Lead Data Security Engineer
Security Engineer job 19 miles from Ashburn
You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world. As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.
Position Purpose:
This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy, execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake.
Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity.
ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for analysis. This involves data cleansing, aggregation, and enrichment, ensuring the data is usable for data scientists and analysts.
Code Review and Mentorship: Spend time reviewing code submissions from team members, providing feedback, and mentoring junior developers or team members on best practices and design patterns.
Operational support: Perform operational work including troubleshooting and On-call rotation.
Data Collection and Cleaning: Acquiring data from various sources and ensuring it is accurate, complete, and ready for analysis.
Data Analysis and Interpretation: Analyzing large datasets using statistical and machine learning techniques to identify trends, patterns, and insights.
Model Building and Evaluation: Developing predictive models using machine learning algorithms to solve business problems. This includes selecting the right algorithms, training models, and evaluating their performance.
Data Visualization: Creating clear and impactful visualizations (charts, dashboards, reports) to present data findings to stakeholders.
Collaboration: Working closely with cross-functional teams, including business analysts, engineers, and other stakeholders, to understand their needs and deliver data-driven insights.
Testing: Designing and conducting A/B tests to validate hypotheses or test the effectiveness of various strategies.
Data Strategy: Providing strategic advice on how to leverage data for business growth and decision-making, including identifying new data opportunities.
Automation and Optimization: Streamlining data processes and automating repetitive tasks, ensuring efficiency in data pipelines and analytics workflows.
Continuous Learning: Stay updated with the latest trends in software architecture, AI technologies, and development tools.
Problem-Solving: Be available to troubleshoot and solve complex technical problems as they arise, offering expertise to resolve issues efficiently.
Professional Development and Training: Participate in or conduct training sessions to enhance the team's skills and knowledge in specific areas related to application architecture and AI technologies.
Performs other duties as assigned.
Complies with all policies and standards.
Education/Experience:
A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 5 - 7 years of related experience.
Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.
Technical Skills:
Proficiency in Databricks platform
Advanced data pipeline design and development
Data quality and governance
Machine learning model development and maintenance
Data integration processes
Data security and privacy regulations
Data visualization tools development
Data warehouse and data mart design and development
ETL (Extract, Transform, Load) processes.
Data governance and compliance
Proficiency in SQL and Python
Knowledge of Big Data technologies (Hadoop, Spark)
Cloud computing (AWS, Azure, GCP)
Data modeling and architecture
Advanced analytics and predictive modeling
Knowledge of data privacy laws and regulations
Proficiency in BI tools (Tableau, PowerBI)
Strong problem-solving skills
Excellent communication and presentation skills
Project management and team leadership.
Soft Skills:
Intermediate - Seeks to acquire knowledge in area of specialty
Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
Intermediate - Ability to work independently
Intermediate - Demonstrated analytical skills
Intermediate - Demonstrated project management skills
Intermediate - Demonstrates a high level of accuracy, even under pressure
Intermediate - Demonstrates excellent judgment and decision making skills
Intermediate - Ability to communicate and make recommendations to upper management
Intermediate - Ability to drive multiple projects to successful completion
Intermediate - Possesses technical aptitude
License/Certification:
CompTIA Security+ Certification, CISSP Certified Information Systems Security Professional, and/or Splunk Certifications preferred
Databrick Certification, or Python Certifications (such as from Python Institute or Microsoft), or Professional Data Engineer (Google Cloud) or AWS Certified Big Data preferred
Pay Range: $100,900.00 - $186,800.00 per year
Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law, including full-time or part-time status. Total compensation may also include additional forms of incentives. Benefits may be subject to program eligibility.
Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.
Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act
Senior Security Engineer (Splunk Content Developer/ES Searchhead Admin)
Security Engineer job 16 miles from Ashburn
We are looking for a Splunk Content Developer/ES Search head Admin that can come in and take ownership of day-to-day Operations with minimal spin-up time. The successful candidate will be a member of a high performing team of certified Splunk Enterprise and Splunk ES administrators. You will partner with additional teams within Navy Federal Credit Union to protect the Navy Federal brand, data, and IT assets from cyber-based threats in support of our Cybersecurity Operations Center (CSOC) and its associated programs. You will serve as technical interface to customers (analysts) for Splunk and Splunk ES, articulating technology and product positioning to both business and technical users. Successful candidates will work independently, must be a self-starting self-motivated individual, be accountable and timely in their production and status reporting, and communicate effectively both in writing and when speaking to groups. You will be expected to work to build and maintain relationships within and outside of the CSOC. This position will require a high level of attention to detail to the work performed, following process, and detailed updates/documentation using Jira.
Responsibilities
Developing notable events, visualizations, forms, reports, alerts, dashboards, and visualizations to identify adversarial activity
Build and implement event correlation rules, logic, and content in the SIEM
Configure notable event actions, action menus and Adaptive Responses
Tune SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives and/or known errors
Create and support the creation of SIEM Use Cases and understand what alerts and log enrichment is necessary to meet the required acceptable false positive rate
Translate feedback from the business to Splunk technical requirement and solutions
Normalize data to ensure CIM compliance, and align with data models to accelerate queries, dashboards, and correlation searches
Maintain Splunk Apps, Technology Add-ons as required by Splunk ES upgrades
Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM, Fraud, and SOAR platforms
Monitor system stability and performance and ensure system availability, reliability, and usability
Troubleshoot and resolve Splunk-related technical issues, partnering with IT and SOC teams as needed
Always provide professional and courteous service with excellent verbal and written communications skills.
Participate in on-call rotation and respond to incident alerts
Stay abreast of the latest Splunk features, technologies, and industry trends, and make recommendations for continuous improvement
Follow Change & Configuration Management procedures in relevant tools (e.g. Jira, SNOW, etc.)
