Post job

Security engineer jobs in Baltimore, MD

- 2,725 jobs
All
Security Engineer
Security System Engineer
Network Security Analyst
Defense Analyst
Hacker
Security Systems Specialist
Systems Engineer
Securities Consultant
Information Security Officer
Network Engineer
Data Security Analyst
Information Security Analyst
  • Computer Security System Specialist

    Govcio LLC

    Security engineer job in Bethesda, MD

    GovCIO is currently hiring for a Computer Security System Specialist for our NIH-CIT proposal. This position will be located in Bethesda, MD and is a remote/hybrid position Responsibilities: Communicate, investigate, triage, monitor, and respond to security incidents, events, alerts, and issues according to standard operating procedures and in collaboration with NS Operations Contribute to alert thresholds refinements and contribute to continuous improvements to the Security Section for the benefit of customer satisfaction Qualifications: Bachelor's with 5 - 8 years of cyber system security experience (or commensurate experience) Clearance Required:Ability to maintain a Public Trust clearance Company Overview: GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? What You Can Expect Interview & Hiring Process If you are selected to move forward through the process, here's what you can expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented during each interview During the Hiring Process Enhanced Biometrics ID verification screening Background check, to include: Criminal history (past 7 years) Verification of your highest level of education Verification of your employment history (past 7 years), based on information provided in your application Employee Perks At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: Employee Assistance Program (EAP) Corporate Discounts Learning & Development platform, to include certification preparation content Training, Education and Certification Assistance* Referral Bonus Program Internal Mobility Program Pet Insurance Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. Posted Pay Range The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. Posted Salary Range: USD $115,000.00 - USD $115,000.00 /Yr.
    $115k yearly Auto-Apply 2d ago
  • Systems Engineer

    Mantech 4.5company rating

    Security engineer job in Annapolis, MD

    MANTECH seeks a motivated, career and customer-oriented Systems Engineer III to join our team in Annapolis Junction, Maryland. ManTech is currently seeking Systems Engineer III to join our team at Annapolis Junction, MD. We are seeking a Senior Systems Engineer who is a seasoned IT professional responsible for designing, implementing, and a top-level trouble shooter supporting a high-level architecture of an organization's backend infrastructure. You will communicate with other project personnel, Government stakeholders, and senior executives. Responsibilities include but are not limited to: Administer and maintain IT infrastructure by utilizing expert-level knowledge of the Linux operating system, along with deep expertise in server administration, virtualization, and cloud platforms like AWS or Azure, to manage the organization's backend systems. Develop and implement automation solutions through creating scalable automation services using strong scripting and orchestration skills, with proficiency in tools like Python, Bash, and Ansible. Design and manage system architecture by applying systems engineering principles to design, implement, and manage the high-level architecture of the organization's backend infrastructure. Ensure network and system security through a strong understanding of networking and security fundamentals, including TCP/IP, firewalls, and VPNs, to protect the organization's infrastructure. Communicate with stakeholders - Interact directly with government personnel, senior executives, and other project members to discuss technical issues and project status. Provide technical guidance and troubleshooting as a top-level troubleshooter, addressing technical considerations, problems, and issues for both internal teams and government stakeholders. Minimum Qualifications: Bachelor's degree in STEM field or Highschool and 13 years of experience; Associates and 11 years of experience in lieu of degree, a candidate holding a relevant master's degree may be granted 2 years' experience credit for that extra education, a candidate holding a relevant PhD degree may be granted 4 years' experience credit for that extra education. 5 years of position-relevant work experience. DoD 8570.01-m IAT Level II. Strong proficiency in scripting and automation, with hands-on experience in Python, Bash, and an infrastructure orchestration tool like Ansible. Experience in front-end web development to create internal tools and solutions. Proven background as an Orchestration Engineer or in a similar role focused on building scalable automation services. Solid grasp of TCP/IP networking, firewalls, VLANs, and VPNs. Expert-level knowledge of the Linux operating system. Preferred Qualifications: Experience with full-stack development, including creating and interacting with databases and APIs. Knowledge of Infrastructure as Code (IaC) principles, preferably with experience using Terraform. Familiarity with public cloud platforms (AWS, Azure, GCP) and container technologies (Docker, Kubernetes). Proficiency with virtualization platforms such as VMware vSphere or Microsoft Hyper-V. Exceptional troubleshooting and problem-solving skills, with a talent for systematically diagnosing and resolving complex technical issues. A foundational understanding of traditional Systems Administration principles Clearance Requirements: Must have a current/active TS/SCI Physical Requirements: The person in this position must have the ability to perform tasks while stationary 50% of the time at a computer, with specific emphasis on visual acuity for close-range work. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
    $81k-106k yearly est. 2d ago
  • Cyber Security Consultant

