Post job

Security engineer jobs in District of Columbia

- 567 jobs
  • Cyber Security Analyst

    AGR, LLC 4.3company rating

    Security engineer job in Washington, DC

    We are seeking multiple mid-level (5 years minimum) Cyber Defense Incident Responders that are available to work the midnight shift (11pm-7:30am) in a Security Operations Center. Clearance Requirements: Top Secret w/SCI Location: Washington, D.C. Job Description: Coordinate incident response functions. Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security. Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. Perform cyber defense trend analysis and reporting. Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems. Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs). Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. Track and document cyber defense incidents from initial detection through final resolution. Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness). Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. Coordinate with intelligence analysts to correlate threat assessment data. Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise. Basic Qualifications- To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below: Bachelor's degree or higher 5+ years' experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling Must have,one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP). Strong written and verbal communication skills. Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of system administration, network, and operating system hardening techniques. Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies. Demonstrated ability to interact effectively with senior management and leadership. Ability to design incident response for cloud service models. Knowledge of incident categories, incident responses, and timelines for responses. Knowledge of incident response and handling methodologies. Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) Desired Skills Experience identifying, capturing, containing, and reporting malware. Skill in preserving evidence integrity according to standard operating procedures or national standards. Strong securing network communications experience. Recognizing and categorizing types of vulnerabilities and associated attacks. Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters). Experience performing damage assessments. Skill in using security event correlation tools and design incident response for cloud service models.
    $82k-108k yearly est. 4d ago
  • Senior Azure Security Engineer

    Allianceit Inc.

    Security engineer job in Washington, DC

    Job Title: Senior Azure Security Engineer Rate: $80/Hr. w2 Job Qualifications: Skills: Security Controls, Security Tools, System Security Certifications: Active DoD 8570 IAT Level II Certification (Security+, CISSP, CISM) Experience: 10+ years of related experience Clearance Level Must Currently Possess: Secret Clearance Level Must Be Able to Obtain: None Job Description: Information Security Analyst Duties and Responsibilities: Design, implement, and maintain secure cloud architectures within Azure Government Secret classified environments Enforce zero trust principles, role-based access control (RBAC), and identity federation (e.g.,Azure AD B2B/B2C with CAC/PIV) Configure and manage security controls such as Microsoft Defender for Cloud, Key Vault, Azure Policy, NSGs, and Private Endpoints Automate compliance and security operations using PowerShell, Terraform, or ARM templates Integrate SIEM/SOAR tools (e.g., Microsoft Sentinel for IL6) for continuous monitoring, logging, and incident response Conduct vulnerability assessments and implement remediations aligned to NIST 800-53, DoD STIGs, and JSIG Collaborate with mission owners, compliance teams, and developers to ensure secure DevSecOps pipelines Support Authority to Operate (ATO) processes by generating security documentation, control evidence, and supporting audits Navigate federal systems through the authorization process to achieve and maintain Authority to Operate (ATO) Work with the ISSO, Program and DOC ITD IA teams to maintain the necessary security authorizations Develop comprehensive System Security Plans (SSPs) documenting all implemented NIST 800-53 controls Coordinate security assessments with third-party assessors Manage Plans of Actions & Milestones (POA&Ms) for addressing identified vulnerabilities Ensure continuous monitoring plans meet agency requirements Prepare authorization packages for government review Maintain ongoing compliance through change management processes Serve as the liaison between technical teams and authorizing officials Translate security requirements into actionable tasks Ensure all documentation meets the rigorous standards required for federal information systems Information Security Analyst Requirements and Qualifications: Bachelor's degree in information systems security; master's degree or equivalent professional experience in information security is preferred Active Secret clearance 5+ years in cloud security, including 2+ in Azure Government or DoD environments Strong knowledge of Azure-native security tools, IL6 data handling, and cloud networking Proficient in scripting (PowerShell, Python, or Bash) and Infrastructure as Code (ARM, Bicep, Terraform) Experiences with DoD SRG, FedRAMP High, JSIG, and ICD 503 compliance frameworks Hands-on experience with classified enclaves, hardened images, and enclave-to-enclave connectivity Comprehensive knowledge of corporate Systems/Solutions Architecture processes and trends Strong leadership, organizational, and communication skills Secret Clearance to start Knowledge of Agile software development process Required Technical Skills: SCAP, STIG, Patching, eMASS, and related RMF tools Cybersecurity, Systems Administration, implementation of RMF tools and processes Experience with gaining an ATO for systems and working the systems through the assessment and authorization process Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic email and access-list Excellent communication skills Experience working in Agile software development teams Experience with secure development, coding and engineering practices Experience with Cybersecurity, Information Security, and Information Technology Security processes, protocols, and procedures. Experience 10 years of relevant experience * may vary based on technical training, certification(s), or degree Experience with Cloud Security Experience working with leading firewall, network scanning and authentication technologies Experience working with internet, web, application and network security techniques Experience in Agile methodology Experience in Jira to support development team in agile environment Experience working in Federal or State government environments Ability to work independently and remotely Certification: Active DoD 8570 IAT Level II Certification (Security+, CISSP, CISM) Travel Required: Little to no travel anticipated (may be required upon customer request)
    $80 hourly 2d ago
  • Cyber Security Consultant