Ensure the completion of tasks and update tickets accordingly
Qualifications
Bachelor's degree in computer science, Information Systems, Cybersecurity or comparable field of study, and/or equivalent work experience
Six (6) to eight (8) years of experience with Splunk in distributed deployments and at least two (2) years of experience in Splunk Cloud environments
At least three (3) years of experience with Splunk Enterprise Security
Current Splunk Enterprise Certified Admin certification
Current Splunk Enterprise Security Certified Admin certification
Proficient at data administrative activities including parsing and normalizing events to the Splunk Common Information Model (CIM)
Proficiency aligning data to Splunk-developed add-ons for Windows, Linux, and common third-party devices and applications
Superb communication skills (both oral/written) including the ability to clearly communicate technical topics and risk to an audience than can include both engineers and executives
Strong problem-solving abilities with an analytic and qualitative eye for reasoning under pressure
Experience with SIEM and/or SOAR platforms, including the development of automations and integrations
Self-starter with the ability to independently prioritize and complete multiple tasks with little to no supervision
Knowledge of JIRA and Confluence
Knowledge of Change Management processes
Hands on experience in an agile environment
Desired Qualifications
Current Splunk Enterprise Certified Architect
Current Splunk Core Certified Consultant
Expert-level knowledge and ability with Splunk Enterprise Security or integration with other Security Information and Event Management (SIEM) platforms
Knowledge of scripting languages like Python
Experience in the banking or finance industries a plus
Knowledge of version control practices and experience with version control software products (e.g. Git, Bitbucket, etc.)
Knowledge of/ Experience with data pipeline configuration and integration
Relevant cybersecurity certifications, (e.g. CISSP, GCIA, GCIH, GCED, or similar).
At least three (3) years of experience in Cybersecurity, InfoSec, Security Engineering, Network Engineering with emphasis in Cybersecurity in the following areas:
In-depth knowledge of operating systems logs (Windows servers and workstations, AIX/Linux/Solaris, and Apple Mac)
In-depth knowledge of network appliance logs (Firewalls, router & switches).
Incident Response analysis
Network Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
Security Orchestration Automation and Response (SOAR)
Endpoint and Network Detection and Response (EDR/NDR)
User Behavior Analytics (UBA)
Network and Host malware detection and prevention
Network and Host forensic applications
Web/Email gateway security technologies
Hours: Monday - Friday, 8:00AM - 4:30PM
Locations: 820 Follin Lane, Vienna, VA 22180 | 5550 Heritage Oaks Dr. Pensacola, FL 32526 | 141 Security Dr. Winchester, VA 22602 | Remote
Salary Range: $99,400 - $155,350 annually (Level III)
$114,500 - $204,000 annually (Level IV)
About Us
Navy Federal provides much more than a job. We provide a meaningful career experience, including a culture that is energized, engaged and committed; and fierce appreciation for our teams, who are rewarded with highly competitive pay and generous benefits and perks.
Our approach to careers is simple yet powerful: Make our mission your passion.
• Best Companies for Latinos to Work for 2024
• Computerworld Best Places to Work in IT
• Forbes 2024 America's Best Large Employers
• Forbes 2024 America's Best Employers for New Grads
• Forbes 2024 America's Best Employers for Tech Workers
• Fortune Best Workplaces for Millennials™ 2024
• Fortune Best Workplaces for Women ™ 2024
• Fortune 100 Best Companies to Work For 2024
• Military Times 2024 Best for Vets Employers
• Newsweek Most Loved Workplaces
• 2024 PEOPLE Companies That Care
• Ripplematch Recruiting Choice Award
• Yello and WayUp Top 100 Internship Programs
From Fortune. ©2024 Fortune Media IP Limited. All rights reserved. Used under license. Fortune and Fortune Media IP Limited are not affiliated with, and do not endorse products or services of, Navy Federal Credit Union.
Equal Employment Opportunity: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected Veteran.
Hybrid Workplace: Navy Federal Credit Union is a hybrid workplace, and details will be discussed during your interview process.
Disclaimers: Navy Federal reserves the right to fill this role at a higher/lower grade level based on business need. An assessment may be required to compete for this position. Job postings are subject to close early or extend out longer than the anticipated closing date at the hiring team's discretion based on qualified applicant volume. Navy Federal Credit Union assesses market data to establish salary ranges that enable us to remain competitive. You are paid within the salary range, based on your experience, location and market position
Bank Secrecy Act: Remains cognizant of and adheres to Navy Federal policies and procedures, and regulations pertaining to the Bank Secrecy Act.
Chemical Weapons Convention (CWC) National Security Analyst
Security Engineer job 27 miles from Ashburn
Job Description
Toeroek Associates is seeking qualified candidates for the Chemical Weapons Convention (CWC) National Security Analyst position to assist the Naval Treaty Implementation Program (NTIP) with the preparation of multi-phased instructional products, training plans, and exercises ranging from classroom tutorials to small team-size field training to full-scale multi-day exercises. This position is in Alexandria, VA.
In-office support is expected (mix between Alexandria, VA and the Navy Yard, Washington DC), must be willing to support 5 days a week as needed. Travel is 10% or less per year to prepare for and support exercises as needed. International travel may be required.
Applicants must have an active DoD SECRET clearance, Chemical Weapons Convention (CWC) experience desired, and 3+ years Arms Control, DoD, and/or national security experience to be eligible for this role.
This opportunity and description are subject to change pending the release of the final solicitation by the Navy. Start of work is tentatively late September / early October 2025.
Duties
Ability to prioritize work and complete multiple tasks under deadlines.
Must be able to effectively communicate in writing and verbally on both technical and non-technical subjects to senior leaders.
Assist in management of storage, monthly testing (according to the manufacturer's recommendations), and maintenance of Challenge Inspection support equipment (Government Furnished Property).
Support preparation of multi-phased instructional products, training plans and exercises ranging from classroom tutorials to small team-size field training, to full scale multi-day exercises.
Support the planning, facilitation, execution, and assessment of Challenge Inspections and Challenge Inspection training events and exercises. Exercise support includes but not limited to training event facilitation, assisting in exercise design and development, and After-Action Review support.
Provide analyses and reports in the form of standard correspondence (Executive Summaries, Information Papers, Memoranda, briefings, etc.), to assess the impacts of USG policy guidance, OSD and Joint Staff implementation guidance, and current DoD planning and provide assistance to the Treaty Manager and other USG staff.
Monitor and assess the status of arms control treaties and other nonproliferation agreements.
Qualifications:
Bachelor's degree (B.A. or B.S.) or equivalent.
ACTIVE DOD SECRET CLEARANCE REQUIRED.
3+ years in arms control, chemical, and/or DoD consultant support required.
Working knowledge of other arms control treaties and agreements desired.
Ability to comprehend complex issues, organize and prioritize work schedule.
Ability to communicate and work with people at all levels of the organization.
Must be able and willing to travel domestically and / or internationally to support various levels of exercises (less than 10% of time).
Career background in WMD, CBRN, and/or Arms Control with an understanding of CWC Challenge Inspection desired.