    The Planet Group 4.1company rating

    Security engineer job in Washington, DC

    BASIC FUNCTION: The Senior Cybersecurity Engineer is responsible for safeguarding the client information systems, digital assets, and technology infrastructure. This role designs, deploys, and maintains advanced cybersecurity solutions that protect patient data, clinical systems, and enterprise applications. The Senior Cybersecurity Engineer ensures the client's technology environment remains secure, compliant, and resilient against emerging threats. This position combines hands-on technical expertise with strategic leadership, driving initiatives that enhance cybersecurity maturity and operational readiness across on-premises, hybrid, and cloud environments (e.g., Azure, AWS). The role is pivotal in incident response, risk management, and ongoing improvement of security controls in alignment with hospital policies and regulatory standards such as HIPAA, NIST 800-53, and ISO/IEC 27001. Salary: $130-140k Employment Type: Full-time, direct hire Location: Onsite 3 days/week, remote 2 days/week in Washington DC SUPERVISORY ACCOUNTABILITIES: This role does not have direct supervisory responsibility but may provide technical guidance and mentorship to junior cybersecurity staff, contractors, and project teams. The Senior Cybersecurity Engineer may lead cross-functional implementation teams and coordinate security initiatives with other IT departments. NATURE AND SCOPE: Operating in a fast-paced, high-impact healthcare technology environment, the Senior Cybersecurity Engineer reports to the Senior Director of Cybersecurity and collaborates with colleagues across Technology Services, including Infrastructure, Applications, Network Operations, and Compliance. Internal contacts include hospital administrators, clinical and research staff, faculty, and IT personnel. External contacts include technology vendors, auditors, and regulatory agencies. The role requires strong analytical skills, proactive threat awareness, and the ability to balance operational needs with strategic security objectives in a mission-critical healthcare setting. PRINCIPAL ACCOUNTABILITIES: Security Operations & Incident Response Monitor, analyze, and respond to security alerts, incidents, and anomalies across hospital systems. Conduct vulnerability assessments, penetration tests, and threat-hunting activities to identify and mitigate risks. Investigate and document security incidents, performing root cause analyses and recommending remediation measures. Utilize SIEM, EDR, and IDS/IPS platforms (e.g., CrowdStrike, Microsoft Sentinel) to enhance continuous monitoring. Security Engineering & Architecture Design, implement, and manage enterprise cybersecurity controls, including firewalls, NAC, DLP, CASB, and endpoint protection systems. Support secure configuration management using CIS Benchmarks and STIGs. Implement and maintain identity and access management (IAM), multifactor authentication (MFA), and privileged access controls. Integrate security practices into DevOps processes and CI/CD pipelines (DevSecOps). Support the adoption and enforcement of Zero Trust Architecture principles across hybrid and cloud environments. Governance, Risk, and Compliance Ensure adherence to cybersecurity frameworks and regulatory standards, including HIPAA, NIST 800-53, ISO/IEC 27001, PCI DSS, and GDPR. Contribute to the creation and maintenance of security policies, procedures, and documentation. Support internal and external audits, risk assessments, and compliance reviews. Participate in disaster recovery and business continuity planning activities. Collaboration, Training, and Awareness Collaborate with IT, Compliance, and Clinical Operations to integrate security into all technology operations. Provide mentorship and technical guidance to IT staff and cybersecurity personnel. Develop and deliver training on secure computing, phishing prevention, and data protection best practices. Communicate complex technical concepts clearly to diverse audiences, promoting shared responsibility for security. CORE COMPETENCIES: Strategic Thinking: Align cybersecurity initiatives with hospital priorities and risk management goals. Technical Expertise: Deep knowledge of enterprise and cloud security controls, architectures, and technologies. Incident Response: Skilled in threat analysis, vulnerability mitigation, and incident management. Collaboration: Strong interpersonal and communication skills for cross-departmental teamwork. Innovation: Ability to evaluate emerging tools, techniques, and threat intelligence for proactive defense. Compliance Knowledge: Familiarity with HIPAA, NIST, ISO 27001, PCI DSS, and related standards. Problem Solving: Detail-oriented and methodical approach to resolving complex security challenges. Adaptability: Capable of managing multiple priorities and responding quickly to evolving threats. MINIMUM REQUIREMENTS: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field required. Master's degree in Business Administration, Cybersecurity, or related discipline preferred. Experience: 7-10 years of progressive experience in information security, with at least 5 years in a security engineering role. Proven experience securing hybrid infrastructures, including on-premises systems and cloud environments (Azure, AWS, GCP). Hands-on expertise with enterprise tools such as Microsoft Defender Suite, Cisco ISE, CrowdStrike Falcon, and Azure Sentinel. Proficiency in scripting languages (e.g., PowerShell, Python) for automation and threat analysis. Certifications (one or more preferred): CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CCSP (Certified Cloud Security Professional) AWS Certified Security - Specialty Microsoft Certified: Azure Security Engineer Associate SABSA or TOGAF (preferred)
    $130k-140k yearly 3d ago
  • Network Engineer

