Network Engineer
Security engineer job in Chantilly, VA
MANTECH is seeking a motivated, career and customer-oriented Network Engineer to join our team in Chantilly, VA. This is a position requiring onsite work at customer locations within the local area (up to 10% travel).
Responsibilities include but are not limited to:
Designing and integrating comprehensive network, VoIP, VTC, and data center solutions, adhering to security guidelines and customer specifications to ensure robust and secure communication infrastructures.
Managing the end-to-end integration of black and red networks, overseeing design, installation, maintenance, and coordination of a growing network with multiple external services to support operational needs.
Receives a moderate level of guidance and direction working with other network
engineers to resolve problems.
Helps in diagnosing and resolving complex issues related to customer sites,
telecommunications circuits, routing, switching, VoIP, VTC, network encryption devices, and Cisco data center/security to maintain network stability and performance
Diagnosing and resolving complex issues related to customer sites, telecommunications circuits, routing, switching, VoIP, VTC, network encryption devices, and Cisco data center/security to maintain network stability and performance.
Developing and maintaining detailed documentation, diagrams, and standard operating procedures to facilitate knowledge sharing and efficient network management.
Providing expert guidance, training, and support to network administrators, service desk personnel, and junior engineers to enhance team capabilities and operational effectiveness.
Minimum Qualifications:
Bachelor's degree in Computer Science, Network Engineering, or equivalent field, demonstrating a strong academic foundation in related disciplines. 1.5 years of experience is equivalent to 1 year of college.
3-4 years of experience in networking, including VoIP, VTC, data circuits, network encryption devices (e.g., General Dynamics TACLANE), and virtualization technologies.
Proficiency in dynamic routing protocols such as OSPF and BGP, with a deep understanding of MPLS and DMVPN Hub and Spoke technology for efficient network routing.
DoD 8140 IAT Level II certification: SecurityCE and Computing Environment (CE) certification in Cisco technology (CCNA Voice) required.
Valid US Drivers License with the ability to travel up to 10% locally to customer sites.
Preferred Qualifications:
Cisco Collaboration, Data Center, or Security certifications, indicating advanced expertise and specialized knowledge in relevant Cisco technologies.
Experience implementing or troubleshooting VMware NSX-T virtualized networking and security platform developed by VMware. It enables automated implementation of network policies, network objects, isolation, and micro-segmentation.
Clearance Requirements:
Must have an active DoD TS/SCI with the ability to obtain a CI polygraph.
Physical Requirements:
The person in this position must be able to remain in a stationary position 50% of the time. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
Cyber Security Consultant
Security engineer job in Washington, DC
BASIC FUNCTION:
The Senior Cybersecurity Engineer is responsible for safeguarding the client information systems, digital assets, and technology infrastructure. This role designs, deploys, and maintains advanced cybersecurity solutions that protect patient data, clinical systems, and enterprise applications. The Senior Cybersecurity Engineer ensures the client's technology environment remains secure, compliant, and resilient against emerging threats.
This position combines hands-on technical expertise with strategic leadership, driving initiatives that enhance cybersecurity maturity and operational readiness across on-premises, hybrid, and cloud environments (e.g., Azure, AWS). The role is pivotal in incident response, risk management, and ongoing improvement of security controls in alignment with hospital policies and regulatory standards such as HIPAA, NIST 800-53, and ISO/IEC 27001.
Salary: $130-140k
Employment Type: Full-time, direct hire
Location: Onsite 3 days/week, remote 2 days/week in Washington DC
SUPERVISORY ACCOUNTABILITIES:
This role does not have direct supervisory responsibility but may provide technical guidance and mentorship to junior cybersecurity staff, contractors, and project teams. The Senior Cybersecurity Engineer may lead cross-functional implementation teams and coordinate security initiatives with other IT departments.
NATURE AND SCOPE:
Operating in a fast-paced, high-impact healthcare technology environment, the Senior Cybersecurity Engineer reports to the Senior Director of Cybersecurity and collaborates with colleagues across Technology Services, including Infrastructure, Applications, Network Operations, and Compliance.