    The Planet Group 4.1company rating

    Security engineer job in Washington, DC

    BASIC FUNCTION: The Senior Cybersecurity Engineer is responsible for safeguarding the client information systems, digital assets, and technology infrastructure. This role designs, deploys, and maintains advanced cybersecurity solutions that protect patient data, clinical systems, and enterprise applications. The Senior Cybersecurity Engineer ensures the client's technology environment remains secure, compliant, and resilient against emerging threats. This position combines hands-on technical expertise with strategic leadership, driving initiatives that enhance cybersecurity maturity and operational readiness across on-premises, hybrid, and cloud environments (e.g., Azure, AWS). The role is pivotal in incident response, risk management, and ongoing improvement of security controls in alignment with hospital policies and regulatory standards such as HIPAA, NIST 800-53, and ISO/IEC 27001. Salary: $130-140k Employment Type: Full-time, direct hire Location: Onsite 3 days/week, remote 2 days/week in Washington DC SUPERVISORY ACCOUNTABILITIES: This role does not have direct supervisory responsibility but may provide technical guidance and mentorship to junior cybersecurity staff, contractors, and project teams. The Senior Cybersecurity Engineer may lead cross-functional implementation teams and coordinate security initiatives with other IT departments. NATURE AND SCOPE: Operating in a fast-paced, high-impact healthcare technology environment, the Senior Cybersecurity Engineer reports to the Senior Director of Cybersecurity and collaborates with colleagues across Technology Services, including Infrastructure, Applications, Network Operations, and Compliance. Internal contacts include hospital administrators, clinical and research staff, faculty, and IT personnel. External contacts include technology vendors, auditors, and regulatory agencies. The role requires strong analytical skills, proactive threat awareness, and the ability to balance operational needs with strategic security objectives in a mission-critical healthcare setting. PRINCIPAL ACCOUNTABILITIES: Security Operations & Incident Response Monitor, analyze, and respond to security alerts, incidents, and anomalies across hospital systems. Conduct vulnerability assessments, penetration tests, and threat-hunting activities to identify and mitigate risks. Investigate and document security incidents, performing root cause analyses and recommending remediation measures. Utilize SIEM, EDR, and IDS/IPS platforms (e.g., CrowdStrike, Microsoft Sentinel) to enhance continuous monitoring. Security Engineering & Architecture Design, implement, and manage enterprise cybersecurity controls, including firewalls, NAC, DLP, CASB, and endpoint protection systems. Support secure configuration management using CIS Benchmarks and STIGs. Implement and maintain identity and access management (IAM), multifactor authentication (MFA), and privileged access controls. Integrate security practices into DevOps processes and CI/CD pipelines (DevSecOps). Support the adoption and enforcement of Zero Trust Architecture principles across hybrid and cloud environments. Governance, Risk, and Compliance Ensure adherence to cybersecurity frameworks and regulatory standards, including HIPAA, NIST 800-53, ISO/IEC 27001, PCI DSS, and GDPR. Contribute to the creation and maintenance of security policies, procedures, and documentation. Support internal and external audits, risk assessments, and compliance reviews. Participate in disaster recovery and business continuity planning activities. Collaboration, Training, and Awareness Collaborate with IT, Compliance, and Clinical Operations to integrate security into all technology operations. Provide mentorship and technical guidance to IT staff and cybersecurity personnel. Develop and deliver training on secure computing, phishing prevention, and data protection best practices. Communicate complex technical concepts clearly to diverse audiences, promoting shared responsibility for security. CORE COMPETENCIES: Strategic Thinking: Align cybersecurity initiatives with hospital priorities and risk management goals. Technical Expertise: Deep knowledge of enterprise and cloud security controls, architectures, and technologies. Incident Response: Skilled in threat analysis, vulnerability mitigation, and incident management. Collaboration: Strong interpersonal and communication skills for cross-departmental teamwork. Innovation: Ability to evaluate emerging tools, techniques, and threat intelligence for proactive defense. Compliance Knowledge: Familiarity with HIPAA, NIST, ISO 27001, PCI DSS, and related standards. Problem Solving: Detail-oriented and methodical approach to resolving complex security challenges. Adaptability: Capable of managing multiple priorities and responding quickly to evolving threats. MINIMUM REQUIREMENTS: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field required. Master's degree in Business Administration, Cybersecurity, or related discipline preferred. Experience: 7-10 years of progressive experience in information security, with at least 5 years in a security engineering role. Proven experience securing hybrid infrastructures, including on-premises systems and cloud environments (Azure, AWS, GCP). Hands-on expertise with enterprise tools such as Microsoft Defender Suite, Cisco ISE, CrowdStrike Falcon, and Azure Sentinel. Proficiency in scripting languages (e.g., PowerShell, Python) for automation and threat analysis. Certifications (one or more preferred): CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CCSP (Certified Cloud Security Professional) AWS Certified Security - Specialty Microsoft Certified: Azure Security Engineer Associate SABSA or TOGAF (preferred)
    $130k-140k yearly 5d ago
  • Security Architect

    Steerbridge

    Security engineer job in Washington, DC

    Employment Type: Full-Time Strategies SteerBridge Strategies is a CVE-Verified, Service-Disabled Veteran-Owned Small Business (SDVOSB) delivering a broad spectrum of professional services to the U.S. Government and private sector. Backed by decades of hands-on experience in federal acquisition and procurement, we deliver agile, best-in-class commercial solutions that drive mission success. Our strength lies in our people-especially the veterans whose leadership, discipline, and dedication shape everything we do. At SteerBridge, we don't just hire talent-we empower it. We cultivate meaningful career paths for those who have served and for those who share our commitment to excellence, innovation, and service. Position Overview SteerBridge Strategies is seeking a highly accomplished Security Architect to support our Modern Disability Claims (MDC) initiative-a transformative effort to modernize claims processing systems for the Department of Veterans Affairs (VA). This mission-critical project enhances the security, reliability, and operational efficiency of systems entrusted with sensitive Veteran information. As the Security Architect, you will serve as a strategic and technical authority, guiding cybersecurity architecture across cloud and hybrid environments, ensuring compliance with federal and VA mandates, and fortifying the systems that safeguard the data of those who have served our nation. This is a rare opportunity to apply your expertise at scale while shaping the future of secure digital services for millions of Veterans. Key Responsibilities Architect secure, scalable, and resilient solutions across cloud and hybrid infrastructures supporting VA claims systems. Partner with engineering, infrastructure, and compliance teams to embed secure design principles throughout the system lifecycle. Develop, maintain, and continuously refine System Security Plans (SSPs); lead all phases of the ATO process. Interpret and apply NIST 800-53, NIST 800-171, FedRAMP High, and VA-specific cybersecurity requirements across system and data environments. Lead full RMF lifecycle activities-from system categorization through continuous monitoring and ongoing authorization. Conduct comprehensive risk assessments, gap analyses, and vulnerability remediation planning. Oversee the creation of cyber policies, technical documentation, audit-ready control evidence, and security reporting. Coordinate and participate in security audits, penetration tests, incident response actions, and forensic investigations. Serve as a subject matter expert in data protection, encryption technologies, identity/access controls, and secure SDLC best practices. Collaborate with ISSOs, ISSEs, and federal security teams to ensure seamless security alignment and compliance. Required Qualifications U.S. Citizenship required Bachelor's or Master's degree in Cybersecurity, Information Systems, or a related field Active Secret clearance or ability to obtain one 10+ years of cybersecurity architecture experience in federal or large enterprise environments Deep expertise in NIST 800-171, NIST 800-53, FedRAMP, and federal cybersecurity frameworks Proven experience developing ATO packages and leading security authorization activities Strong background in system hardening, network security, encryption protocols, and secure SDLC Experience architecting secure solutions in AWS, Azure, and/or GCP environments Exceptional written and verbal communication skills with the ability to produce audit-ready documentation Experience coordinating with ISSOs, ISSEs, federal security teams, and cross-functional engineering groups Preferred Qualifications Certifications such as CISSP, CAP, CISM, or equivalent Cloud architecture experience or cloud-related certifications Familiarity with VA security requirements, VAEC, and Veteran-focused IT systems Hands-on experience designing solutions to FedRAMP High baselines Benefits Health Insurance Dental Insurance Vision Insurance Life Insurance 401(k) Retirement Plan with Company Matching Paid Time Off (PTO) Paid Federal Holidays A competitive salary commensurate with experience will be offered. Equal Opportunity Commitment SteerBridge Strategies is proud to be an Equal Opportunity Employer. We are committed to fostering a diverse and inclusive workplace where all qualified applicants and employees are treated with respect and dignity-regardless of race, color, gender, age, religion, national origin, ancestry, disability, veteran status, genetic information, sexual orientation, or any other characteristic protected by law. We also provide reasonable accommodations for individuals with disabilities. If you require assistance during the application process, please reach out so we can support your needs.
    $103k-153k yearly est. 1d ago
  • Senior Security Solutions Architect