    V3Gate LLC

    Security engineer job in Washington, DC

    The Network Engineer's role is to ensure stability, integrity, and efficient operation by monitoring, maintaining, supporting, and optimizing all networked software and associated operating systems. Like the look of this opportunity Make sure to apply fast, as a high volume of applications is expected Scroll down to read the complete job description. The Network Engineer will apply proven communication, analytical, and problem-solving skills to help identify, communicate, and resolve issues with multiprotocol routers, multilayer switches, network security devices, and network management systems. xevrcyc This Network Engineer will also mentor and provide guidance to the Systems Engineer staff.
    $70k-93k yearly est. 1d ago
  • Computer Network Defense Analyst (CNDA) Level 1

    Aerovironment 4.6company rating

    Security engineer job in Jessup, MD

    The primary role of the Computer Network Defense Analyst (CNDA) is to be on the front lines of protecting critical systems, applying your expertise in cybersecurity, network defense, and traffic analysis to detect, respond, and prevent threats. Position Responsibilities Design and develop computer or information systems, including programming and network/cybersecurity solutions. Conduct vulnerability analysis, penetration testing, computer forensics, and information assurance. Perform systems engineering and network/system administration. Analyze data from multiple sources (intrusion detection systems, firewalls, traffic logs, host system logs) to: Identify potential vulnerabilities, Respond to active cyber events, and Defend against emerging threats Basic Qualifications (Required Skills & Experience) Bachelor's degree in Computer Science, Network Engineering, Information Technology or related STEM discipline or equivalent combination of education, and experience Minimum 2+ years of relevant experience An active TS/SCI with polygraph Salary Range: $70,000 - $100,000 The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data. Clearance Level Top Secret with Poly ITAR Requirement: T his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements. Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************** We also encourage you to review our company website at ******************** to learn more about us. Principals only need apply. NO agencies please. Who We Are Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC. Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed. What We Do Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition. We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status. ITAR U.S. Citizenship required
    $70k-100k yearly Auto-Apply 4d ago
  • Network Sniffer Analysis

    E*Pro 3.8company rating

    Security engineer job in McLean, VA

    E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ****************** We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Job Description Position Title : Network Sniffer Analysis Location : Mclean, VA Length : Full time / Permanent Position Work Status : US Citizen/ Green Card Holder/ EAD (GC) Required Skills • Strong data analysis ability with sniffer, packet, net flow data. • Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications. • Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components. Technologies Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion. Sincerely Yours, Ranjit Technical Recruiter | E*Pro Inc., Work: ************ x (234) Email: [email protected] E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095 Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-115k yearly est. 14h ago
  • Computer Network Defense (CND) Analyst