The target salary hiring range is $80,000 - $120,000 annually, DOQ. This is a good faith and reasonable estimate of the base compensation at the time of posting. Toeroek offers a competitive benefits package including medical, dental, vision, Life, LTD, STD, and 401K. Qualified applicants should include their resume, and completed application for further consideration.
Toeroek Associates is a dynamic small business provider of specialty consulting and analysis services to the U.S. Government. Our National Security experts include technical and policy specialists in biological threat reduction, nuclear non-proliferation, arms control and treaty compliance, nuclear stockpile management, and CBRN support to the warfighter. We currently support DTRA, Air Force, Army, Navy, OSD, and EPA as both prime contractors and subcontractor team members.
Toeroek Associates, Inc. is an Equal Employment Opportunity employer.
Toeroek Associates, Inc. maintains the policy of equal employment opportunity (EEO) shall apply to all terms, conditions, and privileges of employment, including hiring, testing, training and development, promotion, transfer, compensation, benefits, educational assistance, termination, layoffs, social and recreational programs, and retirement. Toeroek is committed to making employment decisions based on valid requirements, without regard to age, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion, sex, sexual orientation, or any other applicable status protected by state or local law.
Applicants with disabilities may contact Toeroek Associates, Inc., Human Resources via telephone, fax, e-mail, and other means to request and arrange for accommodations. If you need assistance to accommodate a disability, you may request an accommodation at any time. Please contact Human Resources at **************.
FIPS 140 Security Engineer & CMVP Certified Tester
Security Engineer job 36 miles from Ashburn
FIPS 140 Security Engineer & CVP Certified Tester
Work model: REMOTE
Department: FIPS/Testing
Role Type: Contract
No Clearance Required*
Not available on C2C basis*
Not able to provide sponsorship*
About Our Client
Our client offers an exciting opportunity to work in the rapidly expanding IT Security field, integral to supporting national defense initiatives. This organization plays a crucial role in ensuring national security by evaluating and validating IT security products that are deployed to facilitate secure communications for military and defense systems. You will join a team of industry experts and work with a wide range of Commercial Off-The-Shelf (COTS) products across various technology types in a hands-on lab environment. The company fosters a supportive culture with performance-based career development, flexible hours, work-life balance, and opportunities for continuous learning and professional growth.
Job Description
As a FIPS 140 Security Engineer, you will be a vital member of a dedicated team focused on performing in-depth security evaluations and validation projects. Your day-to-day work will involve a comprehensive range of activities, from general security analysis and product architecture review to hands-on vulnerability and physical security testing. You will apply your technical expertise to conduct system-level logical analysis, rigorous cryptographic algorithm testing, and detailed source code reviews, all while ensuring products meet stringent security standard requirements.
This role offers the opportunity to directly contribute to securing critical communication systems for national defense, providing an impactful career in a growing industry. You will collaborate closely within a team environment, sharing knowledge with experts, and your work will involve not only testing but also the development of applications and automation scripts to enhance testing capabilities, culminating in precise technical report writing. The ideal candidate is passionate about cybersecurity, cryptology, and ensuring the highest standards of product security.
Duties and Responsibilities
Work on varied FIPS 140 validation projects.
Perform general security analysis of products and systems.
Conduct design work related to product architecture.
Execute vulnerability testing on various technologies.
Conduct physical security testing of devices.
Perform system-level logical analysis.
Evaluate products against Technology Type standards (Protection Profiles).
Conduct cryptographic and Public Key Infrastructure (PKI) testing.
Perform cryptographic algorithm testing.
Engage in source code review activities.
Author and review technical reports documenting findings.
Automate testing processes through scripting.
Develop applications to support test cases.
Required Experience/Skills
Cryptographic Module Validation Program (CMVP) Certification.
Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, and random number generators.
Experience with various programming languages such as C, C++, Python, or Java, and their development environments.
Ability to comprehend security standard requirements and apply them effectively to products.
Experience setting up networks and familiarity with subnetting and routing concepts.
Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS).
Experience building testing environments, performing testing, and reporting results (technical writing).
Strong troubleshooting and problem-solving skills.
Strong multitasking and time management abilities.
Typically requires a Bachelor of Science (BS) degree with 2 to 4 years of prior relevant experience.
Nice-to-Haves
Experience with Python programming language.
Experience with debugging tools (e.g., Android debug bridge (adb), WinDBG, Visual Studio).
Experience with statistical analysis of entropy sources.
Knowledge of OpenSSL and/or OpenPGP.
Vulnerability Analysis and/or penetration testing experience/expertise.
Strong knowledge of computer security principles and best practices.
Strong English (both oral and written) skills.
Related certifications (e.g., CCNA/CCNP/CCIE, JNCIA/JNCIS/JNCIP/JNCIE).
Knowledge of Active Directory and Linux.
Hands-on experience using tools such as an oscilloscope, function generator, multi-meter, or signal generator.
Knowledge of X.509 certificate validation.
Education
Typically requires a Bachelor of Science (BS) degree.
Pay & Benefits Summary
Performance-based career development with well-defined roles and actionable qualifications.
Flexible hours within the constructs of the workday.
Opportunity to attend industry-related conferences and seminars.
Emphasis on maintaining work-life balance.
Opportunity to work with and learn from industry experts in an open environment.
Great team camaraderie.
Tuition reimbursement within appropriate disciplines.
Join our team and contribute to national security through cutting-edge FIPS 140 validation!
Interested? Apply Now! Connect with your Catapult SG Recruiter: Kailyn Hartley, at *****************************.
FIPS 140 | Cryptography | Security Engineer | Validation Engineer | IT Security | Cyber Security | Product Evaluation | Vulnerability Testing | PKI | Cryptographic Algorithms | Source Code Review | Network Security | Testing Automation | Python | CVP Certification
Information Security Specialist
Security Engineer job 27 miles from Ashburn
Job Description
Come make your mark with Watermark! 🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.
🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do.
💲 COMPETITIVE BENEFITS PACKAGE to address our employees’ physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first!
In this role you will…
Assist and review information security requirements associated with generating, processing, transmitting, self-inspections, safeguarding, and destruction of sensitive and National Security Information under the provisions of Executive Order 13526 or any follow-on or superseding Executive Orders.
Assist Information Security Manager with oversight of classified computer systems and users accounts. To include developing and updating database using SharePoint.
Provide assistance with SCIF operations and management IAW ICD Tech Spec 705 Chapter 12 and DOJ Policy and procedures.