Internal contacts include hospital administrators, clinical and research staff, faculty, and IT personnel. External contacts include technology vendors, auditors, and regulatory agencies. The role requires strong analytical skills, proactive threat awareness, and the ability to balance operational needs with strategic security objectives in a mission-critical healthcare setting.
PRINCIPAL ACCOUNTABILITIES:
Security Operations & Incident Response
Monitor, analyze, and respond to security alerts, incidents, and anomalies across hospital systems.
Conduct vulnerability assessments, penetration tests, and threat-hunting activities to identify and mitigate risks.
Investigate and document security incidents, performing root cause analyses and recommending remediation measures.
Utilize SIEM, EDR, and IDS/IPS platforms (e.g., CrowdStrike, Microsoft Sentinel) to enhance continuous monitoring.
Security Engineering & Architecture
Design, implement, and manage enterprise cybersecurity controls, including firewalls, NAC, DLP, CASB, and endpoint protection systems.
Support secure configuration management using CIS Benchmarks and STIGs.
Implement and maintain identity and access management (IAM), multifactor authentication (MFA), and privileged access controls.
Integrate security practices into DevOps processes and CI/CD pipelines (DevSecOps).
Support the adoption and enforcement of Zero Trust Architecture principles across hybrid and cloud environments.
Governance, Risk, and Compliance
Ensure adherence to cybersecurity frameworks and regulatory standards, including HIPAA, NIST 800-53, ISO/IEC 27001, PCI DSS, and GDPR.
Contribute to the creation and maintenance of security policies, procedures, and documentation.
Support internal and external audits, risk assessments, and compliance reviews.
Participate in disaster recovery and business continuity planning activities.
Collaboration, Training, and Awareness
Collaborate with IT, Compliance, and Clinical Operations to integrate security into all technology operations.
Provide mentorship and technical guidance to IT staff and cybersecurity personnel.
Develop and deliver training on secure computing, phishing prevention, and data protection best practices.
Communicate complex technical concepts clearly to diverse audiences, promoting shared responsibility for security.
CORE COMPETENCIES:
Strategic Thinking: Align cybersecurity initiatives with hospital priorities and risk management goals.
Technical Expertise: Deep knowledge of enterprise and cloud security controls, architectures, and technologies.
Incident Response: Skilled in threat analysis, vulnerability mitigation, and incident management.
Collaboration: Strong interpersonal and communication skills for cross-departmental teamwork.
Innovation: Ability to evaluate emerging tools, techniques, and threat intelligence for proactive defense.
Compliance Knowledge: Familiarity with HIPAA, NIST, ISO 27001, PCI DSS, and related standards.
Problem Solving: Detail-oriented and methodical approach to resolving complex security challenges.
Adaptability: Capable of managing multiple priorities and responding quickly to evolving threats.
MINIMUM REQUIREMENTS:
Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field required.
Master's degree in Business Administration, Cybersecurity, or related discipline preferred.
Experience:
7-10 years of progressive experience in information security, with at least 5 years in a security engineering role.
Proven experience securing hybrid infrastructures, including on-premises systems and cloud environments (Azure, AWS, GCP).
Hands-on expertise with enterprise tools such as Microsoft Defender Suite, Cisco ISE, CrowdStrike Falcon, and Azure Sentinel.
Proficiency in scripting languages (e.g., PowerShell, Python) for automation and threat analysis.
Certifications (one or more preferred):
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
CCSP (Certified Cloud Security Professional)
AWS Certified Security - Specialty
Microsoft Certified: Azure Security Engineer Associate
SABSA or TOGAF (preferred)
Network Engineer
Security engineer job in Washington, DC
The Network Engineer's role is to ensure stability, integrity, and efficient operation by monitoring, maintaining, supporting, and optimizing all networked software and associated operating systems. Like the look of this opportunity Make sure to apply fast, as a high volume of applications is expected Scroll down to read the complete job description.
The Network Engineer will apply proven communication, analytical, and problem-solving skills to help identify, communicate, and resolve issues with multiprotocol routers, multilayer switches, network security devices, and network management systems. xevrcyc
This Network Engineer will also mentor and provide guidance to the Systems Engineer staff.