    CTC Group 3.1company rating

    Security engineer job in Fort Meade, MD

    Job Description CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Responsibilities Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers. Qualifications Active TS/SCI with polygraph clearance STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Documented foreign language proficiency may count toward experience requirements. Level 1 Requirements Associate's degree plus 4 years of relevant experience. OR: Bachelor's degree or 2 years of relevant experience. Level 2 Requirements Associate's degree plus 7 years of relevant experience. OR: Bachelor's degree plus 5 years of relevant experience. OR: Master's degree plus 3 years of relevant experience. OR: Doctorate degree plus 2 years of relevant experience. Level 3 Requirements Associate's degree plus 10 years of relevant experience. OR: Bachelor's degree plus 8 years of relevant experience. OR: Master's degree plus 6 years of relevant experience. OR: Doctorate degree plus 4 years of relevant experience. Level 4 Requirements Associate's degree plus 13 years of relevant experience. OR: Bachelor's degree plus 11 years of relevant experience. OR: Master's degree plus 9 years of relevant experience. OR: Doctorate degree plus 7 years of relevant experience. #CJ Why CTC Group? As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations. CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here. CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Powered by JazzHR Luf4o3VeSC
    $66k-94k yearly est. 13d ago
  • Manual Ethical Hacker

    Bank of America Corporation 4.7company rating

    Security engineer job in Washington, DC

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Job Description: Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. Key Responsibilities in order of importance: * Perform assigned analysis of internal and external threats on information systems and predict future threat behavior * Incorporate threat actors' tactics, techniques, and procedures into offensive security testing * Perform assessments of the security, effectiveness, and practicality of multiple technology systems * Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. * Prepare and present detailed technical information for various media including documents, reports, and notifications * Provide clear and practical advice regarding managed risks * Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills Required Skills: * Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment * Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services * SQL injection/XSS attack without the use of tools * Experience performing manual code reviews for security relevant issues * Experience working with SAST tools to identify vulnerabilities * Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings * Experience performing manual web application assessments i.e., must be able to simulate a * Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) * Experience with vulnerability assessment tools and penetration testing techniques * Solid programming/debugging skills * Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map * Threat Analysis * Innovative Thinking * Technology Systems Assessment * Technical Documentation * Advisory Desired: * CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar * Strong programming/scripting skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. Shift: 1st shift (United States of America) Hours Per Week: 40
    $87k-122k yearly est. 7d ago
  • Network and Security Analyst

    Vheda Health

    Security engineer job in Columbia, MD

    We're seeking a talented and motivated Network and Security Analyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role. Key Responsibilities Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi) Assess and improve existing IT systems and processes Coordinate with vendors for cabling, equipment, and installation Set up and recommend equipment for new hires Manage access control systems, surveillance integration, and UPS/power solutions Evaluate and improve domain/web infrastructure Ensure HIPAA and data privacy compliance in all IT operations Required Qualifications Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+) 5-10+ years in IT infrastructure, networking, or systems analysis Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control Familiar with HIPAA, PII, and cybersecurity best practices Experience with Microsoft 365, Power BI, and Asana (preferred) Preferred Qualifications Healthcare or regulated industry experience Why Join Vheda Health? At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package: Compensation: Competitive salary within the published range plus performance bonus and equity opportunities Healthcare: Comprehensive medical, dental, and vision coverage Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability Work-Life Balance: Unlimited paid time off and 11 paid company holidays Community: Engaging team events and activities throughout the year
    $66k-90k yearly est. 60d+ ago
  • T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)

    Critical Solutions 3.5company rating

    Security engineer job in Washington, DC

    Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS) Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET JOB DESCRIPTION Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC. The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs). PRIMARY ROLES AND RESPONSIBILITIES: Utilize a SIEM for enterprise monitoring and detection Create Security Event Notifications to document investigation findings Perform critical thinking and analysis to investigate cyber security alerts Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc) Collaborate with team members to analyze an alert or a threat Stay up to date with latest threats Monitor shared email box for notifications and requests Utilize OSINT to aid in their investigation Contribute to content tuning requests BASIC QUALIFICATIONS: Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance must have the ability to work non-core hours, if necessary. Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below: Network Administration Unix/Linux Administration Software engineering Software development Systems administration Help desk/IT support The ideal candidate is a self-motivated individual in pursuit of a career in cyber security. Familiarity with a SOC's purpose and role within an organization General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). Familiarity with packet analysis tools such as Wireshark Able to perform critical thinking and analysis to investigate cyber security alerts Familiarity with common malware and attack vectors Familiarity with Windows operating systems and standard OS logging Familiarity with Antivirus, DLP, and host based firewalls Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+ PREFERRED QUALIFICATIONS: Familiar with SOC methodologies and processes Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc) SHIFT SCHEDULE: Shift schedule will be determine at the time of the start date Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift) Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift) Must have the ability to work non-core hours, if necessary. LOCATION: This is a hybrid role with expectations of being on the client site most days. Must be willing and able to commute to Washington, DC ADDITIONAL INFORMATION: CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED CRITICAL SOLUTIONS PAY AND BENEFITS: Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements. BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more Job Posted by ApplicantPro
    $58k-74k yearly 15d ago
  • Safety and Security Data Analyst