    MKS2 Technologies 4.1company rating

    Security engineer job in Washington, DC

    We are seeking a hands-on Solutions Architect who will also serve as the Information System Security Engineer (ISSE) for key cybersecurity systems supporting the Department of Veterans Affairs (VA). This role is ideal for someone with deep technical engineering skills, cloud and DevSecOps experience . This individual will also lead teams to develop and implement technical solutions to remediate vulnerabilities and other complex cybersecurity challenges. Candidates will have a solutions-oriented mindset to help the VA problem solve complex cybersecurity and IT challenges. The candidates should also be well-versed with facilitating working sessions and have the ability to distill complex concepts into non-technical/common language. The role will focus on analyzing and recommending system security architectures, vulnerability mitigation, policy-driven compliance implementation, and full-lifecycle support for the Department of Veteran's Affairs systems. Key Responsibilities: Cybersecurity Engineering & Architecture (Primary): Analyze complex technical findings and determine necessary resources needed to solve problem-sets across multiple cybersecurity and technical domains Able to partner with technical teams to develop and implement technical solutions Design, build, and deploy secure cloud-native architectures and infrastructure components for VA information systems Develop and maintain CI/CD pipelines with integrated security scanning, policy enforcement, and remediation tools Implement secure infrastructure as code/policy as code using tools such as Terraform/CloudFormation, including writing and implementing PaC scripts Align security architectures with Federal Zero Trust strategy, VA directives, and OMB policies Enable automation of system telemetry and analytics pipelines for cyber situational awareness ISSE Responsibilities: Provide engineering and technical analysis on behalf of Agency Authorizing Officials (AOs) for System Security Plans (SSPs), Risk Assessments, Security Controls Traceability Matrices (SCTMs), and POA&Ms Support system authorization and compliance activities including continuous monitoring and system audits Conduct regular and ad-hoc analysis of security control findings and develop and implement remediation strategies Minimum Qualifications: 8+ years of security engineering, DevSecOps, or cloud architecture experience Expertise in securing platforms hosted in AWS GovCloud and Azure Government Strong experience with NIST RMF, FISMA, FedRAMP, and Zero Trust architecture implementation Hands-on skills in IaC tools like Terraform and CI/CD tools such as GitLab/Jenkins, with ability to adopt new technologies if procured by the agency Experience with network isolation tools such as Palo Alto Next Generation Firewalls (NGFW) and Juniper Mist Network Access Control (NAC) solutions or comparable Demonstrated experience securing modern applications, APIs, and automated infrastructure Excellent written and oral communication skills; ability to explain complex, technical information in easily understood terms; ability to brief Senior VA leadership regularly U.S. Citizenship and ability to obtain and maintain a Public Trust clearance Bachelor's degree in computer science, Engineering, or technical equivalent with 5 years of technical experience or a total of 13 years in lieu of education Preferred Qualifications: Prior VA experience supporting VA OIS or major cybersecurity initiatives Experience authoring and maintaining ATO documentation in VA or HHS environments Experience with IoT/IoMT security solutions is a plus Knowledge of federal cybersecurity standards
    $112k-151k yearly est. 2d ago
  • Information Security Analyst IV