Assist in the development of standard operating procedures and checklists for operation and protection of SCIF space, limited access area, and secure storage containers.
Assist Information security Manager in developing and conducting security self inspections, apply risk mitigation methodologies, support customer assessments, and implement security measure to meet requirements for EOUSA and 94 USAOs.
Administrative Support Services for EOUSA SEMS
Ability to interpret information on alteration, expansion, and new construction documentation to identify security related items that require revision of SCIF space or further clarification to meet applicable standards IAW ICD 705 Tech Specs.
Assist with Industrial Security and review various Statement of Work (SOW) to ensure adequate security requirements are included in the DD 254 to support the program effort IAW with NISPOM.
Assist in communications security (COMSEC) surveys of the Department's facilities to evaluate secure communications procedures and to verify that the designated area meets accepted standards for the safeguarding of COMSEC equipment (STEs and other encrypted devises supporting classified systems) and material used to protect classified and sensitive information.
Assist the Program Manager in developing USAO policy standards and address the accountability, control and safeguarding of COMSEC equipment and material in accordance with NSA Regulation 3-16.
Experience Requirements:
4 years of experience or if no bachelor's degree, 8 years of experience in Information security/safeguarding. Experience applying incident management, problem solving, and task performance. Producing finished documentation to include, but not limited to, reports, studies, policy and procedural development, training and assessments.
Experience directing and controlling design and development, evaluation and control, and After-Action Review and Improvement Plan development
Education Requirements:
Bachelor’s degree
Security Clearance Requirements:
A Top Secret (TS) clearance is required
Other Requirements:
May be required to move equipment/files weighing up to 50 pounds
Requires ability to consistently perform repetitive tasks including filing and scanning
May require sedentary work at least 50% of the time
Reports to a physical location which occasionally requires the ability to traverse between buildings
Ability to manage stress with a high degree of maturity/professionalism
Demonstrated critical thinking and leadership skills and the ability to work well with others
Effective verbal and written communication skills
Other duties as assigned
This position is contingent on funding.***
The anticipated compensation range for this position i
s $85,000- $110,000.
Multiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories. Central to Watermark’s employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.)
Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws.
Powered by JazzHR
RfNB1uZDhf
Information Assurance/Security Specialist-Expert (ISSO) - Tier 2
Security Engineer job 27 miles from Ashburn
Job DescriptionDescription:
Complete and maintain all certification and accreditation documentation for system Authority to Operate (ATO) activities. Manage Plan of Actions and Milestones (POA&M) activities related to ATO. Asset where possible in completing POA&M activities.
Requirements:
Ensure the effective implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems, ensuring alignment with organizational security standards and best practices.
Lead the Assessment and Authorization (A&A) activities for designated systems, ensuring compliance with federal regulations and internal security requirements. Document security measures in security plans and oversee access control provisioning for system users.
Establish, maintain, and oversee configuration management of security documentation for assigned systems. Regularly review and update security artifacts to ensure they reflect current security configurations.
Identify, assess, and document threats and risks to designated systems. Conduct thorough risk assessments to understand vulnerabilities and recommend mitigation strategies to ensure system integrity.
Lead and conduct cybersecurity tests and assessments, providing actionable results to the Information System Security Manager (ISSM). Address vulnerabilities and provide guidance for remediation.
Evaluate the security impact of proposed changes to assigned information systems. Recommend and implement strategies for mitigating risks associated with significant security changes.
Identify cybersecurity training needs based on user roles and responsibilities. Develop and deliver training materials to ensure all users are equipped to operate within secure systems and adhere to security protocols.
Promptly respond to security incidents and breaches related to assigned systems. Accurately report findings and contribute to incident resolution, ensuring minimal impact on operations.
Develop and maintain security processes and procedures that support the ISSM’s Cybersecurity Program, ensuring comprehensive and up-to-date documentation and streamlined workflows for security operations.
Create, maintain, and regularly update disaster recovery and incident response plans for assigned systems. Participate in training and tabletop exercises to ensure readiness in case of security incidents.
Effectively communicate cybersecurity status, risks, and mitigation strategies to stakeholders, both formally and informally. Present information clearly in group and individual settings to ensure understanding across all levels of the organization.
Key Candidate Traits:
In-depth knowledge of DOE and NNSA cybersecurity frameworks and guidelines.
Strong experience in conducting A&A activities, risk assessments, and vulnerability testing.
Expertise in configuration management, security documentation, and system access control.
Proven ability to lead incident response efforts and coordinate with various teams for rapid recovery.
Demonstrated skill in developing and delivering cybersecurity training and process improvements.
Strong communication and presentation skills, with the ability to explain complex security issues to both technical and non-technical stakeholders.
Non-Negotiable Requirements:
1. Top Secret with investigation current within the last 5 years
2. On-site, no remote
Technical Environment: Microsoft, Linux, Splunk, Ansible, Tenable, GEMS
A notification to prospective applicants that reviews, and tests for the absence of any illegal drug as defined in 10 CFR 707.4, will be conducted by the employer and a background investigation by the Federal government may be required to obtain an access authorization prior to employment, and that subsequent reinvestigations may be required. If the position is covered by the Counterintelligence Evaluation Program regulations at 10 CFR part 709, the announcement should also alert applicants that successful completion of a counterintelligence evaluation may include a counterintelligence-scope polygraph examination.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
Multimedia Systems Engineer - TS/SCI
Security Engineer job 37 miles from Ashburn
Enterprise Solutions and Management (ESM) is a rapidly growing government contractor that provides strategic IT services that meet mission needs for Defense and Federal customers. We are hiring a Multimedia Systems Engineer - TS/SCI for an exciting opportunity located in JBA (Joint Base Andrews, Prince George County, MD).
Job Description and Responsibilities
ESM is looking for a full-time Multimedia Systems Engineer - TS/SCI who demonstrates the following capabilities and satisfies the Minimum Qualifications, Clearance, and Certification requirements. Primary responsibility for this role is VTC troubleshooting with knowledge of Crestron and AMX technologies. Employee responsibilities include:
Provide on-site support and services in the AV/VTC Engineering Team supporting the 844th Communications Group primarily at Joint Base Andrews, and occasional/satellite support for Joint Base Anacostia-Bolling and the Pentagon.
Resolve system operational problems by troubleshooting and performing fault isolation.
Repair, replace, and reprogram faulty equipment, as required.
Provide client consultation and training on control interfaces and use of AV/VTC equipment.