    AHU Technologies Inc.

    Security engineer job in Washington, DC

    Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities Gather and accurately organize safety and security data collected from various internal and external sources. Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets. Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas. Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes. Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data. Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data. Qualifications Minimum Requirements Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting). Demonstrable experience with data collection, maintenance, and basic reporting. Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records. Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment. Unwavering ability to maintain confidentiality and protect sensitive data. Preferred Skills Familiarity or exposure to basic data visualization techniques. Working knowledge of or familiarity with programming languages such as Python and SQL. Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries. Prior exposure to or experience with safety, security, or transportation-related data.
    $66k-95k yearly est. 9d ago
  • Network Security Systems Engineer

    VOR Technology 3.9company rating

    Security engineer job in Fort Meade, MD

    VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training. Job Description VOR Technology is seeking a Network Security Systems Engineer to provide network security support to the contract focusing on SIGINT systems interconnectivity. Experience with Linux, switches, routers, encryption devices, copper and fiber connectivity and protocols is required. Primary responsibilities will include design, integration, test, operations, and maintenance of connecting networks. Occasional operational systems support is required after-hours or on a call-in basis. Qualifications *All Candidates must have a TS/SCI clearance with a Full Scope Polygraph Five (5) years' of experience in network security design and managing installation and support of LAN/WAN based network security components to include firewalls and authentication (AAA) systems. Three (3) years' of experience with the following: - Resolving complex network and security issues where in-depth evaluation and analysis may be required using network monitoring platforms, LAN/WAN test equipment, and log analyzers. - Implementing networks with Gigabit Ethernet, Fast Ethernet and security services, terminal servers, and Network Time Protocol (NTP) services. - Performing network and network security architecture, design, and integration on UNIX, Windows, Linux, or other Operating System (OS) configurations. Knowledge of and experience with Cisco and Juniper devices. Some knowledge of file storage applications in native and virtual environments. Fundamental understanding of access control list (ACL), network address translation (NAT), virtual private networking (VPN), public key infrastructure (PKI), and authentication, authorization, and accounting (AAA). Two (2) years' experience with modern LAN/WAN networking concepts and protocol support to include TCP, UDP, RDP, DHCP, SSH, NTP, DNS, ARP, ICMP, SCP, and TFTP. Experience with configuration, implementation and sustainment of IP Encryption devices. Additional Desired Skills: Knowledge of WAN Optimizers LINUX experience Working knowledge of dynamic routing protocols to include EIGRP and BGP Cisco Certified Network Professional (CCNP) Certification (can substitute for 1 year experience) Knowledge of intrusion detection system (IDS) rules Additional Information Education Requirement: Bachelor's Degree in a technical field Clearance Requirement: Active TS/SCI with Full Scope clearance * US citizenship is required. EOE/M/F/D/V
    $83k-115k yearly est. 60d+ ago
  • System Security Engineer