    Aptonet

    Security engineer job in Washington, DC

    Senior Security Engineer (Information Security Analyst IV) Clearance: Public Trust (U.S. Citizen or Green Card Holder; 3+ years U.S. residency required) Business Unit: Digital Modernization Role Summary The Senior Security Engineer supports the Department of Transportation's (DOT) Cybersecurity mission by enhancing and maintaining the security posture of DOT information systems and infrastructure. These systems play a critical role in safeguarding U.S. critical infrastructure, including highways, bridges, and roadways. This position provides advanced security engineering, participates in strategic security design, and delivers technical expertise for integrated security systems and endpoint protection. The role requires independent decision-making, leadership, and the ability to guide less experienced staff. It also involves complex problem-solving, interaction with senior federal leadership, and contributions that directly impact mission and schedule outcomes. Key Responsibilities Implement endpoint protection profile changes to address external threats and enforce security requirements. Coordinate with application, infrastructure, and engineering teams to troubleshoot endpoint protection software issues. Integrate endpoint security data with security log aggregation tools, including SIEM platforms. Participate in cybersecurity incident handling activities as requested. Stay current on emerging threats, vulnerabilities, and industry best practices related to endpoint security. Work assigned cybersecurity and security operations ITSM (ServiceNow) tickets through completion. Participate in Cybersecurity and Security Operations (SecOps) meetings. Collaborate on cybersecurity solutions that enhance the DOT's security posture. Configure, validate, and test secure systems and physical controls to detect security weaknesses. Contribute to strategic security design efforts, translating business and security requirements into technical solutions. Recommend policy changes and guide others in achieving departmental cybersecurity objectives. Required Technical Skills Endpoint protection management solutions (hands-on experience). Proven understanding of Federal cybersecurity requirements, including FISMA and the NIST 800 series. Ability to articulate endpoint security concepts to non-technical stakeholders. Demonstrated experience collaborating across cross-functional cybersecurity teams. Ability to evaluate complex security problems and apply judgment within established practices and policies. Experience with integration of endpoint security data into SIEM or log aggregation tools. Experience working security operations tickets within ServiceNow. Knowledge of security systems, secure configuration, validation, and testing methodologies. Preferred / Nice-to-Have Skills Foundational understanding of: Application and technology stacks Cloud-based systems Operating systems Databases Networking Firewalls Data Loss Prevention (DLP) Endpoint security software Network IDS/IPS Host-based IDS/IPS General cybersecurity best practices and industry standards Qualifications & Experience 9+ years of experience in Cybersecurity or related IT fields. Bachelor's degree + 9 years OR Master's degree + 7 years of experience Technical Certifications (one or more required): Network+ Security+ SSCP GISF ISACA Cybersecurity Fundamentals Or similar technical cybersecurity certification Ability to obtain and maintain a Public Trust clearance. Benefits (employee contribution): Health insurance Health savings account Dental insurance Vision insurance Flexible spending accounts Life insurance Retirement plan All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $79k-111k yearly est. 2d ago
  • Information System Security Engineer

    Jones Networking 3.3company rating

    Security engineer job in Washington, DC

    ISSO Industry: Government Contracting Our client is seeking a talented ISSO to join their team. This position will support the Assistant Secretary for Administration (ASA) under guidance from the CIO's Information System Security Manager (ISSM). The candidate will ensure a portfolio of 4 systems are in compliance with applicable NIST standards, and provide standard ISSO services. The candidate will also work closely with the other ISSOs supporting the client customers to provide leadership and mentoring and ensure consistent delivery of ISSO services. ISSO Key Responsibilities: · Ensure applicable cybersecurity policies are implemented for systems and information system-related physical security also under purview. · Maintain operational security posture consistent with current security policy. · Report actual or suspected computer-security incidents to DOT CSIRC within time frames established by DOT Incident Response policy for incident types in accordance with US-CERT. · Distribute cybersecurity notices and advisories to appropriate personnel and that vendor-issued security patches are expeditiously installed. · Serve as primary security to system owners, common control providers, and users. · Serve as focal point for cybersecurity incident reporting and subsequent resolution. · Assisting ISSM in reviewing contracts for information systems under the Component's control to ensure that cybersecurity is appropriately addressed in contract language. · Ensure all security-related SDLC documentation meets all identified security needs. · Maintain Security Assessment and Authorization (SA&A) documentation for information systems under purview according to DoT Cybersecurity Policy and Compendium. · Ensure selection of NIST SP 800-53 baseline security controls are appropriate for system based on FIPS 199 security categorization, NIST SP 800-53 guidance, and supplemental DOT policy specified in DoT Cybersecurity Compendium. · Assist System Owner, Information Owner, and ISSM in recording all known security weaknesses of assigned information systems in POA&Ms IAW DoT policy and procedures. · Track all security education and awareness training conducted for personnel and contractors, as required by DoT Cybersecurity Policy and Compendium. · Provide security advice to AO and System Owner on all matters (technical and otherwise) involving security of the information system. · Ensure required updates are performed to key documents in accordance with NIST SP 800-37 for continuous monitoring. · Identify changes to systems that may impact security controls, perform security impact assessment of proposed changes, report any change in risk posture, and provide recommendations for risk mitigation. · Ensure proper backup procedures exist for assigned information systems and that procedures are performed and tested in accordance with System Security Plan. · Assist System Owner and ISSM to ensure external connections to/from DoT information systems and networks are provided by an approved DoT Trusted Internet Connection Access Provider (TICAP) or DoT-approved Managed TIC Provider Service (MTIPS). · Ensure audit logs are captured, maintained, and analyzed as required by NIST SP 800- 53 and any supplemental Departmental Cybersecurity Policy and the Compendium. · Ensure DoT enterprise information security management system (CSAM or its successors) accurately contains required information system inventory, categorization, POA&Ms and other security metrics required by DoT CIO through this policy. · Complete mandatory annual specialized information security training. ISSO Required Skills:8+ years of experience in IT Security Certified Information Systems Security Professional (CISSP) certification. Understanding of NIST 800.53 and its applicability to IT Systems. Expertise with Risk Management Framework, FEDRAMP and FISMA. Understanding authentication in the cloud environment. Experience with continuous monitoring of a cloud system Experience working on assessments with third party assessments organization (3PAO) AWS/Azure associate certified ISSO Compensation and benefits: $120,000 Company-supported medical, dental, vision, life, STD, and LTD insurance Benefits include 10 federal holidays and PTO. 401(k) with company matching Flexible Spending Accounts for commuter, medical, and dependent care expenses Tuition Assistance
    $120k yearly 3d ago
  • Jr. Information System Security Officer