Computer Network Defense Analyst (CNDA) Level 2
Security engineer job in Jessup, MD
The primary role of the Computer Network Defense Analyst (CNDA) level 2 is to be on the front lines of protecting critical systems, applying your expertise in cybersecurity, network defense, and traffic analysis to detect, respond, and prevent threats.
**Position Responsibilities**
+ Design and develop computer or information systems, including programming and network/cybersecurity solutions.
+ Conduct vulnerability analysis, penetration testing, computer forensics, and information assurance.
+ Perform systems engineering and network/system administration.
+ Analyze data from multiple sources (intrusion detection systems, firewalls, traffic logs, host system logs) to: Identify potential vulnerabilities, Respond to active cyber events, and Defend against emerging threats
**Basic Qualifications (Required Skills & Experience)**
+ Bachelor's in Computer Science, Network Engineering, Information Technology or related STEM discipline or equivalent combination of education, and experience
+ Minimum 5+ years of relevant experience
+ An active TS/SCI with polygraph
**Salary Range: $95,000 - $130,000**
The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
**Clearance Level**
Top Secret with Poly
**ITAR Requirement:**
_T_ _his position requires access to information that is subject to compliance with the International Traffic Arms Regulations ("ITAR") and/or the Export Administration Regulations ("EAR"). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A "U.S. person" according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements._
**Benefits** : AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************* .
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
**Who We Are**
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
**What We Do**
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
_We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status._
**ITAR**
U.S. Citizenship required
**About AV:**
**AV isn't for everyone. We hire the curious, the relentless, the mission-obsessed. The best of the best.**
We don't just build defense technology-we redefine what's possible. As the premier autonomous systems company in the U.S., AV delivers breakthrough capabilities across air, land, sea, space, and cyber. From AI-powered drones and loitering munitions to integrated autonomy and space resilience, our technologies shape the future of warfare and protect those who serve.
Founded by legendary innovator Dr. Paul MacCready, AV has spent over 50 years pushing the boundaries of what unmanned systems can do. Our heritage includes seven platforms in the Smithsonian-but we're not building history, we're building what's next.
**If you're ready to build technology that matters-with speed, scale, and purpose-there's no better place to do it than AV.**
**Careers at AeroVironment (*****************************************
Network Analyst - Active Security Clearance
Security engineer job in Reston, VA
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Network Sniffer Analysis
Security engineer job in McLean, VA
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at
[email protected]
and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email:
[email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst
Security engineer job in Reston, VA
Network Security AnalystLOCATIONReston, VA 20190CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyManual Ethical Hacker
Security engineer job in Washington, DC
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
* Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
* Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
* Perform assessments of the security, effectiveness, and practicality of multiple technology systems
* Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
* Prepare and present detailed technical information for various media including documents, reports, and notifications
* Provide clear and practical advice regarding managed risks
* Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
* Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
* Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
* SQL injection/XSS attack without the use of tools
* Experience performing manual code reviews for security relevant issues
* Experience working with SAST tools to identify vulnerabilities
* Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
* Experience performing manual web application assessments i.e., must be able to simulate a
* Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
* Experience with vulnerability assessment tools and penetration testing techniques
* Solid programming/debugging skills
* Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
* Threat Analysis
* Innovative Thinking
* Technology Systems Assessment
* Technical Documentation
* Advisory
Desired:
* CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
* Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)
Hours Per Week:
40
T1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Security engineer job in Washington, DC
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Networking Security Analyst
Security engineer job in Fort Belvoir, VA
The company is looking for an amazingly talented Networking Security Analyst to join our team! In this role you will get to support the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
What You'll Be Doing:
Risk Mitigation of sensitive networks and systems
Configure, scan, monitor, report
PCAP collection
What Required Skills You'll Bring:
1+ years' experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices
Experience with configuring, scanning, monitoring, alerting and reporting security tools.
Active TS/SCI Clearance
Must be willing to travel 15%- OCONUS and CONUS locations
What Desired Skills You'll Bring:
Experience with PCAP collection.
Experience as a SOC analyst.
Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
Minimum Clearance Required to Start:
Top Secret SCI
This position is part of our Federal Solutions team.
Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
The company is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the quest-APPLY TODAY!
