the way we engage with our clients, partners, and communities. Our values are underpinned by a set of essential behaviours, which form part of our performance management approach. Delivering on our objectives is very much about 'what' we do, but these essential behaviours also provide a guide and measure for 'how' we do things. Our performance essentials are Take Initiative, Self‐Management, Deliver Results and Collaboration.
Our Commitment
We are committed to creating and sustaining an inclusive and diverse work environment where all employees are treated with dignity and respect. We are committed to promoting equal opportunities in employment and are focussed on actively building and developing diverse teams. All qualified applicants will receive equal treatment without regard to race, colour, sex, gender, age, religion or belief, ethnic or national origin, marital or civil partner status, physical or mental disability, military or veteran status, sexual orientation, gender reassignment (identity, gender expression), genetic information or any characteristic protected by local law.
We are willing to make any reasonable adjustments throughout our recruitment process.
$74k-105k yearly est. 35d ago
Mid-Level EAD Cyber Threat Analyst - KOREAN
Lis Solutions 3.7
Herndon, VA jobs
LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements.
Job Description
LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues.
In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better.
Responsibilities:
• Direct and conduct all-source analysis and targeting to identify, monitor, and assess
• Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings
• Apply demonstrated subject matter expertise
• Apply knowledge of regional topics
• Analyze and report on trends and activity
Qualifications
Qualifications:
• Korean Language proficiency at ILR-3 level
• Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments
• Possess a good understanding of Intelligence Community (IC) guidelines and directives
• Experience conducting all-source analysis of cyber topics
• Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and
Terminology Management Databases
• Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work.
Requirements:
• U.S. Citizenship
• Active Government Investigation
Additional Information
Benefits
• Medical, Vision, Dental
• Employee Assistance Program (EAP)
• Evacuation
• Long Term Disability
• Term Life
All your information will be kept confidential according to EEO guidelines.
$74k-101k yearly est. 60d+ ago
Mid-Level EAD Cyber Threat Analyst - KOREAN
Lis Solutions 3.7
Herndon, VA jobs
LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements.
Job Description
LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues.
In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better.
Responsibilities:
• Direct and conduct all-source analysis and targeting to identify, monitor, and assess
• Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings
• Apply demonstrated subject matter expertise
• Apply knowledge of regional topics
• Analyze and report on trends and activity
Qualifications
Qualifications:
• Korean Language proficiency at ILR-3 level
• Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments
• Possess a good understanding of Intelligence Community (IC) guidelines and directives
• Experience conducting all-source analysis of cyber topics
• Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and
Terminology Management Databases
• Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work.
Requirements:
• U.S. Citizenship
• Active Government Investigation
Additional Information
Benefits
• Medical, Vision, Dental
• Employee Assistance Program (EAP)
• Evacuation
• Long Term Disability
• Term Life
All your information will be kept confidential according to EEO guidelines.
$74k-101k yearly est. 10h ago
Security Analyst-Cyber Intelligence
Mindlance 4.6
San Francisco, CA jobs
Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at *************************
Hope you are doing fine,
Please have a look at the job description and if you are comfortable with the role and responsibilities please revert with your updated resume.
Job title:- Threat Intelligence Analyst/Security Analyst
Location:- San Francisco CA
Duration:- 6- 12 Months Contract
Responsibilities:
• Differentiate, collect, and evaluate technical and open source data to produce threat intelligence products;
• Identify credible, new intelligence and subject matter resources relative to current/emerging threats;
• Analyze reports to understand threat campaign techniques and lateral movements and extract indicators of compromise (IOCs).
• Manage and maintain threat intelligence platforms and feeds
• Conduct research on emerging products, services, protocols, and standards relative to the informationsecurity arena
Required Qualifications:
• 3-5 year's experience performing threat i management operational activities, including threat intelligence gathering and analysis, and threat metrics development and reporting
• Experience working with large/multi-national organizations
• Demonstrated use of analytic tools and platforms
• In-depth knowledge of informationsecurity threats Windows and Unix/Linux platforms
• The demonstrated ability to work effectively in a collaborative team environment as an individual contributor.