    Hruckus

    Security engineer job in Washington, DC

    Veteran Owned Firm Seeking a Junior Information Systems Security Officer (ISSO) for an Onsite role in Washington, DC My name is Stephen Hrutka, and I am the owner of a Veteran Owned management consulting firm in Washington, DC focused on Technical/Cleared Recruiting for the DoD and IC. HRUCKUS helps other Veteran-Owned businesses recruit for positions across the VA, SBA, HHS, DARPA, and other cutting-edge R&D related defense agencies. We seek to fill a Junior Information Systems Security Officer (ISSO) position in Washington, DC. The ideal candidate is a DMV resident who holds active TS/SCI clearance with CI-Poly eligibility, a minimum of 3 years of ISSO experience, at least 5 years in a computer science or cybersecurity-related role, hands-on familiarity with tools such as Nessus or NMAP, and a core certification such as CISSP, GISP, or CASP. If you're interested, I'd be glad to provide more details about the role and further discuss your qualifications. Thanks, Stephen M Hrutka Principal Consultant HRUCKUS LLC Executive Summary: HRUCKUS is looking for an experienced Jr. ISSO for an onsite role in Washington, DC. The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract's support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Key Responsibilities: Services to support IS Security performed by the Information System Security Officer (ISSO) at a minimum, shall consist of the following activities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an agency's IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed, and entity type Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary Ensure that new entities are created in the GRC application with the security categorization of agency ISs Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS Perform an independent review of the System Security Plan (SSP) and make approval decisions Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official Schedule security control assessments in coordination with the system owner. Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number Advise the agency Authorizing Official of IS vulnerabilities and residual risks. Ensure that all POA&M actions are completed and tested Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official Ensure the removal and retirement of agency ISs being decommissioned, in coordination with the SO, ISSO, and ISSR. Required Qualifications: Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility Minimum of 5 years of work experience in a computer science or cybersecurity-related field Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, Network Mapper (NMAP), and/or similar applications. Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP) Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level I proficiency Preferred Education: A bachelor's and/or advanced degree in computer science, business management, or IT-related discipline. Details: Job Title: Jr. Information Systems Security Officer (ISSO) Location: Washington, DC 20535 Clearance Requirement: Active Top-Secret Clearance w/ SCI and a CI-Polygraph eligibility Assignment Type: Full-time, Onsite Salary Range: $70,000 - $95,000 per year with benefits: Competitive salary for well-qualified applicants Relocation assistance available for highly qualified candidates 401(k) plan Annual performance bonus Certification and advanced degree attainment bonuses Student Loan / Tuition reimbursement Health Care Insurance (medical, dental, vision) Up to four weeks of paid vacation 11 Federal Holidays, and 3 Floating Holidays Team bonding events
    $70k-95k yearly 1d ago
  • Systems Engineer (5240)

    Metrostar 4.3company rating

    Security engineer job in Washington, DC

    This position requires an active TS/SCI security clearance in order to be considered; clearance sponsorship is not available. As a Systems Engineer, you'll collaborate with other engineers to define system requirements, architecture, and design, with the goal to make an impact across the federal government. In supporting the program, you will be required to work 5 days/ per week onsite in the client's Washington, DC location. What you'll do: Collaborate with other engineers to define system requirements, architecture, and design Collaborate closely with key stakeholder partners and IT team to evaluate customer requests for new systems, applications, product standards, and services. Work on the core platform to create and optimize all functions needed to establish a strong platform infrastructure. Perform risk assessments and develop mitigation strategies and ensure compliance with industry standards and regulations. Analyze and validate system designs against requirements and specifications. What you'll need to succeed: 8-10 years of experience as a Systems Engineer provisioning, installing, and supporting on-premise mission critical systems Experience maintaining and managing a on-premise VMWare infrastructure In-depth experience with Infrastructure as Code (IaC), containerization, Kubernetes, Ubuntu, and CI/CD Automation Experience working in a DevSecOps environment Ability to work well on a team as well as individually Ability to think out of the box to help with troubleshooting issues and providing innovative solutions that fit customers' needs Ability to establish and maintain a high level of client trust and confidence with your skills A Bachelor's Degree Active TS//SCI clearance What will make you stand out: Experience with system monitoring tools such as SolarWinds, Grafana, and Prometheus Expertise with container orchestration tools (Rancher, OpenShift, etc.) Experience hardening and securing containers Previous experience with commercial cloud (e.g., AWS, Azure) Passion for learning new development concepts, methodologies, and technologies Like we said, we are big fans of our people. That's why we offer a generous benefits package, professional growth, and valuable time to recharge. Learn more about our company culture code and benefits. Plus, check out our accolades. What we want you to know: In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire. MetroStar Systems is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. The statements herein are intended to describe the general nature and level of work being performed by employees and are not to be construed as an exhaustive list of responsibilities, duties, and skills required of personnel so classified. Furthermore, they do not establish a contract for employment and are subject to change at the discretion of MetroStar Systems. Not ready to apply now? Sign up to join our newsletter here. "EEO IS THE LAW MetroStar Systems, LLC (MetroStar) invites any employee and/or applicant to review the Company's Affirmative Action Plan. This plan is available for inspection upon request by emailing *******************."
    $83k-105k yearly est. 1d ago
  • Network Engineer

    Tekstream Solutions 4.5company rating

    Security engineer job in Washington, DC

    The selected candidate will be responsible for the following: Support the ITP network infrastructure, perform all routine maintenance activities, provide guidance on upgrades and system recapitalization, perform availability/capacity management. Oversee High Speed Guard Cross Domain solution that supports the transfer of data between multiple classification domains. Support all documentation to effectively capture the configuration baseline. Design and support system recapitalization plans to account for capacity growth and changes as directed by the customer. Serve as the subject matter expert on all ITP network infrastructure. Basic Qualifications: Bachelors degree and (12)+ years of prior relevant experience or Masters with (10)+ years of prior relevant experience Prior leadership responsibilities Excellent written and oral communication skills Experienced and adept at developing and maintaining technical documents, analyses, and reports Experienced with preparing and presenting briefings to senior customer management, and customer stakeholders Working knowledge of defense-in-depth principles, network/HW/SW security architecture, network topology, IT device integrity, and common security elements Active Top Secret government security clearance; ability to obtain DHS EOD SCI Preferred Qualifications: Master's degree from an accredited college or university in IT Management, Engineering, or related field Proven experience (10+ years) in IT service delivery management Experience with User Activity Monitoring products and platforms Experience with Everfox High Speed Guard Platform Experience with Cisco, Juniper LAN/WAN network infrastructure Experience with Palo Alto Firewalls DHS Cleared preferred CCNP or Higher ForcePoint/FirePower Experience
    $70k-91k yearly est. 1d ago
  • Cloud Systems Engineer