    Clearedge 3.7company rating

    Security engineer job in Linthicum, MD

    Join ClearEdge and be a part of a dynamic team that solves some of the DoD's most complex technical challenges. Every day, ClearEdge empowers our customers in government and industry with innovative, data-driven solutions. Check out our extremely competitive benefits package at ***************************** which includes a $10k annual training/education benefit, 10% 401k contribution fully vested on day one, annual health and technology allowance, and access to a state-of-the-art technology lab. We also offer monthly TechConnect and DeepDive collaboration sessions with our entire technical staff. Your Mission: Join ClearEdge as a System Security Engineer and begin shaping and maintaining an enterprise-wide Information Security (IS) program that supports a Chief Information Security Officer (CISO) client organization. Here, you'll work in close collaboration with mission leads and system owners across various mission areas, applying your security expertise to solve complex challenges. This is a hands-on, strategic role that influences security architecture through impactful technical working groups and stakeholder engagement in a dynamic, mission-driven environment.You Will Excel in This Role If You Are: With deep expertise as an ISSO, ISSE, or ISSM, you have a solid foundation in requirements gathering, analysis, and client engagement You're adept at engaging stakeholders at all levels, from mission leads to system owners, and excel in working both independently and within a team You bring a strong knowledge of system and security architecture, with a readiness to apply this expertise to real-time enterprise-wide security needs A Day in the Life: Collaborate closely with the CISO team to support the development and upkeep of an enterprise-wide Information Security program Provide security architecture expertise through direct engagement with mission leads and system owners, ensuring systems align with agency security standards Participate in technical working groups to shape information security policies and define system security architecture, translating user requests into technical solutions. Assess residual risk, implement security controls, and apply your knowledge of frameworks Evaluate emerging technologies and security practices that could enhance the customer's security posture, while ensuring smooth migration to new systems with minimal impact Apply threat analysis and security controls to maintain a secure, compliant environment Actively contribute to technical discussions and working groups to drive informed, mission-aligned security architecture and policy decisions Must Haves: Active TS/SCI clearance with polygraph 8 years of relevant experience Strong understanding of security controls, residual risk management, and system architecture within an Enterprise-level environment Experience with requirements gathering and analysis, and client and stakeholder engagement through working groups and technical exchange meetings Knowledge of Supply Chain Risk Management (SCRM) Knowledge of system or security architecture Ability to work both individually and in a team environment in an Enterprise-level organization Nice to Haves: Bachelor's degree in a related field Systems Engineering Expertise: A strong foundation in systems engineering to enhance your technical capabilities and problem-solving approach Agency Knowledge: Familiarity with the corporate systems of national agencies, including their security control implementations Risk Assessment Skills: Ability to evaluate residual risk by analyzing threats and security control implementations Exceptional Communication: Demonstrated written and verbal communication skills for effectively engaging with both technical and non-technical audiences About us: We are an experienced advanced analytic development company providing Cyber solutions to current and emerging missions. Our Core Values of Honesty, Integrity, Loyalty, Fairness, Respect, Responsibility, and Accountability drive our mission and vision and are the heart of what we do each day. We combine our Core Values with the three key elements of people, technology, and integrity to repeatedly deliver stellar results within our primary competencies. ClearEdge is also pleased to share that we have recently expanded our prime and subcontract presence into new cyber markets! If this position does not fit your skillset, please visit our Careers page to explore our current openings, or contact a ClearEdge recruiter at ***********************. ClearEdge is an equal opportunity employer.
    $80k-109k yearly est. Auto-Apply 60d+ ago
  • System Security Engineer

    NIH-NCBI

    Security engineer job in Bethesda, MD

    Black Canyon Consulting (BCC) is searching for a System Security Engineer to support our work for the National Center for Biotechnology Information (NCBI) at the National Library of Medicine (NLM), an institute of the National Institutes of Health. This is a full-time position located at the NIH campus in Bethesda, MD and/or remote. We are looking for a highly self motivated System Security Engineer to join the team responsible for hosting one of the largest US Government Agency websites and public data archives. NCBI is part of the National Library of Medicine (NLM) at the National Institutes of Health (NIH). NCBI is the world's premier biomedical center, hosting over six million daily users that seek research, clinical, genetic, and other information that directly impacts biomedical research and public health. At NCBI, you can literally help to accelerate cures for diseases! We attract the best people in the business with our competitive benefits package that includes medical, dental and vision coverage, 401k plan with employer contribution, paid holidays, vacation, and tuition reimbursement. If you enjoy being a part of a high performing, professional service and technology focused organization, please apply today! Duties & Responsibilities Firewall management. IP management. Vulnerability/System compliance management. Analyze architecture and system functionality for a broad range of technologies. Log analysis for incident remediation/threat hunting. Troubleshooting security and network problems. Provide support in the areas of information assurance, vulnerability assessment, enterprise protection planning, security monitoring, incident response, cyber security, and cyber threat analysis. Participate in formal incident response efforts coordinating responses to major intrusions or exploits. Incident investigations include intrusions, illegal software usage, etc. Determine Security Incident Event Management (SIEM) pattern analysis based on threat intelligence feeds Requirements Bachelor's degree or 4 yrs of equivalent experience. Minimum 2+ years hands on firewall management experience Minimum 2+ years hands on vulnerability management experience Working knowledge and demonstrated experience in network design, network security, and firewall technologies. Experience with Fortinet, Symantec endpoint protection, and Arista/Cisco ACLs preferred. Experience with testing and identifying network and system vulnerabilities using tools such as Tenable.SC and BigFix. Experience with log analysis. Experience with Splunk preferred. Good understanding of computing security, authentication techniques, operation procedures and general practices in an enterprise IT infrastructure. Demonstrated self-initiated ability for analyzing, debugging, and tracking security issues. Identifies problems, determines the accuracy and relevance of information, and uses sound judgment to generate and evaluate alternatives, and to make recommendations. Excellent organization and time management skills and ability to identify priorities as needed to accomplish a variety of tasks. Excellent written and oral communication skills and ability to work with people at every level.
    $82k-114k yearly est. Auto-Apply 60d+ ago
  • Network Security Analyst