• The ability to provide support after normal business hours, as needed.
Preferred Qualifications:
• Direct experience with Threat intelligence Platform tools
• Experience with developing threat intelligence briefings
Additional Information
Thanks & Regards,
Vikrant Thakur
************
$82k-110k yearly est. 60d+ ago
Cyber Security Analyst
Centrus Energy 3.9
Piketon, OH jobs
At Centrus Energy, cybersecurity protects more than networks-it protects critical infrastructure and national energy security. As a Cybersecurity Analyst, you'll help defend our digital environment by spotting threats early, responding fast, and strengthening the controls that keep our systems safe. This role is perfect for a curious problem-solver who loves digging into logs, outsmarting attackers, and helping teammates stay cyber-smart.
What You Will Do:
You'll monitor networks, systems, and applications for suspicious activity, analyze security alerts, and respond to incidents to keep Centrus' environment secure and resilient. From investigating potential threats and tuning security tools to supporting audits and awareness training, you'll play a hands-on role in protecting digital assets, ensuring compliance with NIST SP 800-171, and continuously improving our cybersecurity posture.
We'd Love to Hear from People With:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field
At least 2 years of experience in cybersecurity or related IT roles
Strong understanding of network protocols, operating systems, and core security principles
Hands-on experience with SIEM tools, vulnerability scanners, and incident response
Excellent analytical, documentation, and communication skills
A passion for learning and staying ahead of emerging cyber threats
Ability to obtain and maintain a “Q” level security clearance
A Successful Candidate Brings:
Experience with security tools such as Splunk SIEM, CrowdStrike Falcon, EDR, Rapid7, and Microsoft Intune (MDM)
Familiarity with security audits and compliance reporting (NIST frameworks)
Professional certifications such as Security plus, CEH, CISSP, or equivalent
Must possess or have the ability to obtain and maintain a “Q” Clearance.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
This position will require a pre -employment background check and a pre-employment drug test.
Centrus Energy and all subsidiaries shall abide by the applicable legal requirements. We prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin.
This position requires the successful candidate to obtain and maintain a Q security clearance. Candidates for positions requiring a security clearance are required to be tested for the absence of any illegal drug as defined in 10 CFR 707.4 prior to an offer of employment being made. In addition, once employe, employees will become part of a random drug testing program and may also be tested in the event of any incident causing injury or causing damage to property, or if it is determined that there is a reasonable suspicion the employee is under the influence of drugs or alcohol. This position will require preemployment background check on the part of the Company and in order to receive a Q security clearance, a background investigation by the Federal government. Subsequent Federal government reinvestigations may be required.
Centrus Energy Corp. is an Equal Opportunity Employer.
$73k-101k yearly est. Auto-Apply 6d ago
Cyber Security Analyst
Centrus Energy 3.9
Piketon, OH jobs
At Centrus Energy, cybersecurity protects more than networks-it protects critical infrastructure and national energy security. As a Cybersecurity Analyst, you'll help defend our digital environment by spotting threats early, responding fast, and strengthening the controls that keep our systems safe. This role is perfect for a curious problem-solver who loves digging into logs, outsmarting attackers, and helping teammates stay cyber-smart.
What You Will Do:
You'll monitor networks, systems, and applications for suspicious activity, analyze security alerts, and respond to incidents to keep Centrus' environment secure and resilient. From investigating potential threats and tuning security tools to supporting audits and awareness training, you'll play a hands-on role in protecting digital assets, ensuring compliance with NIST SP 800-171, and continuously improving our cybersecurity posture.
We'd Love to Hear from People With:
* Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field
* At least 2 years of experience in cybersecurity or related IT roles
* Strong understanding of network protocols, operating systems, and core security principles
* Hands-on experience with SIEM tools, vulnerability scanners, and incident response
* Excellent analytical, documentation, and communication skills
* A passion for learning and staying ahead of emerging cyber threats
* Ability to obtain and maintain a "Q" level security clearance
A Successful Candidate Brings:
* Experience with security tools such as Splunk SIEM, CrowdStrike Falcon, EDR, Rapid7, and Microsoft Intune (MDM)
* Familiarity with security audits and compliance reporting (NIST frameworks)
* Professional certifications such as Security plus, CEH, CISSP, or equivalent
* Must possess or have the ability to obtain and maintain a "Q" Clearance.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
This position will require a pre-employment background check and a pre-employment drug test.
