Computer Security System Specialist
Security engineer job in Bethesda, MD
GovCIO is currently hiring for a Computer Security System Specialist for our NIH-CIT proposal. This position will be located in Bethesda, MD and is a remote/hybrid position
Responsibilities:
Communicate, investigate, triage, monitor, and respond to security incidents, events, alerts, and issues according to standard operating procedures and in collaboration with NS Operations
Contribute to alert thresholds refinements and contribute to continuous improvements to the Security Section for the benefit of customer satisfaction
Qualifications:
Bachelor's with 5 - 8 years of cyber system security experience (or commensurate experience)
Clearance Required:Ability to maintain a Public Trust clearance
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $115,000.00 - USD $115,000.00 /Yr.
Auto-ApplySystems Engineer
Security engineer job in Annapolis, MD
MANTECH seeks a motivated, career and customer-oriented Systems Engineer III to join our team in Annapolis Junction, Maryland.
ManTech is currently seeking Systems Engineer III to join our team at Annapolis Junction, MD. We are seeking a Senior Systems Engineer who is a seasoned IT professional responsible for designing, implementing, and a top-level trouble shooter supporting a high-level architecture of an organization's backend infrastructure. You will communicate with other project personnel, Government stakeholders, and senior executives.
Responsibilities include but are not limited to:
Administer and maintain IT infrastructure by utilizing expert-level knowledge of the Linux operating system, along with deep expertise in server administration, virtualization, and cloud platforms like AWS or Azure, to manage the organization's backend systems.
Develop and implement automation solutions through creating scalable automation services using strong scripting and orchestration skills, with proficiency in tools like Python, Bash, and Ansible.
Design and manage system architecture by applying systems engineering principles to design, implement, and manage the high-level architecture of the organization's backend infrastructure.
Ensure network and system security through a strong understanding of networking and security fundamentals, including TCP/IP, firewalls, and VPNs, to protect the organization's infrastructure.
Communicate with stakeholders - Interact directly with government personnel, senior executives, and other project members to discuss technical issues and project status.
Provide technical guidance and troubleshooting as a top-level troubleshooter, addressing technical considerations, problems, and issues for both internal teams and government stakeholders.
Minimum Qualifications:
Bachelor's degree in STEM field or Highschool and 13 years of experience; Associates and 11 years of experience in lieu of degree, a candidate holding a relevant master's degree may be granted 2 years' experience credit for that extra education, a candidate holding a relevant PhD degree may be granted 4 years' experience credit for that extra education.
5 years of position-relevant work experience.
DoD 8570.01-m IAT Level II.
Strong proficiency in scripting and automation, with hands-on experience in Python, Bash, and an infrastructure orchestration tool like Ansible.
Experience in front-end web development to create internal tools and solutions.
Proven background as an Orchestration Engineer or in a similar role focused on building scalable automation services.
Solid grasp of TCP/IP networking, firewalls, VLANs, and VPNs.
Expert-level knowledge of the Linux operating system.
Preferred Qualifications:
Experience with full-stack development, including creating and interacting with databases and APIs.
Knowledge of Infrastructure as Code (IaC) principles, preferably with experience using Terraform.
Familiarity with public cloud platforms (AWS, Azure, GCP) and container technologies (Docker, Kubernetes).
Proficiency with virtualization platforms such as VMware vSphere or Microsoft Hyper-V.
Exceptional troubleshooting and problem-solving skills, with a talent for systematically diagnosing and resolving complex technical issues.
A foundational understanding of traditional Systems Administration principles
Clearance Requirements:
Must have a current/active TS/SCI
Physical Requirements:
The person in this position must have the ability to perform tasks while stationary 50% of the time at a computer, with specific emphasis on visual acuity for close-range work. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations
Cyber Security Consultant
Security engineer job in Washington, DC
BASIC FUNCTION:
The Senior Cybersecurity Engineer is responsible for safeguarding the client information systems, digital assets, and technology infrastructure. This role designs, deploys, and maintains advanced cybersecurity solutions that protect patient data, clinical systems, and enterprise applications. The Senior Cybersecurity Engineer ensures the client's technology environment remains secure, compliant, and resilient against emerging threats.
This position combines hands-on technical expertise with strategic leadership, driving initiatives that enhance cybersecurity maturity and operational readiness across on-premises, hybrid, and cloud environments (e.g., Azure, AWS). The role is pivotal in incident response, risk management, and ongoing improvement of security controls in alignment with hospital policies and regulatory standards such as HIPAA, NIST 800-53, and ISO/IEC 27001.
Salary: $130-140k
Employment Type: Full-time, direct hire
Location: Onsite 3 days/week, remote 2 days/week in Washington DC
SUPERVISORY ACCOUNTABILITIES:
This role does not have direct supervisory responsibility but may provide technical guidance and mentorship to junior cybersecurity staff, contractors, and project teams. The Senior Cybersecurity Engineer may lead cross-functional implementation teams and coordinate security initiatives with other IT departments.