Draft SOP documents for local presentation and VTC operations.
Conduct site surveys to establish customer requirements and generate Bill of Materials for AV/VTC systems and equipment.
Lead integration, testing and installation of new facilities in both classified and unclassified environments.
Act as equipment custodian and perform inventory asset management and accountability functions.
Provide life cycle refresh projections for AV/VTC infrastructure and AV equipment build out projects.
Perform routine performance testing to ensure VTC and other conference room equipment computer servers and workstations operate at optimal performance and capacity.
Responsible for evaluating, designing, documenting, installing, implementing, testing, maintaining, operating, removing, and upgrading, and modifying video teleconferencing equipment systems.
Required Knowledge, Skills and Abilities (KSA)
Active Secret Clearance
Ability to lift up to 50 lbs
Ability to pass a drug screening
Active Driver's License (Willing to be a backup driver for equipment delivery as needed)
Excellent team skills, must be thorough, must have excellent communications skills, written and verbal
Ability to work in a dynamic cross-organizational team environment
Strong dedication to provide quality customer service
Strong problem solving skills including the ability to quickly identify the cause of issues with the system or determine if other teams need to be included in resolving an issue
Ability to prioritize tasks and adhere to established deadlines
Take ownership of tasks and deliver without supervision while using their discretion to seek help necessary
Desired KSA
Be a positive, self-motivated, and proactive person able to adapt to change and tolerate stressful situations
Candidate must communicate effectively with team members, management, and government customer
Ability and desire to research and develop creative solutions to unique problems with minimal supervision
Minimum Training, Education, and Certifications
A bachelor's degree, 5-7 years of experience, current Security+ce or equivalent DoD 8570 IAT level II certification, and ability to attain Crestron Digital Certified Engineer or Crestron Certified Programmer certifications within 6 months.
Education and experience requirements may be substituted with:
A master's degree 3 - 5 years of experience and ability to attain certification within 1 yr.
No degree with 10 years of intensive and progressive experience demonstrating the required proficiency levels related to task and all current applicable certifications.
Minimum Clearance
TS/SCI
Physical Requirements
Ability to sit, stand, walk for extended periods of time
Ability to use a computer
Additional Requirements
Other duties as assigned
ESM provides equal employment opportunity to all individuals regardless of race, color, creed, religion, gender, age, sexual orientation, national origin or ancestry, disability, genetic information, veteran status, gender identification or any other characteristic protected by state, federal or local law.
Cyber Hacking and Network Defense Research - Part-Time
Security Engineer job 21 miles from Ashburn
JOB TITLE: Cyber Hacking and Network Defense Research - Part-Time
CLEARANCE: Current Top Secret / SCI with Polygraph
REQUIRED EXPERTISE: • Master's degree or PhD in computer science, mathematics, or relevant field.
• 1 + years post-graduate experience in cyber operations; operational experience supporting a security operations center (SOC), Computer Emergency/Incident Response team, or Intelligence Community/DoD Computer Network Defense (CND) mission is highly desired but not required.
• 2+ years project management experience, and proficiency in program management principles relevant to R&D programs.
• Ability to proactively and independently identify potential technical and programmatic risks and advise PM accordingly.
• Experience in psychology, cognitive science, human factors, or relevant field.
• 5+ years of experience conducting human subjects research, to include all aspects of Institutional Review Board (IRB) submission, experimental design, execution of Human Subjects Research (HSR), and data analysis.
• Strong experimental design expertise and experience.
DESIRED EXPERTISE:
• 5+ years of cybersecurity experience.
• 2+ years of experience in system integration and software development.
• Experience designing or participating in Capture-the-Flag, or Hack-the-Box events.
• Ethical Hacking certification (e.g., Offensive Security Certified Professional (OSCP)), or equivalent experience or training.
• Technical expertise and professional work in three or more of the following areas within the past five years (post-graduate paid professional work experience preferred):
• Incident response processes (use of the Cyber "kill chain" or similar modeling approaches preferred)
• Automated intrusion detection capabilities and analysis techniques
• Malware analysis and malware classifications
• Cyber-attack types and exploitation techniques
• Cyber-attack modeling
• Adversary emulation
• Experience with human subject's research.
• Additional experience with the Intelligence Community or other government-run analysis and evaluation.
• 2+ years performing research focused on human performance enhancement.
Bluemont Technology & Research, Inc. (Bluemont) offers a premium benefits package. Our culture is based on treating people like you would treat yourself. The company is focused on challenging applications of cutting-edge technologies and data intensive applications.
Bluemont is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. Bluemont maintains a drug-free workplace and performs background checks.
Bluemont is an E-Verify Employer. Follow this ink to view: ********************
Network & Security Operations Analyst (5744)
Security Engineer job 27 miles from Ashburn
As Network & Security Operations Analyst, you'll oversee both network and security operations for the Network Operations and Security Center. This role ensures the continuous availability, performance, and security of enterprise IT systems by leading a team responsible for network monitoring, incident management, and security threat response.
We know that you can't have great technology services without amazing people. At MetroStar, we are obsessed with our people and have led a two-decade legacy of building the best and brightest teams. Because we know our future relies on our deep understanding and relentless focus on our people, we live by our mission: A passion for our people. Value for our customers.
If you think you can see yourself delivering our mission and pursuing our goals with us, then check out the job description below!
What you'll do:
* 2nd or 3rd Shift: (2:00 PM - 10:30 PM OR 11:00 PM - 6:30 AM)
* Develop, document, and enforce standard operating procedures (SOPs) for network and security incidents.
* Act as the primary escalation point for major network outages and security incidents.
* Identify areas for incident responses to be automated and tools to be optimized.
* Collaborate with Operations and engineering teams to maintain optimal service levels.
What you'll need to succeed:
* You have an active TS/SCI clearance
* You have 5+ years of experience in a NOSC, NOC, or SOC environment.
* You have a strong knowledge and configuration experience of network monitoring (e.g. SolarWinds, PRTG, Nagios) and SIEM tools (e.g. Splunk, QRadar, ArcSight).
* You have experience managing network incidents, security events, and cyber threat response.
* You are familiar with ITIL frameworks, incident management, and service desk operations.
* You have strong troubleshooting experience with firewalls, VPNs, IDS/IPS, and cloud security (AWS, Azure, GCP).