    Take2 Consulting, LLC 3.7company rating

    Security engineer job in Washington, DC

    Take2 has proven experience bridging the intersection of technology and people solutions. As a proven, trusted provider for our Federal and commercial clients, we provide the right solutions, at the right time through trusted partnerships, customized to solve our client's unique business challenges. Take2 invests time, discipline, and rigor into our technology and people solutions, as well as utilizes our proprietary People Cloud. Whether we are bridging the gap between IT talent and our customers' business challenges, Take2 will work as a partner to best resolve client needs. Take2 is hiring an experienced Cloud Systems Engineer. This role requires you to be eligible for a Federal clearance to interview. This position is onsite and will require you to work out of Washington, D.C. Overview The C&CA Systems team is seeking cloud professionals proficient in administering AWS GovCloud cloud service platform. Become part of a team responsible for building a cloud business platform within the Federal Reserve Board. At least five years of demonstrated experience supporting cloud platforms. As a Senior Cloud Systems Engineer, we require 10 years of experience in the field of technology including application development, 5 of which focused on supporting cloud technologies. Education Preference Candidates should possess a bachelor's degree in computer science, information technology, or a related field. Clearance Requirements Public Trust Onsite Requirements On-Site Responsibilities Design and create custom cloud applications tailored to project needs. Set up and configure DevSecOps pipelines for secure cloud environments. Partner with cloud platform and development teams to manage and enable cloud infrastructure supporting business applications. Deploy, migrate, and maintain secure systems for IaaS, PaaS, and SaaS environments. Develop software following SDLCs including DevOps, Agile, Lean, or Iterative methodologies. Utilize high-level programming languages such as Python, PowerShell, or Infrastructure as Code tools like Terraform or AWS CloudFormation. Implement automation, CI/CD pipelines, and containerization practices, with experience using GitLab or Azure DevOps preferred. Work with AWS service offerings and government cloud environments, ensuring compliance with security standards. Apply knowledge of cloud architectures, web servers, load balancers, and storage solutions like AWS Load Balancer. Support cloud migration efforts and optimize solutions for cost efficiency. Incorporate security best practices, including cloud federation technologies such as SAML, Okta, OAuth, and OpenID Connect. Qualifications Ten years of experience in technology, including five years supporting cloud platforms. Proficiency with AWS environments, especially AWS GovCloud. Experience designing and deploying secure cloud solutions across IaaS, PaaS, and SaaS. Strong understanding of cloud-based architectures, security, and cost optimization. Skilled in programming languages and infrastructure as code, especially Python 3.x, PowerShell, AWS CloudFormation, Terraform, or AWS CDK. Knowledge of RESTful Web Services, AWS API Gateway, and cloud security protocols. Experience with CloudWatch, CloudTrail, Lambda, RDS, Aurora, and other AWS components. Familiar with highly secure operating environments, FISMA, FedRAMP, and related compliance standards. Desired Skills Additional experience with data lakes, lake formation, and analytics architectures. Containerization expertise using Docker, Kubernetes (EKS, ECS, Fargate). Familiarity with the AWS Well Architected Framework and enterprise observability platforms like Splunk. Knowledge of Data Quality testing tools such as Great Expectations or Glue Data Quality. Direct management of AWS services including CloudTrail, CloudWatch, S3, RDS/PostgreSQL, and Lambda.
    $78k-95k yearly est. 2d ago
  • Systems Engineer IV

    Encode, Inc.

    Security engineer job in Washington, DC

    The Systems Engineer IV provides advanced engineering support for cloud and on-premise infrastructure, with a primary focus on architecting, deploying, and maintaining AWS environments. This role collaborates closely with internal IT teams to enhance infrastructure reliability, automate provisioning, and support enterprise-level systems operations. Key Responsibilities Architect, engineer, configure, and deploy AWS and related infrastructure technologies using approved organizational standards. System Engineer IV Partner with Systems Operations to build self-service infrastructure provisioning, CI/CD delivery pipelines, logging tools, and monitoring services. System Engineer IV Maintain and update system documentation as needed. System Engineer IV Collaborate with IT Operations Engineers to install, configure, and support physical and virtual server environments. System Engineer IV Continuously monitor, troubleshoot, and improve infrastructure performance and stability. System Engineer IV Operate enterprise monitoring, alerting, backup, antivirus, anti-spam, and malware protection tools, as well as offsite storage and data-mirroring systems. System Engineer IV Core Competencies Forward-thinking and able to anticipate operational needs. System Engineer IV Strong critical thinking and analytical problem-solving skills. Demonstrates adaptability, openness to innovation, and change. Communicates effectively across multiple channels with emotional intelligence. Performance-focused, with the ability to set and meet clear goals. Customer-oriented with a commitment to service excellence. Committed to continuous learning and developing self and others. Collaborative mindset with the ability to work across teams and stakeholders. System Engineer IV Required Skills & Experience 7-10 years of directly related IT systems engineering or administration experience. System Engineer IV Strong AWS cloud architecture experience, including CLI usage. Expertise in Shell scripting (Shell, Perl, Python). Hands-on experience with Unix/Linux installation, administration, operations, and maintenance. Proficiency with Unix/Linux security tools, ports, protocols, routing, and switching in firewalled WAN environments. Extensive experience with AWS services such as ECS, EC2, API Gateway, S3, Lambda, etc. System Engineer IV Experience managing Public Cloud infrastructure environments. Advanced skills in designing, developing, and troubleshooting new and existing scripts. Experience operating in a mature enterprise IT environment. Preferred/Bonus Skills Experience with RHEL Satellite Server. Experience with Puppet configuration management. Familiarity with Atlassian tools (e.g., Jira, Confluence). System Engineer IV Education & Certifications Bachelor's degree in Computer Science, Information Technology, or related field (or equivalent work experience of 8+ years). System Engineer IV AWS Certification preferred. System Engineer IV Experience Requirement A minimum of 10 years of total professional experience performing related duties in systems engineering or similar roles.
    $76k-101k yearly est. 2d ago
  • Cloud Systems Engineer

    Advantage Technical Resourcing Inc.