NATURE AND SCOPE:
Operating in a fast-paced, high-impact healthcare technology environment, the Senior Cybersecurity Engineer reports to the Senior Director of Cybersecurity and collaborates with colleagues across Technology Services, including Infrastructure, Applications, Network Operations, and Compliance.
Internal contacts include hospital administrators, clinical and research staff, faculty, and IT personnel. External contacts include technology vendors, auditors, and regulatory agencies. The role requires strong analytical skills, proactive threat awareness, and the ability to balance operational needs with strategic security objectives in a mission-critical healthcare setting.
PRINCIPAL ACCOUNTABILITIES:
Security Operations & Incident Response
Monitor, analyze, and respond to security alerts, incidents, and anomalies across hospital systems.
Conduct vulnerability assessments, penetration tests, and threat-hunting activities to identify and mitigate risks.
Investigate and document security incidents, performing root cause analyses and recommending remediation measures.
Utilize SIEM, EDR, and IDS/IPS platforms (e.g., CrowdStrike, Microsoft Sentinel) to enhance continuous monitoring.
Security Engineering & Architecture
Design, implement, and manage enterprise cybersecurity controls, including firewalls, NAC, DLP, CASB, and endpoint protection systems.
Support secure configuration management using CIS Benchmarks and STIGs.
Implement and maintain identity and access management (IAM), multifactor authentication (MFA), and privileged access controls.
Integrate security practices into DevOps processes and CI/CD pipelines (DevSecOps).
Support the adoption and enforcement of Zero Trust Architecture principles across hybrid and cloud environments.
Governance, Risk, and Compliance
Ensure adherence to cybersecurity frameworks and regulatory standards, including HIPAA, NIST 800-53, ISO/IEC 27001, PCI DSS, and GDPR.
Contribute to the creation and maintenance of security policies, procedures, and documentation.
Support internal and external audits, risk assessments, and compliance reviews.
Participate in disaster recovery and business continuity planning activities.
Collaboration, Training, and Awareness
Collaborate with IT, Compliance, and Clinical Operations to integrate security into all technology operations.
Provide mentorship and technical guidance to IT staff and cybersecurity personnel.
Develop and deliver training on secure computing, phishing prevention, and data protection best practices.
Communicate complex technical concepts clearly to diverse audiences, promoting shared responsibility for security.
CORE COMPETENCIES:
Strategic Thinking: Align cybersecurity initiatives with hospital priorities and risk management goals.
Technical Expertise: Deep knowledge of enterprise and cloud security controls, architectures, and technologies.
Incident Response: Skilled in threat analysis, vulnerability mitigation, and incident management.
Collaboration: Strong interpersonal and communication skills for cross-departmental teamwork.
Innovation: Ability to evaluate emerging tools, techniques, and threat intelligence for proactive defense.
Compliance Knowledge: Familiarity with HIPAA, NIST, ISO 27001, PCI DSS, and related standards.
Problem Solving: Detail-oriented and methodical approach to resolving complex security challenges.
Adaptability: Capable of managing multiple priorities and responding quickly to evolving threats.
MINIMUM REQUIREMENTS:
Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field required.
Master's degree in Business Administration, Cybersecurity, or related discipline preferred.
Experience:
7-10 years of progressive experience in information security, with at least 5 years in a security engineering role.
Proven experience securing hybrid infrastructures, including on-premises systems and cloud environments (Azure, AWS, GCP).
Hands-on expertise with enterprise tools such as Microsoft Defender Suite, Cisco ISE, CrowdStrike Falcon, and Azure Sentinel.
Proficiency in scripting languages (e.g., PowerShell, Python) for automation and threat analysis.
Certifications (one or more preferred):
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
CCSP (Certified Cloud Security Professional)
AWS Certified Security - Specialty
Microsoft Certified: Azure Security Engineer Associate
SABSA or TOGAF (preferred)
Network Engineer
Security engineer job in Washington, DC
The Network Engineer's role is to ensure stability, integrity, and efficient operation by monitoring, maintaining, supporting, and optimizing all networked software and associated operating systems. Like the look of this opportunity Make sure to apply fast, as a high volume of applications is expected Scroll down to read the complete job description.
The Network Engineer will apply proven communication, analytical, and problem-solving skills to help identify, communicate, and resolve issues with multiprotocol routers, multilayer switches, network security devices, and network management systems. xevrcyc
This Network Engineer will also mentor and provide guidance to the Systems Engineer staff.