Centrus Energy and all subsidiaries shall abide by the applicable legal requirements. We prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin.
This position requires the successful candidate to obtain and maintain a Q security clearance. Candidates for positions requiring a security clearance are required to be tested for the absence of any illegal drug as defined in 10 CFR 707.4 prior to an offer of employment being made. In addition, once employe, employees will become part of a random drug testing program and may also be tested in the event of any incident causing injury or causing damage to property, or if it is determined that there is a reasonable suspicion the employee is under the influence of drugs or alcohol. This position will require preemployment background check on the part of the Company and in order to receive a Q security clearance, a background investigation by the Federal government. Subsequent Federal government reinvestigations may be required.
Centrus Energy Corp. is an Equal Opportunity Employer.
$73k-101k yearly est. Auto-Apply 6d ago
Cyber Security Analyst 2
Us Tech Solutions 4.4
Birmingham, AL jobs
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
$67k-89k yearly est. 60d+ ago
Network Security Analyst
Mindlance 4.6
Lehi, UT jobs
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at *************************
Job Description
Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional InformationThanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
$75k-95k yearly est. 60d+ ago
Network Security Analyst
Mindlance 4.6
Lehi, UT jobs
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional Information
Thanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
$75k-95k yearly est. 10h ago
Network Security Analyst
Integrated Resources 4.5
Newark, NJ jobs
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network Security Analyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
$92k-125k yearly est. 60d+ ago
Senior Information Assurance (IA) Lead Analyst
VOR Technology 3.9
Arlington, VA jobs
VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training.
Job Description
VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A).
Responsibilities will include the following:
Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise.
Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies.
Qualifications
*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
Must have a minimum ten (10) years experience with the following:
• Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager
• Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks
• Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans
• Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes
• Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes
• Leading FISMA reporting for DoD customers
• Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences
• Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects
Additional Desired Qualifications:
• DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA)
• eMASS experience is a plus
Additional Information
Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field)
Clearance Requirement: Active TS/SCI with Full Scope clearance
* US citizenship is required.
EOE/M/F/D/V
$72k-96k yearly est. 60d+ ago
Senior Information Assurance (IA) Lead Analyst
Vor Technology 3.9
Arlington, VA jobs
VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training.
Job Description
VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A).
Responsibilities will include the following:
Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise.
Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies.
Qualifications
*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
Must have a minimum ten (10) years experience with the following:
• Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager
• Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks
• Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans
• Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes
• Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes
• Leading FISMA reporting for DoD customers
• Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences
• Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects
Additional Desired Qualifications:
• DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA)
• eMASS experience is a plus
Additional Information
Education Requirement:
Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field)
Clearance Requirement:
Active TS/SCI with Full Scope clearance
* US citizenship is required.
EOE/M/F/D/V
$72k-96k yearly est. 10h ago
Cyber Security Analyst
Mindlance 4.6
Oakbrook Terrace, IL jobs
Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at *************************
Job Title: Cyber Security Analyst
Duration: 12 Months
Location: Oakbrook Terrace, IL
Job Description:
Responsible for planning, designing, and implementing a process for cyber security monitoring, incident detection, and incident response. 1-3 yrs of experience and a Bachelor's degree in IT systems or a related discipline.
Position Requirements:
- Configuration and administration of logging aggregation and security event monitoring tools (like Industrial Defender, Splunk, etc.)
- Configuration and maintenance of performance monitoring tools (like Solarwinds, Uptime, CA Spectrum, etc.)
o Understands and can configure tools and endpoint systems to use SNMP for monitoring
- General IT Support (application patching, client updates, remote access and administration tools)
- General Networking knowledge (IP Networking, OSI Stack, etc.)
Additional Information
Thanks & Regards'
___________________________________________________________________________
Vikram Bhalla | Team Recruitment | Mindlance, Inc. | W: ************
All your information will be kept confidential according to EEO guidelines.