Network and Security Analyst
Security engineer job in Columbia, MD
We're seeking a talented and motivated Network and Security Analyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role.
Key Responsibilities
Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi)
Assess and improve existing IT systems and processes
Coordinate with vendors for cabling, equipment, and installation
Set up and recommend equipment for new hires
Manage access control systems, surveillance integration, and UPS/power solutions
Evaluate and improve domain/web infrastructure
Ensure HIPAA and data privacy compliance in all IT operations
Required Qualifications
Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+)
5-10+ years in IT infrastructure, networking, or systems analysis
Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control
Familiar with HIPAA, PII, and cybersecurity best practices
Experience with Microsoft 365, Power BI, and Asana (preferred)
Preferred Qualifications
Healthcare or regulated industry experience
Why Join Vheda Health?
At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package:
Compensation: Competitive salary within the published range plus performance bonus and equity opportunities
Healthcare: Comprehensive medical, dental, and vision coverage
Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability
Work-Life Balance: Unlimited paid time off and 11 paid company holidays
Community: Engaging team events and activities throughout the year
Computer Network Defense (CND) Analyst
Security engineer job in Fort Meade, MD
Job Description
CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Responsibilities
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Qualifications
Active TS/SCI with polygraph clearance
STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field.
18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree.
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration.
If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Documented foreign language proficiency may count toward experience requirements.
Level 1 Requirements
Associate's degree plus 4 years of relevant experience.
OR: Bachelor's degree or 2 years of relevant experience.
Level 2 Requirements
Associate's degree plus 7 years of relevant experience.
OR: Bachelor's degree plus 5 years of relevant experience.
OR: Master's degree plus 3 years of relevant experience.
OR: Doctorate degree plus 2 years of relevant experience.
Level 3 Requirements
Associate's degree plus 10 years of relevant experience.
OR: Bachelor's degree plus 8 years of relevant experience.
OR: Master's degree plus 6 years of relevant experience.
OR: Doctorate degree plus 4 years of relevant experience.
Level 4 Requirements
Associate's degree plus 13 years of relevant experience.
OR: Bachelor's degree plus 11 years of relevant experience.
OR: Master's degree plus 9 years of relevant experience.
OR: Doctorate degree plus 7 years of relevant experience.
#CJ
Why CTC Group?
As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations.
CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here.
CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Powered by JazzHR
Luf4o3VeSC
Data Exploiter (TS/SCI with Poly Required)
Security engineer job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION
A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination.
KEY RESPONSIBILITIES
* Provide data exploitation and targeting support to the customer.
* Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
* Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
* Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
* Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
* Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
* Analyze intrusion artifacts to identify mitigation approaches for potential network defense
* Provide recommendations for continuous improvement.
* Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
* Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
* Equivalent combination of education, technical certifications, training, and work/military
experience.
REQUIRED QUALIFICATIONS
* Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
* Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
* Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
* Demonstrated experience in utilizing technical targeting tools
* Experience reviewing and assessing network traffic and knowledge of the OSI Layers
* Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
* Knowledge of incident response, containment, and mitigation
* Knowledge of common cyber-attack methods
* Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
* Demonstrated experience performing vulnerability identification, risk analysis, and remediation
* Ability to triage, review, identify, and correlate items of interest from numerous all source
* datasets
* Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
* Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
* Identify and document information that can fill critical gaps
* Create new methodologies / algorithms for data analysis and correlation
* Create entity / object profiles and derived data sets that enable future opportunities and
* analytical efforts
* Prepare a range of tailored products that embody and explain findings
* Experience with technical collection abilities
* Must be eligible to obtain the required Security Clearance.
DESIRED QUALIFICATIONS
* Python Scripting
* Strong understanding of VPNs, VLANs, and TCP/IP
* Understanding of Linux operating systems
* Ability to working independently with minimal supervision
* Experience conducting network traffic analysis
* Understanding of forensic tools and applications
Salary Range $160,000-$200,000
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Chief Information Security Officer
Security engineer job in Washington, DC
Chief Information Security Officer (CISO)
The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
Computer Network Defense Analyst (CNDA) Level 1
Security engineer job in Jessup, MD
The primary role of the Computer Network Defense Analyst (CNDA) is to be on the front lines of protecting critical systems, applying your expertise in cybersecurity, network defense, and traffic analysis to detect, respond, and prevent threats.