Manual Ethical Hacker
Security engineer job in Washington, DC
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
Job Description:
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
* Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
* Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
* Perform assessments of the security, effectiveness, and practicality of multiple technology systems
* Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
* Prepare and present detailed technical information for various media including documents, reports, and notifications
* Provide clear and practical advice regarding managed risks
* Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
* Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
* Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
* SQL injection/XSS attack without the use of tools
* Experience performing manual code reviews for security relevant issues
* Experience working with SAST tools to identify vulnerabilities
* Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
* Experience performing manual web application assessments i.e., must be able to simulate a
* Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
* Experience with vulnerability assessment tools and penetration testing techniques
* Solid programming/debugging skills
* Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
* Threat Analysis
* Innovative Thinking
* Technology Systems Assessment
* Technical Documentation
* Advisory
Desired:
* CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
* Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)
Hours Per Week:
40
Computer Network Defense (CND) Analyst
Security engineer job in Fort Meade, MD
Job Description
CTC Group is seeking Computer Network Defense (CND) Analysts, levels 1-4, to use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Responsibilities
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Qualifications
Active TS/SCI with polygraph clearance
STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field.
18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree.
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration.
If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Documented foreign language proficiency may count toward experience requirements.
Level 1 Requirements
Associate's degree plus 4 years of relevant experience.
OR: Bachelor's degree or 2 years of relevant experience.
Level 2 Requirements
Associate's degree plus 7 years of relevant experience.
OR: Bachelor's degree plus 5 years of relevant experience.
OR: Master's degree plus 3 years of relevant experience.
OR: Doctorate degree plus 2 years of relevant experience.
Level 3 Requirements
Associate's degree plus 10 years of relevant experience.
OR: Bachelor's degree plus 8 years of relevant experience.
OR: Master's degree plus 6 years of relevant experience.
OR: Doctorate degree plus 4 years of relevant experience.
Level 4 Requirements
Associate's degree plus 13 years of relevant experience.
OR: Bachelor's degree plus 11 years of relevant experience.
OR: Master's degree plus 9 years of relevant experience.
OR: Doctorate degree plus 7 years of relevant experience.
#CJ
Why CTC Group?
As a Service-Disabled Veteran-Owned Small Business (SDVOSB), we recognize that successful partnerships are based on open and direct communication, mutual respect, and the ability to adapt to evolving capabilities. Our cleared employees bring decades of experience supporting customers in the Intelligence and Defense communities. We specialize in providing engineering, technical, operational support, and training services to Federal government, and Mission Operations.
CTC Group provides a comprehensive benefits package that includes, but is not limited to, Health/Dental/Vision, 401k, PTO and holiday pay, disability and life insurance. To learn more about our benefits, click here.
CTC Group provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, physical disability, genetic information, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner status, gender (including sex stereotyping), medical condition (including, but not limited to, cancer related or HIV/AIDS related) or sexual orientation in accordance with applicable federal and state laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Powered by JazzHR
Luf4o3VeSC
Computer Network Defense Analyst (CNDA)
Security engineer job in Annapolis, MD
At BlueHalo, an AV Company, our Cyber experts operate at the mission's edge. Using advanced cyber techniques, our team of technologists and analysts employ capabilities spanning traditional computing environments to Internet of Things (IoT), including offensive and defensive cyber operations and analysis, signals intelligence (SIGINT) discovery, and data science.
Our team is expanding to do the big things that have never been done before - the things the nation and the world are counting on us to deliver. Join the transformation and help us make this impact now.
We are seeking a Computer Network Defense Analyst (CNDA) to join our team. The CNDA must be experienced in security concepts/network defense, network and routing protocols, and traffic analysis/packet capture. If that sounds like you and you're ready to make an impact now, not later, read on for the details and apply to make the most out of your career.
You'd like to do this
* Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
* Network or system administration.
* Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
You're required to have this
* An active TS/SCI with polygraph
* Bachelor's degree
* 2 years of relevant experience
* 2 additional years of experience may be substituted if you have an associates degree.
Level 2
* Bachelor's degree
* 5 years of experience
* 2 additional years of experience may be substituted if you have an associates degree.
Level 3
* Bachelor's degree
* 8 years of experience
* 2 additional years of experience may be substituted if you have an associates degree.
Level 4
* Bachelor's degree
* 11 years of experience
* 2 additional years of experience may be substituted if you have an associates degree.
Salary Range: $100,000 - $160,000
The BlueHalo, an AV Company, pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Determination of official compensation or salary relies on several factors including, but not limited to, level of position, job responsibilities, geographic location, scope of relevant work experience, educational background, certifications, contract-specific affordability, organizational requirements, alignment with local internal equity as well as alignment with market data.
Our compensation package also includes components designed to support employees' total well-being, which should be considered when evaluating our competitive benefits package. These benefits include health insurance, life insurance, disability, company holiday and paid time off, parental leave, 401(k) company match and contributions, professional development/training reimbursements, and other work/life programs.
Auto-ApplyNetwork and Security Analyst
Security engineer job in Columbia, MD
We're seeking a talented and motivated Network and Security Analyst to join our team. In this role, you will lead infrastructure upgrades and strengthen our IT security. This role is perfect for a senior-level professional ready to own key projects and grow into a future leadership role.