    Security engineer job in Washington, DC

    • Developing software according to software development lifecycles (SDLCs), including DevOps, Agile, Lean, or Iterative. • Designing, deploying, and migrating secure and maintainable systems for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) environments. • Become part of a team responsible for building a cloud business platform within the Federal Reserve Board • Partner with the cloud platform team and development team to build, manage, and enable the underlying cloud infrastructure and platforms in support of the business application development project. Qualifications: • 10 years of experience in the field of technology including application development, 5 of which focused on supporting cloud technologies. • Proficient in at least one high-level programming language such as Python, PowerShell, or Infrastructure as Code (AWS CloudFormation, AWS CDK, Terraform, etc.). • Python 3.x data engineering with pandas, Databricks, or SPARK preferred. • DevOps, CI/CD pipelines and automation, containers, and related best practices for cloud deployment. • Experience with GitLab or Azure DevOps preferred. • Experience with containerization as a strategy for cloud-enabling legacy applications such as Docker and Kubernetes (AWS EKS, ECS, or Fargate preferred) Include with resume submissions: • Resume including work experience for last ten (10) years.
    $76k-101k yearly est. 5d ago
  • Network Engineer

    Clearancejobs

    Security engineer job in Washington, DC

    Cleared Network Engineer Full-time, Onsite (JBAB D.C.) An active TS/SCI security clearance is a must to apply! We're looking for an adept networking professional who is passionate about deploying and operating technologies that enable highly scalable and available resources for the applications users rely upon. Company POC is a senior-level technologist with direct experience in the environment. This perspective along with the long-term thinking at the company drives focus on the best all-around match for the customer, team member, and company. Responsibilities: Work within the networking team to administer the existing network environment Serve as an escalation point for network administrators Assist with planning of system design, layout and development of baseline configuration for an enterprise network Assist with developing test plans and procedures to implement and validate the organization's requirement for reliability and high availability. Deploy health monitoring and predictive alerts across all sites and networks. Analyze legacy infrastructure and provide recommendations for lifecycle, modernization, and migration strategies. Collaborate with security teams to ensure compliance with security controls Mentor other technical staff on the team Assist in the design and implementation to scale network automation and management Requirements: 6 years of relevant experience CCNP Infrastructure, Datacenter, or Security (but must be well versed in enterprise route/switch)
    $70k-93k yearly est. 3d ago
  • Network Engineer

    TBG | The Bachrach Group

    Security engineer job in Washington, DC

    We're hiring a Network Engineer to help design, build, and support a secure, high-availability enterprise network spanning voice, collaboration, data, and wireless. You'll own projects end to end-from architecture and documentation through deployment and ongoing operations-partnering with internal teams and external vendors to deliver resilient, well-instrumented connectivity across a global footprint. What you'll do Lead and contribute to network projects Recommend solutions for strategy, performance, and security; design and operate voice, data, and wireless services. Engineer and standardize the network Develop specifications, standards, and reference architectures; drive improvements in scale, security, and manageability. Optimize and modernize Analyze current-state infrastructure to improve reliability, efficiency, and ROI; plan for capacity and growth. Vendor and SOW management Coordinate with vendors to ensure scopes of work are accurate and implementations meet requirements. Operate and support Troubleshoot and resolve incidents to minimize business impact; perform routine and emergency maintenance across networking gear. Performance and observability Define and track KPIs for network health; contribute to capacity planning and performance tuning. Resilience and continuity Support DR/BC strategies to achieve minimal downtime; participate in testing and documentation. Collaboration and escalation Partner with adjacent IT teams to diagnose and resolve cross-domain issues; document resolutions in the knowledge base. Ownership and delivery Take the lead on assigned projects, follow work plans, and meet deadlines; participate in on-call rotation for 24/7 coverage. What you'll bring Education/Experience Bachelor's degree preferred (or equivalent experience). 5+ years supporting large, Cisco-centric enterprise networks and voice environments. Experience in regulated, client-service-oriented industries preferred. CCNA/CCNP (or equivalent demonstrated expertise); CCIE is a plus. Technical skills Strong grounding in routing/switching and network architecture: SD-WAN, QoS, BGP, EIGRP, and core TCP/IP. Hands-on with Cisco technologies: SD-WAN, Identity Services (ISE), Nexus (NX-OS), Catalyst 9K/9400 series. Security and cloud networking exposure: next‑gen firewalls (e.g., Palo Alto), secure access (e.g., Prisma Access), major cloud networking (e.g., Azure). Scripting/automation familiarity: Linux and Ansible for network automation a plus. Proficiency with Windows environments and productivity tooling. Problem solving Ability to analyze complex issues, introduce fit-for-purpose solutions (technology or process), and drive to resolution. Experience balancing standardization with practical constraints in dynamic environments. Communication Translate complex technical topics for non-technical stakeholders; create clear reports, runbooks, and procedure docs. Confident presenting to managers, partners, and broader audiences. Professionalism Detail-oriented, discreet, and client-focused; comfortable in high-energy, fast-changing settings. Strong prioritization and time management across multiple concurrent initiatives. Why this role High ownership across a modern, global Cisco ecosystem Blend of architecture, implementation, and operations Opportunity to raise the bar on reliability, security, and automation
    $70k-93k yearly est. 3d ago
  • Manual Ethical Hacker

    Bank of America 4.7company rating

    Security engineer job in Washington, DC

    Denver, Colorado;Seattle, Washington; Jersey City, New Jersey; Boston, Massachusetts; Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a friend **To proceed with your application, you must be at least 18 years of age.** Acknowledge (****************************************************************************************** **:** At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! **Job Description:** Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business. Key Responsibilities in order of importance: + Perform assigned analysis of internal and external threats on information systems and predict future threat behavior + Incorporate threat actors' tactics, techniques, and procedures into offensive security testing + Perform assessments of the security, effectiveness, and practicality of multiple technology systems + Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. + Prepare and present detailed technical information for various media including documents, reports, and notifications + Provide clear and practical advice regarding managed risks + Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills Required Skills: + Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment + Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services + SQL injection/XSS attack without the use of tools + Experience performing manual code reviews for security relevant issues + Experience working with SAST tools to identify vulnerabilities + Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings + Experience performing manual web application assessments i.e., must be able to simulate a + Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies) + Experience with vulnerability assessment tools and penetration testing techniques + Solid programming/debugging skills + Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map + Threat Analysis + Innovative Thinking + Technology Systems Assessment + Technical Documentation + Advisory Desired: + CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar + Strong programming/scripting skills This job will be open and accepting applications for a minimum of seven days from the date it was posted. **Shift:** 1st shift (United States of America) **Hours Per Week:** 40 Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates. View your **"Know your Rights (************************************************************************************** "** poster. **View the LA County Fair Chance Ordinance (************************************************************************************************** .** Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work. This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
    $87k-122k yearly est. 60d+ ago
  • T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)