    Cymertek

    Security engineer job in Annapolis, MD

    Network Security AnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $66k-90k yearly est. Easy Apply 60d+ ago
  • Systems Engineer - Department of Homeland Security

    Tln Worldwide Enterprises, Inc.

    Security engineer job in Washington, DC

    Requirements Education: Bachelor's degree in Computer Engineering, Systems Engineering, or related field (Master's preferred). - Experience: - 3+ years designing/implementing **large-scale federal enterprise systems**. - 2+ years leading **cloud migrations (AWS GovCloud/Azure Government)**. - Proven track record in **legacy system modernization** and API-centric architectures. - Expertise in **Python, Java, Terraform, Kubernetes, and enterprise data platforms**. - Certifications: One or more of **CISSP-ISSAP, AWS/Azure Solutions Architect, TOGAF, or INCOSE CSEP**. Salary Description 85,000 - 150,000
    $74k-104k yearly est. 60d+ ago
  • System Engineer - On-Site - Security Clearance Required

    Nextis Solutions, Inc.

    Security engineer job in Aberdeen Proving Ground, MD

    Job Description About the Role: As a System Engineer, you will be responsible for designing, implementing, and maintaining computer systems and solutions that meet the needs of our clients. You will work on-site and be required to have a security clearance. Your main goal will be to ensure that our clients' computer systems are secure, reliable, and efficient. You will work closely with other engineers and technical staff to ensure that all systems are integrated and functioning properly. Minimum Qualifications: Experience designing and implementing computer systems Strong knowledge of computer hardware, software, and operating systems Excellent problem-solving and analytical skills Ability to obtain and maintain a U.S. Federal Security Clearance Preferred Qualifications: Experience working with government clients Experience with system security and encryption Certifications in relevant technologies such as Microsoft or CompTIA Responsibilities: Design and implement computer systems that meet the needs of our clients Maintain and troubleshoot computer systems to ensure they are secure, reliable, and efficient Collaborate with other engineers and technical staff to ensure all systems are integrated and functioning properly Provide technical support to clients as needed Stay up-to-date with the latest trends and technologies in computer systems engineering Skills: As a Computer System Engineer, you will use your strong knowledge of computer hardware and software to design and implement computer systems that meet the needs of our clients. You will also use your problem-solving and analytical skills to troubleshoot and maintain these systems. Your ability to collaborate with other engineers and technical staff will be essential in ensuring that all systems are integrated and functioning properly. Additionally, your knowledge of network security and encryption will be beneficial in this role. Finally, your ability to stay up-to-date with the latest trends and technologies in computer systems engineering will ensure that you are able to provide the best possible solutions to our clients.
    $82k-115k yearly est. 25d ago
  • IAM and Security Systems Analyst