Network Sniffer Analysis
Security Engineer job 17 miles from Ashburn
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
Ethical Hacker - Financial Services
Security Engineer job 27 miles from Ashburn
KP Recruiting Group is a consulting firm that provides leadership and exceptional talent to some of the world's leading companies. Headquartered in the Midwest, KP Recruiting Group has successfully completed countless engagements in the United States, Europe and Latin America. We represent clients in all industries and all sizes. Our mission is to provide exceptional client and candidate experiences in order to get the best possible results. On behalf of our client, we are excited to present the following confidential role. We look forward to hearing from you and discussing the opportunity!
The Role:
The Ethical Hacker will join a dynamic team of world class security experts to conduct application security/penetration tests of our internal/external web, mobile, web service applications, and evaluations of assessments performed by vendor third parties, leveraging both manual techniques as well as automated tools in order to uncover and report security vulnerabilities that exist.
You will be knowledgeable with business risks associated to common security vulnerabilities and to be able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerabilities.
The ability to work independently in a very large scale, enterprise setting is a great skill to possess. Previous experience as an application security professional with a large Financial Institution a plus.
Requirements
BS/MS in Computer Science (or relevant work experience in a large scale IT environment)
Experience conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find flaws and exploits (e.g. SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, Clickjacking, Authentication/Authorization, Privilege Escalation, Business Logic Bypass, OWASP Top 10, SANS Top 25 etc)
Knowledge of network and Web related protocols/technologies
Ability to demonstrate manual web application testing experience
Experience with web application vulnerability scanning tools (e.g. IBM AppScan, HP Webinspect, Acunetix, NTO Spider, Burpsuite Pro etc.)
Experience with vulnerability assessment tools and penetration testing techniques (e.g. web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI etc.)
Experience of penetration testing on mobile platforms such as iOS, Android, Windows and RIM.
Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
Expert-level experience and very details technical knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
Demonstrated ability to learn and apply critical thinking to a variety of situations
One or more of the following certifications: CISSP, GWAPT, CEH, OSCP (or qualified work experience)
Strong scripting skills (e.g. Python, Perl, Shell script, JavaScript
Experience as a developer
Mobile programming abilities such as Xcode, Objective-C
Knowledge of a Structured Query Language
Benefits
Our client offers a comprehensive benefits package including:
401k Matching
Family and Individual Insurance Packages (Health, Life, Dental, and Vision)
Paid Time Off & Paid Holidays
Long & Short-Term Disability
Identity Theft Plans
Retirement & Pension Plans
Employee Assistance Program
Employee Referral Program
Tuition Reimbursement Programs
Advancement & Professional Growth opportunities
Parental Leave
& More
Network Security Analyst
Security Engineer job 10 miles from Ashburn
Network Security AnalystLOCATIONReston, VA 20190CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Network Security Analyst
Security Engineer job 10 miles from Ashburn
**Responsibilities & Qualifications** **RESPONSIBILITIES** + Define and document network security requirements for local and wide area networks (LANs and WANs). + Evaluate approved network security product capabilities and assess suitability for enterprise use.
+ Configure and maintain standard communications protocols in support of secure data transmission.
+ Detect, assess, and analyze network vulnerabilities and recommend effective remediation strategies.
+ Develop and implement comprehensive computer system security solutions aligned with mission requirements.
+ Design, develop, and engineer security solutions that fulfill complex network security requirements.
+ Integrate and implement secure network architectures and ensure interoperability with existing systems.
+ Perform vulnerability and risk analyses across systems and applications throughout the system development lifecycle.
+ Collaborate with system administrators, developers, and security teams to ensure holistic protection of information systems.
+ Support compliance initiatives and security audits through documentation and mitigation planning.
+ Stay informed of current cybersecurity threats, trends, and technologies affecting network security.
**REQUIRED QUALIFICATIONS**
+ 5 years of relevant experience in network security, cybersecurity engineering, or information assurance.
+ Hands-on experience in:
+ Defining security requirements for LAN/WAN environments
+ Evaluating and implementing security tools and product capabilities
+ Configuring communications protocols (e.g., TCP/IP, SNMP, IPSec)
+ Performing network vulnerability analysis and remediation
+ Developing and deploying network security solutions
+ Expertise in conducting system and application risk assessments throughout the development lifecycle.
+ Strong working knowledge of firewall architectures, intrusion detection/prevention systems, and network segmentation strategies.
+ DoD 8570 IAM Level III Baseline Certification
+ **Certified Information Security Manager (CISM)**
+ **Certified Information Systems Security Professional (CISSP)**
+ **GIAC Security Leadership Certification (GSLC)**
+ **Certified Chief Information Security Officer (CCISO)**
+ **Clearance:**
+ Secret - IT-II Non-Critical Sensitive clearance or Tier 3 (T3) investigation
**Overview**
We are seeking a Network Security Analyst to join our team supporting DLA J6 Enterprise Sourcing, Medical and Contingency (ESMC) Hosting and Support.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at **************** .
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Candidates must reside in one of our approved hiring states within the United States.
+ Type of environment: Office, Remote, Varies
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
+ Amount of Travel: Less than 10%
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
U.S. Citizen
Secret Clearance
**OTHER DUTIES**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
**Job Locations** _US-VA | US-AZ | US-AR | US-CT | US-DE | US-FL | US-GA | US-ID | US-MO | US-IN | US-IA | ..._
**ID** _2025-8083_
**Category** _Information Technology_
**Type** _Regular Full-Time_
Manual Ethical Hacker
Security Engineer job 27 miles from Ashburn
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
* Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
* Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
* Perform assessments of the security, effectiveness, and practicality of multiple technology systems
* Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
* Prepare and present detailed technical information for various media including documents, reports, and notifications
* Provide clear and practical advice regarding managed risks
* Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
* Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
* Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
* SQL injection/XSS attack without the use of tools
* Experience performing manual code reviews for security relevant issues
* Experience working with SAST tools to identify vulnerabilities
* Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
* Experience performing manual web application assessments i.e., must be able to simulate a
* Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
* Experience with vulnerability assessment tools and penetration testing techniques
* Solid programming/debugging skills
* Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
* Threat Analysis
* Innovative Thinking
* Technology Systems Assessment
* Technical Documentation
* Advisory
Desired:
* CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
* Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)
Hours Per Week:
40
Pay Transparency details
US - CO - Denver - 1144 15th St - Denver Gis (CO9926), US - DC - Washington - 1800 K St NW - 1800 K Street NW (DC1842), US - IL - Chicago - 540 W Madison St - Bank Of America Plaza (IL4540), US - NJ - Jersey City - 101 Hudson St - 101 Hudson (NJ2101), US - WA - Seattle - 401 Union St - Rainier Square (WA1510)
Pay and benefits information
Pay range
$125,000.00 - $145,000.00 annualized salary, offers to be determined based on experience, education and skill set.
Discretionary incentive eligible
This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.
Benefits
This role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.
Network Security Analyst
Security Engineer job 19 miles from Ashburn
Description:
SSI is seeking candidates interested in supporting a new DLA contract opportunity beginning in the August/September 2025 timeframe following the award of a new multi-year contract.
Job Description:
Defines network security requirements for local and wide area networks, evaluation of approved network security product capabilities, configuring standard communications protocols, detecting, and analyzing network vulnerabilities, and developing proper computer system security solutions
Analyzes and determines security requirements for local and wide area networks
Designs, develops, engineers, and implements solutions that meet network security requirements
Responsible for integration and implementation of the network security solution
Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development lifecycle.
Requirements:
Five (5) years of relevant experience
Experience in defining network security requirements for local and wide area networks, evaluation of approved network security product capabilities, configuring standard communications protocols, detecting, and analyzing network vulnerabilities, and developing proper computer system security solutions
DoD Approved 8570 Baseline Certification: Category IAM Level III
Active Secret Security Clearance
DESIRED QUALIFICATIONS:
DLA Experience
SSI is committed to non-discrimination and equal employment opportunity. All qualified applicants will receive consideration for employment without discrimination based on disability, protected veteran status or any other characteristics protected by law.
SSI is a HUBZone small business that provides professional services including systems engineering, information systems integration, and technology management services. SSI offers a generous array of benefits including: Employee Medical, Vision, Dental, and Prescription Drug Insurance Plans, 60% paid premium for dependents. SSI provides Life Insurance, Long Term Disability, and Short-Term Disability benefits at no cost. SSI employees receive 24 paid days off in the first year on board. We also provide Military Leave benefits, a 401(k) Retirement Plan, education assistance, Personal Technology Refresh and Employee Referral bonuses. Positions subject to Service Contract Act (SCA) have benefits provided as required by law.
Networking Security Analyst
Security Engineer job 29 miles from Ashburn
The company is looking for an amazingly talented Networking Security Analyst to join our team! In this role you will get to support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
What You'll Be Doing:
Risk Mitigation of sensitive networks and systems
Configure, scan, monitor, report
PCAP collection
What Required Skills You'll Bring:
1+ years' experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices
Experience with configuring, scanning, monitoring, alerting and reporting security tools.
Active TS/SCI Clearance
Must be willing to travel 15%- OCONUS and CONUS locations
What Desired Skills You'll Bring:
Experience with PCAP collection.
Experience as a SOC analyst.
Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
Minimum Clearance Required to Start:
Top Secret SCI
This position is part of our Federal Solutions team.
Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
The company is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the quest-APPLY TODAY!
Data Exploiter (TS/SCI with Poly Required)
Security Engineer job 10 miles from Ashburn
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. KEY RESPONSIBILITIES
Provide data exploitation and targeting support to the customer.
Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
Analyze intrusion artifacts to identify mitigation approaches for potential network defense
Provide recommendations for continuous improvement.
Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
Equivalent combination of education, technical certifications, training, and work/military
experience. REQUIRED QUALIFICATIONS
Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
Demonstrated experience in utilizing technical targeting tools
Experience reviewing and assessing network traffic and knowledge of the OSI Layers
Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
Knowledge of incident response, containment, and mitigation
Knowledge of common cyber-attack methods
Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
Demonstrated experience performing vulnerability identification, risk analysis, and remediation
Ability to triage, review, identify, and correlate items of interest from numerous all source
datasets
Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
Identify and document information that can fill critical gaps
Create new methodologies / algorithms for data analysis and correlation
Create entity / object profiles and derived data sets that enable future opportunities and
analytical efforts
Prepare a range of tailored products that embody and explain findings
Experience with technical collection abilities
DESIRED QUALIFICATIONS
Python Scripting
Strong understanding of VPNs, VLANs, and TCP/IP
Understanding of Linux operating systems
Ability to working independently with minimal supervision
Experience conducting network traffic analysis
Understanding of forensic tools and applications
Salary Range $160,000-$224,764
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Senior Security Engineer (Splunk Content Developer/ES Searchhead Admin)
Security Engineer job 38 miles from Ashburn
We are looking for a Splunk Content Developer/ES Search head Admin that can come in and take ownership of day-to-day Operations with minimal spin-up time. The successful candidate will be a member of a high performing team of certified Splunk Enterprise and Splunk ES administrators. You will partner with additional teams within Navy Federal Credit Union to protect the Navy Federal brand, data, and IT assets from cyber-based threats in support of our Cybersecurity Operations Center (CSOC) and its associated programs. You will serve as technical interface to customers (analysts) for Splunk and Splunk ES, articulating technology and product positioning to both business and technical users. Successful candidates will work independently, must be a self-starting self-motivated individual, be accountable and timely in their production and status reporting, and communicate effectively both in writing and when speaking to groups. You will be expected to work to build and maintain relationships within and outside of the CSOC. This position will require a high level of attention to detail to the work performed, following process, and detailed updates/documentation using Jira.
Responsibilities
Developing notable events, visualizations, forms, reports, alerts, dashboards, and visualizations to identify adversarial activity
Build and implement event correlation rules, logic, and content in the SIEM
Configure notable event actions, action menus and Adaptive Responses
Tune SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives and/or known errors
Create and support the creation of SIEM Use Cases and understand what alerts and log enrichment is necessary to meet the required acceptable false positive rate
Translate feedback from the business to Splunk technical requirement and solutions
Normalize data to ensure CIM compliance, and align with data models to accelerate queries, dashboards, and correlation searches
Maintain Splunk Apps, Technology Add-ons as required by Splunk ES upgrades
Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM, Fraud, and SOAR platforms
Monitor system stability and performance and ensure system availability, reliability, and usability
Troubleshoot and resolve Splunk-related technical issues, partnering with IT and SOC teams as needed
Always provide professional and courteous service with excellent verbal and written communications skills.
Participate in on-call rotation and respond to incident alerts
Stay abreast of the latest Splunk features, technologies, and industry trends, and make recommendations for continuous improvement
Follow Change & Configuration Management procedures in relevant tools (e.g. Jira, SNOW, etc.)
Ensure the completion of tasks and update tickets accordingly
Qualifications
Bachelor's degree in computer science, Information Systems, Cybersecurity or comparable field of study, and/or equivalent work experience
Six (6) to eight (8) years of experience with Splunk in distributed deployments and at least two (2) years of experience in Splunk Cloud environments
At least three (3) years of experience with Splunk Enterprise Security
Current Splunk Enterprise Certified Admin certification
Current Splunk Enterprise Security Certified Admin certification
Proficient at data administrative activities including parsing and normalizing events to the Splunk Common Information Model (CIM)
Proficiency aligning data to Splunk-developed add-ons for Windows, Linux, and common third-party devices and applications
Superb communication skills (both oral/written) including the ability to clearly communicate technical topics and risk to an audience than can include both engineers and executives
Strong problem-solving abilities with an analytic and qualitative eye for reasoning under pressure
Experience with SIEM and/or SOAR platforms, including the development of automations and integrations
Self-starter with the ability to independently prioritize and complete multiple tasks with little to no supervision
Knowledge of JIRA and Confluence
Knowledge of Change Management processes
Hands on experience in an agile environment
Desired Qualifications
Current Splunk Enterprise Certified Architect
Current Splunk Core Certified Consultant
Expert-level knowledge and ability with Splunk Enterprise Security or integration with other Security Information and Event Management (SIEM) platforms
Knowledge of scripting languages like Python
Experience in the banking or finance industries a plus
Knowledge of version control practices and experience with version control software products (e.g. Git, Bitbucket, etc.)
Knowledge of/ Experience with data pipeline configuration and integration
Relevant cybersecurity certifications, (e.g. CISSP, GCIA, GCIH, GCED, or similar).
At least three (3) years of experience in Cybersecurity, InfoSec, Security Engineering, Network Engineering with emphasis in Cybersecurity in the following areas:
In-depth knowledge of operating systems logs (Windows servers and workstations, AIX/Linux/Solaris, and Apple Mac)
In-depth knowledge of network appliance logs (Firewalls, router & switches).
Incident Response analysis
Network Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
Security Orchestration Automation and Response (SOAR)
Endpoint and Network Detection and Response (EDR/NDR)
User Behavior Analytics (UBA)
Network and Host malware detection and prevention
Network and Host forensic applications
Web/Email gateway security technologies
Hours: Monday - Friday, 8:00AM - 4:30PM
Locations: 820 Follin Lane, Vienna, VA 22180 | 5550 Heritage Oaks Dr. Pensacola, FL 32526 | 141 Security Dr. Winchester, VA 22602 | Remote
Salary Range: $99,400 - $155,350 annually (Level III)
$114,500 - $204,000 annually (Level IV)
About Us
Navy Federal provides much more than a job. We provide a meaningful career experience, including a culture that is energized, engaged and committed; and fierce appreciation for our teams, who are rewarded with highly competitive pay and generous benefits and perks.
Our approach to careers is simple yet powerful: Make our mission your passion.
• Best Companies for Latinos to Work for 2024
• Computerworld Best Places to Work in IT
• Forbes 2024 America's Best Large Employers
• Forbes 2024 America's Best Employers for New Grads
• Forbes 2024 America's Best Employers for Tech Workers
• Fortune Best Workplaces for Millennials™ 2024
• Fortune Best Workplaces for Women ™ 2024
• Fortune 100 Best Companies to Work For 2024
• Military Times 2024 Best for Vets Employers
• Newsweek Most Loved Workplaces
• 2024 PEOPLE Companies That Care
• Ripplematch Recruiting Choice Award
• Yello and WayUp Top 100 Internship Programs
From Fortune. ©2024 Fortune Media IP Limited. All rights reserved. Used under license. Fortune and Fortune Media IP Limited are not affiliated with, and do not endorse products or services of, Navy Federal Credit Union.
Equal Employment Opportunity: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected Veteran.
Hybrid Workplace: Navy Federal Credit Union is a hybrid workplace, and details will be discussed during your interview process.
Disclaimers: Navy Federal reserves the right to fill this role at a higher/lower grade level based on business need. An assessment may be required to compete for this position. Job postings are subject to close early or extend out longer than the anticipated closing date at the hiring team's discretion based on qualified applicant volume. Navy Federal Credit Union assesses market data to establish salary ranges that enable us to remain competitive. You are paid within the salary range, based on your experience, location and market position
Bank Secrecy Act: Remains cognizant of and adheres to Navy Federal policies and procedures, and regulations pertaining to the Bank Secrecy Act.
Network Security Analyst
Security Engineer job 16 miles from Ashburn
Network Security AnalystLOCATIONTysons, VA 22182CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Network Security Analyst
Security Engineer job 29 miles from Ashburn
Responsibilities & Qualifications RESPONSIBILITIES * Define network security requirements for both local and wide area networks (LAN/WAN). * Evaluate and integrate approved network security products and tools into the enterprise architecture. * Configure standard communication protocols and ensure secure data transmission across enterprise environments.
* Detect and analyze network vulnerabilities using advanced security tools and methodologies.
* Develop and implement computer system security solutions to mitigate identified risks.
* Design, develop, and engineer secure network solutions that align with evolving DoD cybersecurity requirements.
* Perform risk and vulnerability assessments throughout all phases of the system development lifecycle.
* Support the integration and implementation of end-to-end network security controls, aligned with DoD and DLA directives
REQUIRED QUALIFICATIONS
* Experience:
* Five (5) years relevant experience
* Experience in defining network security requirements for local and wide area networks, evaluation of approved network security product capabilities, configuring standard communications protocols, detecting, and analyzing network vulnerabilities, and developing proper computer system security solutions.
* Certifications:
* DoD Approved 8570 Baseline Certification: Category IAM Level III (One of the Following):
* CISM
* CISSP (or Associate)
* GSLC
* CCISO
* Clearance:
* Must possess a Top-Secret clearance (IT-I Critical Sensitive security clearance or Tier 5 (T5))
Overview
We are seeking a Network Security Analyst to join our team supporting DLA J6 Enterprise Sourcing, Medical and Contingency (ESMC) Hosting and Support.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
* Locations: Contractor site/Off-site; periodic support at HQ DLA (Fort Belvoir, VA)
* Type of environment: remote/ some travel to Fort Belvoir, VA, Orlando, FL; Philadelphia, PA
* Noise level: Medium
* Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
* Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
U.S. Citizen
Top-Secret clearance (IT-I Critical Sensitive security clearance or Tier 5 (T5))
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.