Key Responsibilities
Lead the setup and deployment of new office network infrastructure (firewalls, switches, Wi-Fi)
Assess and improve existing IT systems and processes
Coordinate with vendors for cabling, equipment, and installation
Set up and recommend equipment for new hires
Manage access control systems, surveillance integration, and UPS/power solutions
Evaluate and improve domain/web infrastructure
Ensure HIPAA and data privacy compliance in all IT operations
Required Qualifications
Bachelor's degree or equivalent with industry certifications (e.g., CCNA, Network+, Security+)
5-10+ years in IT infrastructure, networking, or systems analysis
Hands-on experience with firewalls, structured cabling, wireless APs, UPS, and access control
Familiar with HIPAA, PII, and cybersecurity best practices
Experience with Microsoft 365, Power BI, and Asana (preferred)
Preferred Qualifications
Healthcare or regulated industry experience
Why Join Vheda Health?
At Vheda Health, we invest in our team's wellbeing with a comprehensive benefits package:
Compensation: Competitive salary within the published range plus performance bonus and equity opportunities
Healthcare: Comprehensive medical, dental, and vision coverage
Financial Security: 401(k) retirement plan, voluntary life insurance, short and long-term disability
Work-Life Balance: Unlimited paid time off and 11 paid company holidays
Community: Engaging team events and activities throughout the year
Security Systems Engineer
Security engineer job in Fort Meade, MD
Responsibilities
Peraton is seeking a Security Systems Engineer to join our team in the Annapolis Junction, MD area. This role requires the ability to support CONUS and OCONUS travel. Our dynamic team delivers information security solutions that facilitate secure data flows and the detection/prevention of unauthorized behaviors, performs system security vulnerability assessments and solution development, provide enterprise-level network, server, desktop, and application security services. Responsibilities may include supporting the design of systems, mission architecture and associated hardware, as well as analyzing and resolving complex problems associated with server hardware, applications and software integration.
Qualifications
Required Qualifications:
Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required.
Minimum of 14 years' experience as a Systems Engineer on programs or contracts of similar scope, type, and complexity is required. 5 years of additional SE experience may be substituted for a BS degree, totaling 19 years of SE experience.
Ability to support CONUS and OCONUS TDY travel: approximately 1-2 trips every 3 months (up to 2 weeks per time).
Experience in building/configuring, maintaining, troubleshooting network devices (i.e. Switches), Linux OS, Virtualization (VMWare).
Ability to automate processes such as device hardening, patching, vulnerability remediation, system monitoring, (preferably using Ansible).
AWS Cloud experience is required.
Knowledge and understanding NIST Controls and how to apply to systems.
Experience with scripting (Python, Bash, etc).
DOD 8570 compliance with minimum IAT Level 2 is required.
Current TS/SCI clearance with polygraph is required.
Preferred Requirements:
AWS cert is preferred.
Ansible experience is preferred.
Salary Range Estimate:
The estimate displayed represents the typical salary range for this position and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Benefits:
Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and participation in an attractive bonus plan.
#AJCM
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $176,000 - $282,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyT1 Cyber Network Defense Analyst - Day Shift (w/ active TS)
Security engineer job in Washington, DC
Tier 1 Cyber Network Defense Analyst - Shift Schedule (w/ active TS)
Full-time, Hybrid Clearance: TS/SCI Shift Schedule: Day Shift 7am - 7pm ET
JOB DESCRIPTION
Critical Solutions has an immediate opening for a Tier 1 Cyber Network Defense Analyst (CNDA) to support our federal customer in Washington, DC.
The Tier 1 Cyber Network Defense Analyst (CNDA) will be part of a team that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
PRIMARY ROLES AND RESPONSIBILITIES:
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
BASIC QUALIFICATIONS:
Active TS/SCI and must be able to obtain and maintain an Entry on Duty (EOD) clearance
must have the ability to work non-core hours, if necessary.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of two (2) years professional experience in the areas listed below:
Network Administration
Unix/Linux Administration
Software engineering
Software development
Systems administration
Help desk/IT support
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Familiarity with a SOC's purpose and role within an organization
General understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
Familiarity with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
Familiarity with packet analysis tools such as Wireshark
Able to perform critical thinking and analysis to investigate cyber security alerts
Familiarity with common malware and attack vectors
Familiarity with Windows operating systems and standard OS logging
Familiarity with Antivirus, DLP, and host based firewalls
Must have one of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, Security+, CySA+
PREFERRED QUALIFICATIONS:
Familiar with SOC methodologies and processes
Familiarity with scripting languages (e.g. Python, Powershell, Javascript, VBS etc)
SHIFT SCHEDULE:
Shift schedule will be determine at the time of the start date
Day Shift Front: 7am - 7pm ET, Sunday - Tuesday and every other Wednesday (8hr shift)
Day Shift Back: 7am - 7pm ET, Thursday - Saturday and every other Wednesday (8hr shift)
Must have the ability to work non-core hours, if necessary.