    Year Up 3.8company rating

    Security engineer job in Washington, DC

    About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection. This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response. Key Responsibilities Identity & Access Management (IAM) Manage and support identity platforms including Active Directory, Azure AD, and Okta. Implement RBAC, least privilege principles, and automated provisioning/deprovisioning. Conduct periodic access reviews and support access certification processes. Integrate IAM controls into application and cloud environments. Security Engineering & Tooling Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools. Manage SIEM tools including rule tuning, log ingestion, and correlation. Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST). Perform application security testing and contribute to threat modeling and risk evaluations. Lead cloud control monitoring, data protection measures, and compliance reporting. Threat Detection & Incident Response Conduct analysis of security alerts and lead incident response efforts. Leverage threat intelligence to update detection mechanisms and enhance response playbooks. Perform root cause analysis and evidence handling following incidents. Support red team/blue team exercises and penetration testing activities. Architecture, Process & SDLC Integration Review and evaluate system and application security architectures. Support integration of security controls across the SDLC and DevSecOps pipelines. Design and continuously improve security processes and documentation. Participate in security metrics and reporting efforts to track control effectiveness. Support SOC design discussions and contribute to its operational maturity. Collaboration & Compliance Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives. Assist with internal and external audits, control documentation, and evidence collection. Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001. Help run awareness training, phishing simulations, and risk assessments. This is a hybrid role that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC. Salary Range: $90,000-$110,000/annually Required Qualifications 3-5 years of experience in a security engineering or analyst role Strong experience with IAM platforms (Active Directory, Azure AD, Okta) Proficient in SIEM platforms, incident response, and Microsoft security tools Experience with automated security testing tools (SAST, DAST) Familiarity with cloud security (Microsoft 365, Azure) and application security principles Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus) Strong understanding of network protocols, system hardening, and endpoint defense Excellent problem-solving and communication skills Preferred Qualifications Familiarity with red teaming, penetration testing, and threat modeling Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001 Participation in SOC design or operations Experience with security metrics/reporting and risk assessments Why Join Us: You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains. #LI-HybridCOMPENSATION & BENEFITS: Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process. Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants. Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year. Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year) ** This is an exempt role (paid on a salaried basis). ** ORGANIZATION DESCRIPTION: Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington. Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission. COMMITMENT TO DIVERSITY: Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: *************************************************************** Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially. TO APPLY: Please submit a thoughtful cover letter and resume through our website. Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
    $33k-40k yearly est. Auto-Apply 60d+ ago
  • Chief Information Security Officer

    The Planet Group 4.1company rating

    Security engineer job in Washington, DC

    Chief Information Security Officer (CISO) The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system. Position Details Salary: $250-2750k Type: Full-time, direct hire Location: Washington DC, onsite 3 days a week Strategic Direction & Executive Leadership Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission. Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams. Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices. Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management. Risk Oversight & Regulatory Alignment Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks. Maintain adherence to all regulatory requirements applicable to both sectors: Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules. University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing. Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment. Operational Security Management Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection). Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities. Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects. Communication, Influence & Education Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams. Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals. Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture. Required Qualifications Education: Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred). Professional Background: At least 10 years of progressive cybersecurity experience. Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity). Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments. Certifications: One or more required-CISSP, CISM, or equivalent. Key Skills & Core Competencies Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques. Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model. Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution. Demonstrated success in leading security incident response efforts and handling high-pressure situations. Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
    $126k-174k yearly est. 3d ago
  • Network Sniffer Analysis

    E Pro Consulting 3.8company rating

    Security engineer job in McLean, VA

    E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ****************** We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Job Description Position Title : Network Sniffer Analysis Location : Mclean, VA Length : Full time / Permanent Position Work Status : US Citizen/ Green Card Holder/ EAD (GC) Required Skills • Strong data analysis ability with sniffer, packet, net flow data. • Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications. • Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components. Technologies Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion. Sincerely Yours, Ranjit Technical Recruiter | E*Pro Inc., Work: ************ x (234) Email: [email protected] E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095 Additional Information All your information will be kept confidential according to EEO guidelines.
    $83k-115k yearly est. 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Baltimore, MD?

The average security engineer in Baltimore, MD earns between $72,000 and $133,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Baltimore, MD

$98,000

What are the biggest employers of Security Engineers in Baltimore, MD?

The biggest employers of Security Engineers in Baltimore, MD are:
  1. E.T. Gresham
  2. Applied Tech
  3. PERSONAL GROUP
  4. Peraton
  5. Applied Industrial Technologies
  6. Scout ET
Job type you want
Full Time
Part Time
Internship
Temporary