Position Responsibilities
Design and develop computer or information systems, including programming and network/cybersecurity solutions.
Conduct vulnerability analysis, penetration testing, computer forensics, and information assurance.
Perform systems engineering and network/system administration.
Analyze data from multiple sources (intrusion detection systems, firewalls, traffic logs, host system logs) to: Identify potential vulnerabilities, Respond to active cyber events, and Defend against emerging threats
Basic Qualifications (Required Skills & Experience)
Bachelor's degree in Computer Science, Network Engineering, Information Technology or related STEM discipline or equivalent combination of education, and experience
Minimum 2+ years of relevant experience
An active TS/SCI with polygraph
Salary Range: $70,000 - $100,000
The AV pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
Clearance Level
Top Secret with Poly
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
U.S. Citizenship required
Auto-ApplyNetwork Analyst - Active Security Clearance
Security engineer job in Reston, VA
Job Description
CADRE is relied upon for delivering superior insight and leadership to solve the nation's most critical national security challenges in the most demanding environments.
is located in Northern Virginia with flexible core hours.
The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
The Network Analysis team is composed of Network Analysts covering three distinct areas of industry and a candidate is likely to be a subject matter expert in only one or two areas:
Telecom and data transport and switching engineering in support of traditional telcos
Data center network engineering in support of intra- and inter-data center transport.
Network architect or cellular network engineering for 3G, 4G, and/or 5G to include core network (EPC and 5G) and radio network engineering
Duties: This Network Analyst performs the following core functions:
Coordinate with the customer's other multidisciplinary teams to provide timely and accurate network analysis regarding the logical and physical routes of key telecommunications networks within a designated area
Work with appropriate members and organizations to evaluate the role and value of potential network operations
Display a mastery of relevant network operations, principles and best practices across various projects
Employ their mastery creatively to support the multidisciplinary teams in providing direct mapping and graphics inputs into the customer's modeling tool as well as in modeling briefings
Display subject matter expertise on complex projects
Perform other duties as assigned at the direction of Project Management
Required Qualifications:
Ability to obtain and maintain a TS/SCI with poly
Bachelor's degree preferred, in a STEM discipline (e.g. Computer Science, Cyber Security, Engineering, Mathematics, or Statistics). Other degrees are acceptable with a strong analytic and technical acumen.
No degree + fourteen (14) years relevant experience
Associate's degree and twelve (12) years relevant experience.
Bachelor's degree and ten (10) years relevant experience.
Minimum of 10 years (current) of commercial/industry experience in one of the following roles:
Facility engineer or network planner (TDM and/or Data)
Large scale networking engineering across multiple packet fabrics, such as google B4
Core network engineer, or radio network engineer with experience in 3G, 4G and/or 5G engineering
OR equivalent NSA experience.
Strong understanding of network technologies, protocols, systems and equipment to include one or more of the following: SONET/SDH, OTN, MSAN, MSPP, MPLS/IP-MPLS, VoIP, IP Multimedia Services (IMS), DWDM, ROADM, Software Defined Networks (SDN) WAN and LAN, multi fabric networks, mesh networks, Session Border Controllers, fabric management, radio access network, front haul, back haul, BGP, OSPF, ISIS, SIP, 5G/LT/LAN interworking, VoLTE, SRVCC, DRVCC, ETSI MANO, OSS/BSS
Experience in commercial/industrial telecommunications networks, providing physical and logical network routes to answer strategic requirements.
Working knowledge of Network Management Systems (NMS) in the network and or Network Function Virtualization and SDN
Working knowledge of one or more of the following:
Public Switched Telephone Network (PSTN)
Data networks (IP, MPLS, traffic engineering, OpenFlow)
Dedicated/Private communications networks both traditional voice and VOIP
VOIP networks, softswitches, SBCs
Fiber optic cable, characteristics, engineering, installation and maintenance
RF related technologies such as cellular technologies, microwave, millimeter wave and VSAT
Gigabit-capable Passive Optical Network (GPON) technology
Strong analytical skills
Ability to work with large volumes of data
Computer and database skills
Desired Qualifications:
Active TS/SCI with poly with most recent BI/Polygraph dates within the last five years
Foreign language capability is not required but is considered a plus
Job Posted by ApplicantPro
Network Sniffer Analysis
Security engineer job in McLean, VA
E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ******************
We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value.