LOCATION:
This is a hybrid role with expectations of being on the client site most days.
Must be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT: Must possess an active DoD Top Secret Clearance. In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $58,000 - $74,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Job Posted by ApplicantPro
Network Security Systems Engineer
Security engineer job in Fort Meade, MD
VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training.
Job Description
VOR Technology is seeking a Network Security Systems Engineer to provide network security support to the contract focusing on SIGINT systems interconnectivity. Experience with Linux, switches, routers, encryption devices, copper and fiber connectivity and protocols is required. Primary responsibilities will include design, integration, test, operations, and maintenance of connecting networks.
Occasional operational systems support is required after-hours or on a call-in basis.
Qualifications
*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
Five (5) years' of experience in network security design and managing installation and support of LAN/WAN based network security components to include firewalls and authentication (AAA) systems.
Three (3) years' of experience with the following:
- Resolving complex network and security issues where in-depth evaluation and analysis may be required using network monitoring platforms, LAN/WAN test equipment, and log analyzers.
- Implementing networks with Gigabit Ethernet, Fast Ethernet and security services, terminal servers, and Network Time Protocol (NTP) services.
- Performing network and network security architecture, design, and integration on UNIX, Windows, Linux, or other Operating System (OS) configurations.
Knowledge of and experience with Cisco and Juniper devices.
Some knowledge of file storage applications in native and virtual environments.
Fundamental understanding of access control list (ACL), network address translation (NAT), virtual private networking (VPN), public key infrastructure (PKI), and authentication, authorization, and accounting (AAA).
Two (2) years' experience with modern LAN/WAN networking concepts and protocol support to include TCP, UDP, RDP, DHCP, SSH, NTP, DNS, ARP, ICMP, SCP, and TFTP.
Experience with configuration, implementation and sustainment of IP Encryption devices.
Additional Desired Skills:
Knowledge of WAN Optimizers
LINUX experience
Working knowledge of dynamic routing protocols to include EIGRP and BGP
Cisco Certified Network Professional (CCNP) Certification (can substitute for 1 year experience)
Knowledge of intrusion detection system (IDS) rules
Additional Information
Education Requirement: Bachelor's Degree in a technical field
Clearance Requirement: Active TS/SCI with Full Scope clearance
* US citizenship is required.
EOE/M/F/D/V
Safety and Security Data Analyst
Security engineer job in Washington, DC
Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension.
Key Responsibilities
Gather and accurately organize safety and security data collected from various internal and external sources.
Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets.
Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas.
Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes.
Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data.
Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data.
Qualifications
Minimum Requirements
Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting).
Demonstrable experience with data collection, maintenance, and basic reporting.
Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records.
Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment.
Unwavering ability to maintain confidentiality and protect sensitive data.
Preferred Skills
Familiarity or exposure to basic data visualization techniques.
Working knowledge of or familiarity with programming languages such as Python and SQL.
Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries.
Prior exposure to or experience with safety, security, or transportation-related data.
Cyber Network Defense Analyst (CNDA) - Cloud Forensics
Security engineer job in Washington, DC
Job DescriptionWhy Argo Cyber Systems
At Argo, you'll be part of a mission-driven, veteran-founded cybersecurity team protecting America's most critical systems. We combine hands-on technical excellence with operational precision to outpace the threat. Join us to defend, detect, and innovate at the cyber edge.
Argo Cyber is supporting a U.S. Government customer on a mission-critical cyber operations program. We are seeking a ServiceNow SecOps Business Process / Technical Consultant to design, develop, and implement ServiceNow Security Operations (SecOps) solutions that enhance the customer's ability to detect, respond, and remediate security threats.
This hybrid role combines ServiceNow SecOps development, integration engineering, and process consulting. The ideal candidate will work directly with security stakeholders, translate mission requirements into technical designs, and deliver scalable, secure, and automated SecOps capabilities within the ServiceNow platform.
Responsibilities Include:
• Designing, prototyping, and implementing ServiceNow SecOps applications, including:
o Security Incident Response (SIR): enrichment, correlation rules, and automated playbooks.
o Vulnerability Response (VR): scanner integrations, remediation workflows, patch group automation.
o Configuration Compliance (CC): policy exception handling, remediation tasks, compliance dashboards.
o Threat Intelligence (TI): ingestion of IOCs, sightings search, enrichment workflows.
• Supporting the customer's roadmap for Splunk integrations to enable alert ingestion, bi-directional incident synchronization, and SIEM dashboards.
• Developing custom integrations with SIEM, scanner, and intel tools (e.g., Splunk, Tenable, VirusTotal, Hybrid Analysis) using IntegrationHub, REST/SOAP APIs, and MID Server.
• Building and maintaining orchestration playbooks, Flow Designer workflows, Business Rules, and Script Includes to automate enrichment and response actions.
• Documenting and maintaining policies, procedures, and technical designs aligned with Agile development practices and secure coding standards.
• Leading workshops with SOC, IR, and VR teams to capture mission needs, define business requirements, and translate them into technical solutions.
• Creating and maintaining Performance Analytics dashboards and KPIs to provide real-time visibility into security posture.
• Supporting incident resolution, troubleshooting, and sustainment of the ServiceNow SecOps environment.
• Providing mentorship and knowledge transfer to client staff on best practices and solution sustainment.
Required Skills:
• U.S. Citizenship required.
• Must be able to obtain DHS program suitability and a TS/SCI clearance.
• 8+ years of software development, IT security, or IT systems engineering experience.
• Minimum 4+ years of ServiceNow experience, with at least 2+ years focused on SecOps applications (SIR, VR, CC, or TI).
• Strong knowledge of ServiceNow administration, advanced configuration, and custom application development.
• Experience integrating ServiceNow with SIEM, vulnerability scanners, and threat intelligence platforms.
• Hands-on experience with Flow Designer, Orchestration, IntegrationHub, and MID Server.
• Strong technical skills in web technologies (JavaScript, HTML, XML, Angular, CSS) and integration technologies (REST, SOAP, LDAP, SSO).
• Familiarity with federal cybersecurity frameworks (NIST 800-53, FedRAMP, CISA KEV, MITRE ATT&CK).
• Strong communication, presentation, and documentation skills for technical and business stakeholders.
Desired Skills:
• Experience supporting DHS, DoD, or Intelligence Community customers.
• Experience deploying future-state SecOps processes including incident triage, vulnerability management, compliance automation, and threat intel workflows.
• Familiarity with Splunk use cases for security operations and event correlation.
• Experience with collaboration tools (MS Teams, Outlook, SharePoint, Atlassian Jira/Confluence).
• Strong problem-solving, analytical, and consulting skills in complex security environments.
• Information Systems Security Engineering Professional (ISSEP) or Information System Security Architect Professional (ISSAP) certification desired.
Desired Certifications:
• ServiceNow Certified System Administrator (CSA).
• ServiceNow Certified Application Developer.
• ServiceNow Certified Implementation Specialist - SecOps (SIR, VR, or CC).
• ITIL v4 Foundation certification (or willingness to complete within one year).
• DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification highly desired
Argo Cyber systems is an Equal Opportunity Employer!
Background & Drug Screening Disclaimer
© Argo Cyber Systems, LLC - All Rights Reserved
Argo Cyber Systems, LLC is committed to maintaining a safe, secure, and trusted workplace for all employees and our federal clients. Employment with Argo Cyber Systems is contingent upon successful completion of all required background investigations and pre-employment screenings, which may include, but are not limited to:
Criminal background checks (federal, state, and local)
Employment and education verification
Reference checks
Drug screening (in compliance with federal and state law)
Security clearance verification (as applicable for classified positions)
Candidates selected for employment in positions requiring access to sensitive or classified information may also be subject to additional U.S. Government background investigations and security adjudication processes, including DHS Entry on Duty (EOD) suitability or equivalent federal clearance requirements.
Argo Cyber Systems reserves the right to disqualify or rescind an offer of employment based on the results of any background or screening process that, in the company's judgment, may impact an individual's ability to perform essential job functions or meet contractual obligations.
All background investigations and screenings are conducted in accordance with applicable federal, state, and local laws, including the Fair Credit Reporting Act (FCRA). Candidates will be notified of their rights and provided an opportunity to review and dispute any adverse findings before final employment determinations are made.
Job Posted by ApplicantPro
System Security Engineer
Security engineer job in Linthicum, MD
Join ClearEdge and be a part of a dynamic team that solves some of the DoD's most complex technical challenges. Every day, ClearEdge empowers our customers in government and industry with innovative, data-driven solutions. Check out our extremely competitive benefits package at ***************************** which includes a $10k annual training/education benefit, 10% 401k contribution fully vested on day one, annual health and technology allowance, and access to a state-of-the-art technology lab. We also offer monthly TechConnect and DeepDive collaboration sessions with our entire technical staff.
Your Mission:
Join ClearEdge as a System Security Engineer and begin shaping and maintaining an enterprise-wide Information Security (IS) program that supports a Chief Information Security Officer (CISO) client organization. Here, you'll work in close collaboration with mission leads and system owners across various mission areas, applying your security expertise to solve complex challenges. This is a hands-on, strategic role that influences security architecture through impactful technical working groups and stakeholder engagement in a dynamic, mission-driven environment.You Will Excel in This Role If You Are:
With deep expertise as an ISSO, ISSE, or ISSM, you have a solid foundation in requirements gathering, analysis, and client engagement
You're adept at engaging stakeholders at all levels, from mission leads to system owners, and excel in working both independently and within a team
You bring a strong knowledge of system and security architecture, with a readiness to apply this expertise to real-time enterprise-wide security needs
A Day in the Life:
Collaborate closely with the CISO team to support the development and upkeep of an enterprise-wide Information Security program
Provide security architecture expertise through direct engagement with mission leads and system owners, ensuring systems align with agency security standards
Participate in technical working groups to shape information security policies and define system security architecture, translating user requests into technical solutions.
Assess residual risk, implement security controls, and apply your knowledge of frameworks
Evaluate emerging technologies and security practices that could enhance the customer's security posture, while ensuring smooth migration to new systems with minimal impact
Apply threat analysis and security controls to maintain a secure, compliant environment
Actively contribute to technical discussions and working groups to drive informed, mission-aligned security architecture and policy decisions
Must Haves:
Active TS/SCI clearance with polygraph
8 years of relevant experience
Strong understanding of security controls, residual risk management, and system architecture within an Enterprise-level environment
Experience with requirements gathering and analysis, and client and stakeholder engagement through working groups and technical exchange meetings
Knowledge of Supply Chain Risk Management (SCRM)
Knowledge of system or security architecture
Ability to work both individually and in a team environment in an Enterprise-level organization
Nice to Haves:
Bachelor's degree in a related field
Systems Engineering Expertise: A strong foundation in systems engineering to enhance your technical capabilities and problem-solving approach
Agency Knowledge: Familiarity with the corporate systems of national agencies, including their security control implementations
Risk Assessment Skills: Ability to evaluate residual risk by analyzing threats and security control implementations
Exceptional Communication: Demonstrated written and verbal communication skills for effectively engaging with both technical and non-technical audiences
About us: We are an experienced advanced analytic development company providing Cyber solutions to current and emerging missions.
Our Core Values of Honesty, Integrity, Loyalty, Fairness, Respect, Responsibility, and Accountability drive our mission and vision and are the heart of what we do each day. We combine our Core Values with the three key elements of people, technology, and integrity to repeatedly deliver stellar results within our primary competencies.
ClearEdge is also pleased to share that we have recently expanded our prime and subcontract presence into new cyber markets!
If this position does not fit your skillset, please visit our Careers page to explore our current openings, or contact a ClearEdge recruiter at ***********************. ClearEdge is an equal opportunity employer.
Auto-ApplyNetwork Security Analyst
Security engineer job in Annapolis, MD
Network Security AnalystLOCATIONAnnapolis Junction, MD 20701CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplySystem Engineer - On-Site - Security Clearance Required
Security engineer job in Aberdeen Proving Ground, MD
Job Description
About the Role:
As a System Engineer, you will be responsible for designing, implementing, and maintaining computer systems and solutions that meet the needs of our clients. You will work on-site and be required to have a security clearance. Your main goal will be to ensure that our clients' computer systems are secure, reliable, and efficient. You will work closely with other engineers and technical staff to ensure that all systems are integrated and functioning properly.
Minimum Qualifications:
Experience designing and implementing computer systems
Strong knowledge of computer hardware, software, and operating systems
Excellent problem-solving and analytical skills
Ability to obtain and maintain a U.S. Federal Security Clearance
Preferred Qualifications:
Experience working with government clients
Experience with system security and encryption
Certifications in relevant technologies such as Microsoft or CompTIA
Responsibilities:
Design and implement computer systems that meet the needs of our clients
Maintain and troubleshoot computer systems to ensure they are secure, reliable, and efficient
Collaborate with other engineers and technical staff to ensure all systems are integrated and functioning properly
Provide technical support to clients as needed
Stay up-to-date with the latest trends and technologies in computer systems engineering
Skills:
As a Computer System Engineer, you will use your strong knowledge of computer hardware and software to design and implement computer systems that meet the needs of our clients. You will also use your problem-solving and analytical skills to troubleshoot and maintain these systems. Your ability to collaborate with other engineers and technical staff will be essential in ensuring that all systems are integrated and functioning properly. Additionally, your knowledge of network security and encryption will be beneficial in this role. Finally, your ability to stay up-to-date with the latest trends and technologies in computer systems engineering will ensure that you are able to provide the best possible solutions to our clients.
Systems Engineer - Department of Homeland Security
Security engineer job in Washington, DC
Requirements
Education: Bachelor's degree in Computer Engineering, Systems Engineering, or related field (Master's preferred). - Experience: - 3+ years designing/implementing **large-scale federal enterprise systems**. - 2+ years leading **cloud migrations (AWS GovCloud/Azure Government)**.
- Proven track record in **legacy system modernization** and API-centric architectures.
- Expertise in **Python, Java, Terraform, Kubernetes, and enterprise data platforms**.
- Certifications: One or more of **CISSP-ISSAP, AWS/Azure Solutions Architect, TOGAF, or INCOSE CSEP**.
Salary Description 85,000 - 150,000
Computer Network Defense (CND) Analyst 4 (CCAs Accepted)
Security engineer job in Annapolis, MD
At Wyetech, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.
Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).
Capabilities
Ability to quickly become a subject matter expert on a designated advanced persistent threat group.
Expertise in identifying malicious cyber activity utilizing a variety of sources, customer tools, and analytic methodologies.
The ability to discover, understand, and characterize infrastructure and tactics, techniques, and procedures (TTPs) utilized by cyber actors to conduct malicious cyber operations.
Develop signatures to discover and track malicious cyber activity to include bespoke malware and other TTPs.
Ability to identify and characterize victims of malicious cyber activity.
Experience translating analysis into intelligence products and ability to perform technical and analytic review of intelligence reporting.
Required Qualifications
TS/SCI with agency appropriate poly
Thirteen (13) years of experience and an Associate's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Eleven (11) years of experience and an Bachelor's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Nine (9) years of experience and an Master's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Seven (7) years of experience and an Doctorate Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant Experience
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree
Desired Technical Skills
The ability to identify and triage malware and other malicious code in partnership and support of malware analysts on staff.
Experience working with external and multi-national partners.
Experience developing, modifying, and documenting Jupyter notebooks to enhance intrusion analysis tradecraft.
The Benefits Package
Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds.
Additional benefits include:
Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs.
Full-time employees have the option to participate in a variety of voluntary benefit plans including:
A Choice of Medical Plan Options, some with Health Savings Account (HSA)
Vision and Dental
Life and AD&D Benefits
Short and Long-Term Disability
Hospital Indemnity, Accident, and Critical Illness Insurances
Optional Identity Theft and Legal Protection Services
Company Environment & Perks
Employee Referral Bonus Eligibility up to $10,000
Mobility Among Wyetech-supported Contracts
Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS
Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party.
Employees receive two complementary branded clothing orders annually.
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Affirmative Action Statement:
Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.
Accommodations:
Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact Brittney Wood. at 844-WYETECH x727 or ********************. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
Auto-ApplyIAM and Security Systems Analyst
Security engineer job in Washington, DC
About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection.
This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response.
Key Responsibilities
Identity & Access Management (IAM)
Manage and support identity platforms including Active Directory, Azure AD, and Okta.
Implement RBAC, least privilege principles, and automated provisioning/deprovisioning.
Conduct periodic access reviews and support access certification processes.
Integrate IAM controls into application and cloud environments.
Security Engineering & Tooling
Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools.
Manage SIEM tools including rule tuning, log ingestion, and correlation.
Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST).
Perform application security testing and contribute to threat modeling and risk evaluations.
Lead cloud control monitoring, data protection measures, and compliance reporting.
Threat Detection & Incident Response
Conduct analysis of security alerts and lead incident response efforts.
Leverage threat intelligence to update detection mechanisms and enhance response playbooks.
Perform root cause analysis and evidence handling following incidents.
Support red team/blue team exercises and penetration testing activities.
Architecture, Process & SDLC Integration
Review and evaluate system and application security architectures.
Support integration of security controls across the SDLC and DevSecOps pipelines.
Design and continuously improve security processes and documentation.
Participate in security metrics and reporting efforts to track control effectiveness.
Support SOC design discussions and contribute to its operational maturity.
Collaboration & Compliance
Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives.
Assist with internal and external audits, control documentation, and evidence collection.
Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001.
Help run awareness training, phishing simulations, and risk assessments.
This is a hybrid
role
that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC.
Salary Range: $90,000-$110,000/annually
Required Qualifications
3-5 years of experience in a security engineering or analyst role
Strong experience with IAM platforms (Active Directory, Azure AD, Okta)
Proficient in SIEM platforms, incident response, and Microsoft security tools
Experience with automated security testing tools (SAST, DAST)
Familiarity with cloud security (Microsoft 365, Azure) and application security principles
Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus)
Strong understanding of network protocols, system hardening, and endpoint defense
Excellent problem-solving and communication skills
Preferred Qualifications
Familiarity with red teaming, penetration testing, and threat modeling
Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001
Participation in SOC design or operations
Experience with security metrics/reporting and risk assessments
Why Join Us:
You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains.
#LI-HybridCOMPENSATION & BENEFITS:
Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process.
Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants.
Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year.
Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year)
** This is an exempt role (paid on a salaried basis). **
ORGANIZATION DESCRIPTION:
Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington.
Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission.
COMMITMENT TO DIVERSITY:
Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: ***************************************************************
Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially.
TO APPLY:
Please submit a thoughtful cover letter and resume through our website.
Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
Auto-ApplyChief Information Security Officer
Security engineer job in Washington, DC
Chief Information Security Officer (CISO)
The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.