    Critical Solutions 3.5company rating

    Security engineer job in Washington, DC

    Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS) Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET JOB DESCRIPTION Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC. The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs). PRIMARY ROLES AND RESPONSIBILITIES: Utilize a SIEM for enterprise monitoring and detection Create Security Event Notifications to document investigation findings Perform critical thinking and analysis to investigate cyber security alerts Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc) Collaborate with team members to analyze an alert or a threat Stay up to date with latest threats Monitor shared email box for notifications and requests Utilize OSINT to aid in their investigation Contribute to content tuning requests BASIC QUALIFICATIONS: Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance must have the ability to work non-core hours, if necessary. Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below: Network Administration Unix/Linux Administration Software engineering Software development Systems administration Help desk/IT support The ideal candidate is a self-motivated individual in pursuit of a career in cyber security. Familiarity with a SOC's purpose and role within an organization General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). Familiarity with packet analysis tools such as Wireshark Able to perform critical thinking and analysis to investigate cyber security alerts Familiarity with common malware and attack vectors Familiarity with Windows operating systems and standard OS logging Familiarity with Antivirus, DLP, and host based firewalls Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+ PREFERRED QUALIFICATIONS: Familiar with SOC methodologies and processes Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc) SHIFT SCHEDULE: Shift schedule will be determine at the time of the start date Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift) Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift) Must have the ability to work non-core hours, if necessary. LOCATION: This is a hybrid role with expectations of being on the client site most days. Must be willing and able to commute to Washington, DC ADDITIONAL INFORMATION: CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED CRITICAL SOLUTIONS PAY AND BENEFITS: Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements. BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more Job Posted by ApplicantPro
    $58k-74k yearly 12d ago
  • Safety and Security Data Analyst

    AHU Technologies Inc.

    Security engineer job in Washington, DC

    Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension. Key Responsibilities Gather and accurately organize safety and security data collected from various internal and external sources. Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets. Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas. Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes. Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data. Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data. Qualifications Minimum Requirements Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting). Demonstrable experience with data collection, maintenance, and basic reporting. Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records. Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment. Unwavering ability to maintain confidentiality and protect sensitive data. Preferred Skills Familiarity or exposure to basic data visualization techniques. Working knowledge of or familiarity with programming languages such as Python and SQL. Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries. Prior exposure to or experience with safety, security, or transportation-related data.
    $66k-95k yearly est. 6d ago
  • Systems Engineer - Department of Homeland Security

    Tln Worldwide Enterprises, Inc.

    Security engineer job in Washington, DC

    Requirements Education: Bachelor's degree in Computer Engineering, Systems Engineering, or related field (Master's preferred). - Experience: - 3+ years designing/implementing **large-scale federal enterprise systems**. - 2+ years leading **cloud migrations (AWS GovCloud/Azure Government)**. - Proven track record in **legacy system modernization** and API-centric architectures. - Expertise in **Python, Java, Terraform, Kubernetes, and enterprise data platforms**. - Certifications: One or more of **CISSP-ISSAP, AWS/Azure Solutions Architect, TOGAF, or INCOSE CSEP**. Salary Description 85,000 - 150,000
    $74k-104k yearly est. 60d+ ago
  • IAM and Security Systems Analyst

    Year Up 3.8company rating

    Security engineer job in Washington, DC

    About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection. This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response. Key Responsibilities Identity & Access Management (IAM) Manage and support identity platforms including Active Directory, Azure AD, and Okta. Implement RBAC, least privilege principles, and automated provisioning/deprovisioning. Conduct periodic access reviews and support access certification processes. Integrate IAM controls into application and cloud environments. Security Engineering & Tooling Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools. Manage SIEM tools including rule tuning, log ingestion, and correlation. Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST). Perform application security testing and contribute to threat modeling and risk evaluations. Lead cloud control monitoring, data protection measures, and compliance reporting. Threat Detection & Incident Response Conduct analysis of security alerts and lead incident response efforts. Leverage threat intelligence to update detection mechanisms and enhance response playbooks. Perform root cause analysis and evidence handling following incidents. Support red team/blue team exercises and penetration testing activities. Architecture, Process & SDLC Integration Review and evaluate system and application security architectures. Support integration of security controls across the SDLC and DevSecOps pipelines. Design and continuously improve security processes and documentation. Participate in security metrics and reporting efforts to track control effectiveness. Support SOC design discussions and contribute to its operational maturity. Collaboration & Compliance Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives. Assist with internal and external audits, control documentation, and evidence collection. Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001. Help run awareness training, phishing simulations, and risk assessments. This is a hybrid role that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC. Salary Range: $90,000-$110,000/annually Required Qualifications 3-5 years of experience in a security engineering or analyst role Strong experience with IAM platforms (Active Directory, Azure AD, Okta) Proficient in SIEM platforms, incident response, and Microsoft security tools Experience with automated security testing tools (SAST, DAST) Familiarity with cloud security (Microsoft 365, Azure) and application security principles Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus) Strong understanding of network protocols, system hardening, and endpoint defense Excellent problem-solving and communication skills Preferred Qualifications Familiarity with red teaming, penetration testing, and threat modeling Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001 Participation in SOC design or operations Experience with security metrics/reporting and risk assessments Why Join Us: You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains. #LI-HybridCOMPENSATION & BENEFITS: Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process. Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants. Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year. Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year) ** This is an exempt role (paid on a salaried basis). ** ORGANIZATION DESCRIPTION: Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington. Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission. COMMITMENT TO DIVERSITY: Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: *************************************************************** Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially. TO APPLY: Please submit a thoughtful cover letter and resume through our website. Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
    $33k-40k yearly est. Auto-Apply 60d+ ago

Learn more about security engineer jobs

Do you work as a security engineer?

What are the top employers for security engineer in DC?

Saronic

Tectammina

ShorePoint Health Venice

Prosidian Consulting

Top 10 Security Engineer companies in DC

  1. Meta

  2. Oracle

  3. Saronic

  4. Tectammina

  5. Comtech

  6. Eliassen Group

  7. ShorePoint Health Venice

  8. Prosidian Consulting

  9. RIVA Group

  10. VTech

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security engineer jobs in district of columbia by city

All security engineer jobs

Jobs in District of Columbia