Job Description
Position Title : Network Sniffer Analysis
Location : Mclean, VA
Length : Full time / Permanent Position
Work Status : US Citizen/ Green Card Holder/ EAD (GC)
Required Skills
• Strong data analysis ability with sniffer, packet, net flow data.
• Perform sniffer data analysis to identify traffic profile among servers supporting specific business applications.
• Familiar Opnet AppMapper or similar tool that helps identifies application dependency to map between the application and infrastructure components.
Technologies
Sniffer, Net flow, Gigamon, InfiniStream, Opnet AppMapper, Infoblox .., Software Application
If you are qualified, available, planning to make a change, and have an interest in this or other projects with E*Pro, I would like to coordinate a time to talk with you at your earliest convenience. Please forward a recent version of your resume to my email address at [email protected] and the best time/day to follow up with you for discussion.
Sincerely Yours,
Ranjit
Technical Recruiter | E*Pro Inc.,
Work: ************ x (234)
Email: [email protected]
E*Pro Inc. | 1000 Route 9 North, Suite 303 | Woodbridge Township, NJ 07095
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst
Security engineer job in Tysons Corner, VA
Network Security AnalystLOCATIONTysons, VA 22182CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyManual Ethical Hacker
Security engineer job in Washington, DC
Denver, Colorado;Seattle, Washington; Jersey City, New Jersey; Boston, Massachusetts; Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge (******************************************************************************************
**:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
**Job Description:**
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
+ Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
+ Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
+ Perform assessments of the security, effectiveness, and practicality of multiple technology systems
+ Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
+ Prepare and present detailed technical information for various media including documents, reports, and notifications
+ Provide clear and practical advice regarding managed risks
+ Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
+ Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
+ Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
+ SQL injection/XSS attack without the use of tools
+ Experience performing manual code reviews for security relevant issues
+ Experience working with SAST tools to identify vulnerabilities
+ Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
+ Experience performing manual web application assessments i.e., must be able to simulate a
+ Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
+ Experience with vulnerability assessment tools and penetration testing techniques
+ Solid programming/debugging skills
+ Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
+ Threat Analysis
+ Innovative Thinking
+ Technology Systems Assessment
+ Technical Documentation
+ Advisory
Desired:
+ CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
+ Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Data Exploiter (TS/SCI with Poly Required)
Security engineer job in Chantilly, VA
GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:
JOB DESCRIPTION A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. KEY RESPONSIBILITIES
Provide data exploitation and targeting support to the customer.
Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
Analyze intrusion artifacts to identify mitigation approaches for potential network defense
Provide recommendations for continuous improvement.
Work alongside other team members to sustain and advance our organization's capabilities.
EDUCATION AND EXPERIENCE
Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
Equivalent combination of education, technical certifications, training, and work/military
experience. REQUIRED QUALIFICATIONS
Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
Demonstrated experience in utilizing technical targeting tools
Experience reviewing and assessing network traffic and knowledge of the OSI Layers
Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
Knowledge of incident response, containment, and mitigation
Knowledge of common cyber-attack methods
Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
Demonstrated experience performing vulnerability identification, risk analysis, and remediation
Ability to triage, review, identify, and correlate items of interest from numerous all source
datasets
Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
Identify and document information that can fill critical gaps
Create new methodologies / algorithms for data analysis and correlation
Create entity / object profiles and derived data sets that enable future opportunities and
analytical efforts
Prepare a range of tailored products that embody and explain findings
Experience with technical collection abilities
Must be eligible to obtain the required Security Clearance.
DESIRED QUALIFICATIONS
Python Scripting
Strong understanding of VPNs, VLANs, and TCP/IP
Understanding of Linux operating systems
Ability to working independently with minimal supervision
Experience conducting network traffic analysis
Understanding of forensic tools and applications
Salary Range $160,000-$200,000
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans