Industrial Security Analyst ( Level 3 /4 )
Security engineer job in West Virginia
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Put your skills to the test by pushing the boundaries of what's possible. From global defense to sustainment and modernization to mission readiness, your experience and ability will make it a reality. Our programs are built on equal parts of curiosity and collaboration. Our combined efforts means that our customers can connect and defend millions of people around the world. With Northrop Grumman, you'll have the opportunity to be an essential part of projects that will define your career, now and in the future.
Northrop Grumman (NG) Defense Systems is seeking an Industrial Security Analyst level 3 or 4 for our Rocket Center, WV location.
This position will serve as a Contractor Special Access Program Security Officer (CSSO), alternate Facility Security Officer (FSO). The successful candidate will report directly to the Business Unit Security Manager and will be charged with providing critical program security support for Special Access Program (SAP) contracts/activities. The selected candidate will provide daily support efforts to include and not limited to personnel security clearance processing, document control and accountability, physical security support to badge inputs for personnel access as well as alarm maintenance and response. Knowledge of DD254 contractual specification document requirements and details associated with varying statement of works will be critical for program success and management of all administrative actions. Activities will also include program area self-inspections and supporting customer inspections for program areas. Corrective Action Plans (CAPs) must be generated, and actions monitored to ensure completion for any deficiencies noted in program areas. The candidate must effectively interface daily with the site Facility Security Officer (FSO), government and contractor customers, NG program management and other NG engineering and functional staff. This position will additionally serve as an alternate FSO and require collaborative team efforts with current security professional staff.
The candidate must have a high degree of problem-solving skills and the ability to work with minimal supervision and should have some degree of knowledge of multi-level security procedures. The candidate must possess the ability to adapt to constantly changing demands and demonstrate the capability to take on new and unfamiliar tasks. Requirement to make some independent decisions, analyze problems, and provide focused solutions to management is essential. The ideal candidate will be team-oriented and possess the ability to work with others collaboratively in a professional and high-energy environment. Some travel may be required to support off site activities and customer requirements.
Responsibilities:
Serve as the Contractor Special Access Program Security Officer (CSSO)
Serve as the Alternate Facility Security Officer (FSO)
Assist the COMSEC Account Manager, to include handling software management, use of Simple Key Loaders (SKLs), VIPER secure phones, KG-175 network encryptors and other CCI equipment as required/needed
Support to Physical Security (including combination changes and administration, working with contract security team, access control, intrusion detection and conducting on-boarding for new personnel)
Work as point of contact for alarms/response and works closely with the Enterprise Security Control Center (ESCC)
Support Business resiliency and contingency planning for the Crisis Management Team (CMT)
Support compliance of company and government Security regulations
Security database updates within the Security Information Management System (SIMS)
Access to DISS for clearance verification for SCI and/or SAP processing
Training development (specific to program needs/requirements)
Other duties as assigned
Principal Industrial Security Analyst (Level 3):
Basic Qualifications:
High school diploma and 8 plus years of SAP Security or FSO experience; or 5 plus years of SAP Security or FSO experience with a bachelor's degree; or 3 plus years SAP Security or FSO experience with a master's degree
Fully proficient and knowledgeable with the Department of Defense Manual 5205.07; 32 CFR Part 117 National Industrial Security Program Operating Manual (NISPOM)
Proficient in Communications Security (COMSEC) Manual NSA/CSS 3-16, Director of National Intelligence (DNI), Intelligence Community Directives (ICDs), program specific Program Security Directives (PSD) and associated corporate and government policies and directives
Organized and efficient with time management
Computer and desktop Microsoft Office software products experience (Word, Excel etc.)
Detail-oriented, have meticulous record-keeping, and be responsible for accurate data input into multiple databases/spreadsheets
Current DOD Secret clearance which has been adjudicated in the past 5 years
Must be able to obtain program access(es) required for the position within a reasonable period of time of hire
Senior Principal Industrial Security Analyst (Level 4):
Basic Qualifications:
High school diploma and 10 plus years of SAP Security or FSO experience; or 6 plus years of SAP Security or FSO with a bachelor's degree; or 4 plus years SAP Security or FSO experience with a master's degree
Fully proficient knowledge of a strong security program in compliance with the Department of Defense Manual 5205.07; 32 CFR Part 17 National Industrial Security Program Operating Manual (NISPOM)
Proficient in Communications Security (COMSEC) Manual NSA/CSS 3-16, Director of National Intelligence (DNI), Intelligence Community Directives (ICDs), program specific Program Security Directives (PSD) and associated corporate and government policies and directives
Organized and efficient with time management
Computer and desktop Microsoft Office software products experience (Word, Excel etc.)
Detail-oriented, have meticulous record-keeping, and be responsible for accurate data input into multiple databases/spreadsheets
Current DOD Secret clearance adjudicated within the past 5 years
Must be able to obtain program access(es) required for the position within a reasonable period of time of hire
Preferred Qualifications:
Self-starter with minimal supervision
ICD 704 eligibility in DISS
Experience/familiarity with ICD 705 requirements
Personnel and Program Security Experience
Ability to display tact, discretion, and diplomacy in a variety of program areas
Ability to excel in a fast-paced, deadline-driven environment
Excellent communication, speaking, writing, and organizational skills to enable effective communication
Experience with SIMS, DISS, and JADE
Counterintelligence, Insider Threat and OPSEC program experience
Current and working knowledge of the DoD and Intelligence Community
Current DOD Top Secret clearance adjudicated within the past 5 years
Primary Level Salary Range: $78,700.00 - $118,100.00Secondary Level Salary Range: $98,100.00 - $147,100.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyProduct Security Engineer, Instagram
Security engineer job in Charleston, WV
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Product Growth Hacker, Exchange
Security engineer job in Ansted, WV
Job DescriptionCrypto.com is on a mission to accelerate the world's transition to cryptocurrency. As we continue to scale our Exchange and Crypto.com App (spot trading) we're hiring a Growth Marketing Hacker to lead on our go-to-market strategy, lifecycle initiatives, and product positioning that fuel global user growth and engagement as we expand.
This role sits at the intersection of product, data, and creative execution: ideal for a strategic marketer who thrives in fast-paced, high-ownership environments. You'll work in close collaboration with product managers and growth to align feature rollouts, growth campaigns, and user insights into compelling narratives that resonate across geographies and user segments.
1. Strategy & Positioning- Partner up with product and strategy teams to own the roadmap for the Exchange vertical.- Develop value propositions that differentiate our platform in a competitive global market.- Partner with data, analytics and product to define user personas (e.g. retail traders, crypto newcomers, high-frequency traders) and map tailored journeys for each.- Lead on creative/copy positioning and brief submission for growth teams to deliver impactful and localized campaigns.- Work closely with product managers to align on roadmap priorities and customer feedback loops.
2. Launch Execution- Partner up with the product team to manage the go-to-market planning for feature launches.- Conceptualize integrated marketing campaigns across in-app, email, web, social, and earned media for UA to execute.- Partner with marketing, growth and product teams to ensure campaigns are timely, scalable, and data-informed.- Coordinate with local market teams and growth to adapt messaging for region-specific rollouts: localization across product messaging, local behavior and competitive landscape.
3. Customer Insights & Market Intelligence- Analyze market trends and conduct competitive benchmarking to identify opportunities and threats.-Run user interviews, feedback loops, and surveys to understand pain points and improve UX/messaging.- Feed findings back into product and growth teams to inform prioritization and positioning.
4. Growth & Retention- Design lifecycle programs that drive user activation, trading volume, and long-term retention.- Conceptualize promotions, streaks, and incentive programs that reward engagement and boost retention.- Work with data, analytics and product teams to identify drop-off points and optimize onboarding and reactivation flows.
5. Performance & Reporting- Work with Growth and Product to define KPIs across funnel metrics, retention, and campaign impact.- Report using tools like GA4, Tableau, Mix panel: work closely with analytics and product to iterate quickly.
Requirements
3 to 5 years of experience in product marketing: ideally crypto background
Proven success launching and scaling B2C products or platforms and growing adoption and revenue sustainably
Excellent communication and copywriting skills: you can simplify complex ideas and tell stories that convert
Highly collaborative, with experience working cross-functionally in fast-paced environments. Bias to action
Analytical mindset with proficiency in marketing analytics and user research
Experience in regulated industries or financial services is a plus
Bonus: Crypto native or familiarity with community-led growth
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
We may use artificial intelligence tools to analyze the content of your Resume/CV against the specific requirements for the position. The purpose is to support our recruitment team in reviewing applications more effectively. These tools assist our recruitment team in their evaluation of your application by providing recommendations, but they do not replace human judgment. Final hiring decisions are ultimately made by humans who consider the insights generated by the tools along with other relevant information. If you would like more details about how your personal information is processed, please contact us.
Easy ApplySR. CYBER DEFENSE ANALYST
Security engineer job in Martinsburg, WV
JOB TYPE: Full-time
WORK LOCATION: Onsite in Martinsburg, WV. Candidates must reside in WV to be considered for this position.
ABOUT: QMS Consulting (QMS) is an Education Technology (EdTech) and Information Technology (IT) Consulting firm specializing in Cybersecurity / Data Protection, Cloud Lifecycle, Software Development and Data Science. QMS seeks a cybersecurity specialist to work within a dynamic and highly innovative security operations center team that supports federal government customers. The Senior Cyber Defense Analyst will serve as a vital leader in the design, development, and operations of advanced cybersecurity monitoring and detection.
In this role, you should be technically sound, detail oriented with the ability to lead tasks and ensure high-quality service delivery. Critical thinking and problem-solving skills are essential for this position.
JOB RESPONSIBILITIES: Sr. Cyber Defense Analyst responsibilities include:
Configure monitoring tools to detect threat actor techniques and/or behavioral indicators
Craft custom search queries using Splunk (SPL), as well as Microsoft Defender for Endpoint and Microsoft Sentinel (KQL)
Provide subject matter expertise to support security detections in one of the following areas:
Cloud technologies. SaaS, Identity and access management. Networking, Splunk and EDR
Map security detections to the MITRE ATT&CK Framework
Research and develop configuration recommendations to facilitate operationalization of new data sources for detection of adversarial activities
Use machine learning and pattern analysis to improve detection of specific types of threats
Collaborate effectively with cross-functional teams, including incident response, forensics, threat intelligence, IT, and network administrators
Clearly communicate technical information and detection-related updates to management and stakeholders
Develop and operationalize advanced security analytics to detect and respond to sophisticated cyber threats in near real-time
Develop and implement detection feedback processes - e.g., tuning false positives, decommissioning, etc.
Ensure completeness and consistency regarding data quality of detections
Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy
Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate detection and incident response, including enrichment, containment, and remediation actions
Support the operationalization of new security detections, including building reference documentation, investigation guidelines, and tuning considerations
Stay informed about the latest cybersecurity threats, trends, and best practices
Actively participate in cybersecurity exercises, drills, and simulations to improve incident response understanding
This list of responsibilities may not be all-inclusive and can be expanded to include other duties or responsibilities as required by the business.
QUALIFICATIONS AND REQUIRED EXPERIENCE: Sr. Cyber Defense Analyst requirements include:
8+ years of experience supporting large-scale IT related projects
4+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)
A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure the SOC operates effectively in a high-pressure environment
Strong experience with security technologies including SIEM, IDS/IPS, EDR, and network monitoring tools
Experience with security focused cloud-native tooling such as Azure Sentinel and AWS GuardDuty
Experience with enterprise ticketing systems like ServiceNow
Excellent analytical and problem-solving skills
Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight
Ability to function in multiple capacities and learn quickly
Strong verbal and written communication skills
Bachelor's degree in computer science, cybersecurity, information technology, or a related field (or equivalent work experience)
The following GIAC certifications are preferred: GCFE and/or GCIH
One of the following GIAC, Microsoft and Splunk certifications are acceptable: GLCD, GCDA, Microsoft Identity and Access Administrator Associate, Microsoft Security Operations Analyst, Microsoft Endpoint Administrator Associate and Splunk Power User
SALARY:
$100,000 - $117,000
BENEFITS: health benefits, holidays and PTO
We are an equal opportunity employer. Our policy is to always provide equal opportunity without regard to race, color, religion, sex, pregnancy, national origin, ancestry, age, marital status, sexual orientation, family responsibility, physical or mental disability, medication, or status as a veteran.
Cyber Security Analyst
Security engineer job in Clarksburg, WV
The Cyber Security Analyst supports a federal agency in monitoring networks for breaches, leading incident response, performing risk and vulnerability assessments, and develop and implement security policies and best practices. The Cyber Security Analyst analyzes security data from sources like SIEMs and firewalls, coordinating with other teams on compliance issues, and recommending security enhancements to safeguard confidentiality, integrity, and availability to meet the needs and support the missions of the agency.
Required Responsibilities/Duties:
Lead the investigation, containment, and remediation of security incidents.
Perform risk assessments, analyze vulnerabilities using Tenable Nessus, and coordinate remediation activities
Monitor networks for security breaches, analyze logs from various sources (e.g., firewalls, SIEMs), and look for indicators of compromise.
Create and improve security standards, best practices, incident response plans, and disaster recovery plans.
Prepare reports on security metrics, attempted attacks, and breaches. Communicate findings and risks to stakeholders and management.
Maintain and administer security tools like firewalls and intrusion detection systems. May assist with tuning and testing detection rules.
Identifies potential areas of information security compliance vulnerability and risk, develops and implements corrective action plans for resolution of problematic issues, and provides general guidance on how to avoid or deal with similar situations in the future.
Develops and periodically reviews and updates information security policies, procedures, and associated documentation to ensure continuing currency and relevance in providing guidance to management and employees regarding regulatory compliance.
Provides reports on a regular basis, and as directed or requested, to keep customer stakeholders informed of the operation and progress of compliance efforts.
Acts as an independent reviewer and evaluator to ensure that compliance issues and concerns within the institution are being appropriately evaluated, investigated, and resolved.
Communicates the results of risk assessments to stakeholders in non-technical terms so effective decisions can be made to ensure the safety and security of data subject to government regulation.
Executes responsibilities outlined in the Information Security Incident Response Plan to appropriately contain, investigate, remediate, and report information security incidents.
Qualification
Active Top-Secret clearance with capability to obtain SCI/CI Poly if needed to meet contract requirements.
Bachelors and/or Master's degree in Computer Science, Management Information Systems, or related computer science technical degree
CompTIA Security+ or higher certification
2 years of relevant experience with the following:
Vulnerability scanning tools (specifically Tenable Nessus)
Tenable administration
About E-INFOSOL
E-INFOSOL is a Service Disabled and Veteran Owned Small Business (SDVOSB) located in the Washington, D.C. metropolitan area. We specialize in building modern and tailored solutions to support our customers' mission. As a mission-first organization, we deliver Subject Matter Expertise (SME) in cloud computing, virtualization, cyber security, software development and data services. We support the Intelligence Community, Department of Defense, Federal Law Enforcement, Civilian Agencies and the Private Sector.
Through strategic partnerships with top industry players such as Amazon Web Services (AWS), VMware, Microsoft and Nutanix, E-INFOSOL provide an array of IT products and solutions. Combined with our industry expertise, we deliver in-depth knowledge on Government requirements and fully understand NIST and DoD security requirements. Our expertise in the latest technologies combined with our understanding of infrastructure needs and security requirements provides the best combination for achieving innovative and secure environments for Government Agencies and Private Sector.
Career Growth
“Putting People First, Achieving our Mission Together”. E-INFOSOL is a people-first organization focusing on a positive employee culture that inspires creativity and innovation in support of our customers. With opportunities such as reimbursement and bonuses based on completion of certifications, we invest in our employees' career growth.
Benefits
Medical - 100% company paid premiums for employees with dependent options.
Dental and Vision
Retirement Savings (401k) up to 4% match
Health Savings Account (HSA), FSA and DCFSA
Company-paid Short/Long-term disability (w/ additional supplemental options)
Company-paid Life and AD&D (w/ additional supplemental options)
Generous Paid Time Off and ALL 11 Federal Holidays
Legal and Identity Protection Services
Bonuses for certifications and reimbursement
Employee Perks:
UberOne, Company Outings (Sporting events, Happy Hours, etc.), Discounts on services including Pet Insurance
Company Awards
SBA 8(a) Certified
SDVOSB
GSA Contract Holder
Inc. 5000
Equal Employment Opportunity Policy
E-INFOSOL LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Website: E-INFOSOL.com
Auto-ApplySecurity Engineer, Senior
Security engineer job in Clarksburg, WV
Trilogy Innovations is seeking Security, Sr. to remotely support our federal customer. This is an exciting opportunity to join our growing team, while taking part in a multi-year initiative to modernize our federal customer's large-scale IT systems.
This role requires at least a Secret Security Clearance, and primary work location is remote.
Responsibilities
Performs security audits, risk analysis, application-level vulnerability testing, and security code reviews.
Develops and implements technical solutions to help mitigate security vulnerabilities.
Conducts research to identify new attack vectors.
Requirements
Bachelor's Degree with 8 years of work experience.
Active Tier 3 Secret clearance.
5+ years of experience performing security audits, risk analysis, application-level vulnerability testing, and security code reviews.
5+ years of experience developing and implementing technical solution to help mitigate security vulnerabilities.
Experience working with in the Agile Methodology.
Experience in a cloud native architecture.
Experience working in a Kafka infrastructure.
Trilogy Innovations, Inc. is a minority-owned (8a) certified systems and software engineering company that delivers superior technical solutions across private and public sectors. Since 2010, our talented personnel have successfully provided Innovative IT solutions across government agencies and private industries.
Trilogy Innovations, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Auto-ApplyCyber Incident Response Tier III Analyst
Security engineer job in Martinsburg, WV
PingWind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX. Required Clearance: Ability to obtain Tier 4 / High Risk Background Investigation
Certifications: Must currently have or be willing to obtain one of the following certifications (or equivalent):• GIAC Certified Incident Handler• EC-Council's Certified Incident Handler (ECIH)• GIAC Certified Incident Handler (GCIH)• Incident Handling & Response Professional (IHRP)• Certified Computer Security Incident Handler (CSIH)• Certified Incident Handling Engineer (CIHE)• EC-Council's Certified Ethical Hacker
Required Education
• Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)
Required Experience:
• 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) Responsibilities
• In-depth forensics and root cause analysis for alerts and incidents• Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations and or appropriate next steps.• Perform post incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.• Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents.• Updating playbooks based on findings of the incident trends and outcomes of auditing tasks.• Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time• Create dashboards/reports based on these trends or searches to provide clarity of information being defined.• Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings.• Support mentoring and training of junior analysts on alerts, playbooks, and tools.• Stay informed of latest cybersecurity threats and best practices.• Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR• Make accurate determination of what alerts are false positives or require further investigation and prioritization • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences• Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks• Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders• Identify and action opportunities for tuning alerts to make the incident response team more efficient • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy• Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions• Support the mentoring and training of more junior IR staff• Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
Requirements
• Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM• A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment• Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools• Experience with enterprise ticketing systems like ServiceNow• Excellent analytical and problem-solving skills• Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight• Ability to learn and function in multiple capacities and learn quickly• Strong verbal and written communication skills
Preferred Qualifications
• Ability to investigate Indicators of Compromise (IOCs) using Splunk by correlating logs from multiple sources to detect, trace, and assess threat activity across the enterprise• Experience leveraging Microsoft Defender for Endpoint (MDE) to perform endpoint investigations, analyze process trees, and validate IOCs during active threat scenarios• Ability to remediate phishing incidents, including analysis of email headers, links, and attachments, identifying impacted users, and executing containment actions such as user lockouts, email quarantine, and domain blacklisting• Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program • through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
Auto-ApplyEngineer, Information Security and Risk
Security engineer job in Charleston, WV
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer II
Security engineer job in Charleston, WV
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Senior Security Engineer
Security engineer job in Clarksburg, WV
Job Description
Who is Fusion Technology?
Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.
Position Location: Clarksburg, WV (onsite required)
Who are you?
Security-cleared Professional: You have made it through the process of receiving a United States government security clearance - congratulations! We know you are a trustworthy intel professional because you have a TS/SCI Clearance.
Education and Experience: Minimum of a Bachelor's Degree from an accredited college or university in a related field. 8+ years of cybersecurity experience, with 3+ years in a cloud security role. Deep knowledge of cloud security across cloud environments. Expertise in security architecture, network defense, data protection, and threat modeling. Demonstrated experience in incident response, log correlation, and risk assessments. Strong communication and leadership skills; capable of briefing executives and managing cross-functional security efforts.
Certifications: CISSP, CCSP, AWS Security, or GCIH strongly preferred.
What you'll do:
The Senior Security Engineer leads the design, development, and operations of secure cloud platforms. This position is responsible for advanced threat detection, incident response planning, cyber resiliency strategy, and compliance with enterprise and federal security standards. The engineer acts as a subject matter expert and collaborates across teams and with external partners to protect mission-critical applications and infrastructure.
Leads the development of enterprise-wide cloud security policies, incident response plans, and cyber resiliency strategies.
Designs, implements, and continuously improves secure cloud-based architectures and monitoring systems.
Analyzes complex security data to detect, remediate, and prevent cyber threats.
Guides platform and application teams on secure coding and architecture best practices.
Coordinates vulnerability management activities and provide actionable recommendations.
Represents the organization in coordination with industry and government security partners.
Oversees COMSEC operations and crypto key management systems (CKMS).
Ensures compliance with federal and industry standards, including NIST, CNSSI 4009, and DoD policies.
Mentors' junior engineers and lead security-related projects from concept to deployment.
What matters to you matters to us.
Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, a comprehensive healthcare plan through Cigna, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training.
Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills, and experiences within our workforce. Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.
Senior Information Security Specialist
Security engineer job in Clarksburg, WV
Tygart is seeking a Senior Information Security Specialist to support a DOJ office in Clarksburg, WV. This position supports the continuous assessment and improvement of information system security throughout the full system lifecycle. The ideal candidate must possess a current a Top-Secret clearance.
Key Responsibilities:
Review of information systems to ensure that the management, operational, personnel, and technical controls are functioning effectively during all phases of the system lifecycle
Identifying and evaluating technical and operational security risks, threats, weaknesses, and vulnerabilities associated with information systems
Information system compliance with government standards and industry best practices, including:
NIST OWASP Common Criteria DISA SANS Institute
Qualifications:
Active Top Secret (TS) Security Clearance (required).
Minimum 6 years of experience in Information Security
Experience working in Agile development environments
Experien with Information security practices within the federal and/or state governments
Experience utilizing Splunk for audit log review and system alerting
Previous hands-on technical experience in Networking System Administration Development
Strong understanding of security controls, system lifecycle management, and vulnerability management.
Preferred Qualifications:
Bachelor's Degree in Computer Science, Cybersecurity, Information Technology, or related field.
CompTIA Security+ (or equivalent)
Why Join Tygart Technology? At Tygart Technology, we value innovation, integrity, and technical excellence. You'll join a team of dedicated professionals who deliver mission-critical solutions to our government partners. We offer competitive compensation, benefits, and the opportunity to grow your career while supporting impactful work.
Tygart Technology, Inc. is a premier professional services and software development organization providing a broad range of Information Technology (IT) services to public and commercial sector customers. Founded in 1992, Tygart's customer first mind set and agile development methodology have led to our continued success. Tygart supports the Department of Defense, Federal Bureau of Investigation, Intelligence Community, Federal Election Commission, Pension Benefit Guaranty Corporation, and various other Federal and State organizations and maintains offices in West Virginia and Northern Virginia.
Tygart Technology is an equal opportunity employer. We do not discriminate in employment decisions based on race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected status under applicable federal, state, or local law. We are dedicated to providing a work environment where all individuals are respected and their contributions are valued.
For information on Tygart and our career openings, please visit *******************************
Detection & Response Security Engineer, Threat Intelligence
Security engineer job in Charleston, WV
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Security Engineer, Senior
Security engineer job in Clarksburg, WV
Trilogy Innovations is seeking Security, Sr. to remotely support our federal customer. This is an exciting opportunity to join our growing team, while taking part in a multi-year initiative to modernize our federal customer's large-scale IT systems. This role requires at least a Secret Security Clearance, and primary work location is remote.
Responsibilities
* Performs security audits, risk analysis, application-level vulnerability testing, and security code reviews.
* Develops and implements technical solutions to help mitigate security vulnerabilities.
* Conducts research to identify new attack vectors.
* Supports mainframe with scanning and other security focused operational support responsibilities.
Requirements
* Bachelor's Degree with 8 years of work experience.
* Active Tier 3 Secret clearance.
* 5+ years of experience performing security audits, risk analysis, application-level vulnerability testing, and security code reviews.
* 5+ years of experience developing and implementing technical solution to help mitigate security vulnerabilities.
* Experience working with in the Agile Methodology.
* Experience in a cloud native architecture.
* Experience working in a Kafka infrastructure, preferred.
* Experience with container security in AWS.
* Building and maintaining secure CI/CD Pipelines.
* Strong understanding of federal security requirements.
Trilogy Innovations, Inc. is a minority-owned (8a) certified systems and software engineering company that delivers superior technical solutions across private and public sectors. Since 2010, our talented personnel have successfully provided Innovative IT solutions across government agencies and private industries.
Trilogy Innovations, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Cyber Incident Response Tier III Analyst
Security engineer job in Martinsburg, WV
Job DescriptionDescription PingWind is seeking a Cyber Incident Response Tier III Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX. Required Clearance: Ability to obtain Tier 4 / High Risk Background Investigation
Certifications: Must currently have or be willing to obtain one of the following certifications (or equivalent):• GIAC Certified Incident Handler• EC-Council's Certified Incident Handler (ECIH)• GIAC Certified Incident Handler (GCIH)• Incident Handling & Response Professional (IHRP)• Certified Computer Security Incident Handler (CSIH)• Certified Incident Handling Engineer (CIHE)• EC-Council's Certified Ethical Hacker
Required Education
• Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)
Required Experience:
• 5+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC) Responsibilities
• In-depth forensics and root cause analysis for alerts and incidents• Handling Tier 2 ticket escalations by performing forensic root cause analysis and delivering actionable remediation recommendations and or appropriate next steps.• Perform post incident analysis to ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.• Work with Watch Officers and Team Leads on a bridge to function as SME for major incidents.• Updating playbooks based on findings of the incident trends and outcomes of auditing tasks.• Develop and operationalize advanced security analytic use cases to detect and respond to sophisticated cyber threats in real-time• Create dashboards/reports based on these trends or searches to provide clarity of information being defined.• Interface with the Cyber Detection Analytics (CDA) Team to recommend tuning based on findings.• Support mentoring and training of junior analysts on alerts, playbooks, and tools.• Stay informed of latest cybersecurity threats and best practices.• Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR• Make accurate determination of what alerts are false positives or require further investigation and prioritization • Lead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents. Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrences• Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks• Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholders• Identify and action opportunities for tuning alerts to make the incident response team more efficient • Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy• Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions• Support the mentoring and training of more junior IR staff• Stay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilities
Requirements
• Work 100% on-site Tuesday through Saturday from 3:00 PM to 11:00 PM• A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment• Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring tools• Experience with enterprise ticketing systems like ServiceNow• Excellent analytical and problem-solving skills• Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight• Ability to learn and function in multiple capacities and learn quickly• Strong verbal and written communication skills
Preferred Qualifications
• Ability to investigate Indicators of Compromise (IOCs) using Splunk by correlating logs from multiple sources to detect, trace, and assess threat activity across the enterprise• Experience leveraging Microsoft Defender for Endpoint (MDE) to perform endpoint investigations, analyze process trees, and validate IOCs during active threat scenarios• Ability to remediate phishing incidents, including analysis of email headers, links, and attachments, identifying impacted users, and executing containment actions such as user lockouts, email quarantine, and domain blacklisting• Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program • through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Engineer, Information Security and Risk
Security engineer job in Charleston, WV
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Specialist
Security engineer job in Clarksburg, WV
Tygart is seeking an Information Security Specialist to support a DOJ office in Clarksburg, WV. This position supports the continuous assessment and improvement of information system security throughout the full system lifecycle. The ideal candidate must possess a current a Top-Secret clearance.
Key Responsibilities:
* Review of information systems to ensure that the management, operational, personnel, and technical controls are functioning effectively during all phases of the system lifecycle
* Identifying and evaluating technical and operational security risks, threats, weaknesses, and vulnerabilities associated with information systems
* Information system compliance with government standards and industry best practices, including:
* NIST OWASP Common Criteria DISA SANS Institute
Qualifications:
* Active Top Secret (TS) Security Clearance (required).
* Minimum 4 years of experience in Information Security
* Experience working in Agile development environments
* Experien with Information security practices within the federal and/or state governments
* Experience utilizing Splunk for audit log review and system alerting
* Previous hands-on technical experience in Networking System Administration Development
* Strong understanding of security controls, system lifecycle management, and vulnerability management.
Preferred Qualifications:
* Associates Degree
* CompTIA Security+ (or equivalent)
Why Join Tygart Technology? At Tygart Technology, we value innovation, integrity, and technical excellence. You'll join a team of dedicated professionals who deliver mission-critical solutions to our government partners. We offer competitive compensation, benefits, and the opportunity to grow your career while supporting impactful work.
Tygart Technology, Inc. is a premier professional services and software development organization providing a broad range of Information Technology (IT) services to public and commercial sector customers. Founded in 1992, Tygart's customer first mind set and agile development methodology have led to our continued success. Tygart supports the Department of Defense, Federal Bureau of Investigation, Intelligence Community, Federal Election Commission, Pension Benefit Guaranty Corporation, and various other Federal and State organizations and maintains offices in West Virginia and Northern Virginia.
Tygart Technology is an equal opportunity employer. We do not discriminate in employment decisions based on race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected status under applicable federal, state, or local law. We are dedicated to providing a work environment where all individuals are respected and their contributions are valued.
For information on Tygart and our career openings, please visit *******************************
Product Security Engineer, AI
Security engineer job in Charleston, WV
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Security engineer job in Charleston, WV
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer, Senior
Security engineer job in Bridgeport, WV
Job Description
Trilogy Innovations is seeking Security, Sr. to remotely support our federal customer. This is an exciting opportunity to join our growing team, while taking part in a multi-year initiative to modernize our federal customer's large-scale IT systems.
This role requires at least a Secret Security Clearance, and primary work location is remote.
Responsibilities
Performs security audits, risk analysis, application-level vulnerability testing, and security code reviews.
Develops and implements technical solutions to help mitigate security vulnerabilities.
Conducts research to identify new attack vectors.
Supports mainframe with scanning and other security focused operational support responsibilities.
Requirements
Bachelor's Degree with 8 years of work experience.
Active Tier 3 Secret clearance.
5+ years of experience performing security audits, risk analysis, application-level vulnerability testing, and security code reviews.
5+ years of experience developing and implementing technical solution to help mitigate security vulnerabilities.
Experience working with in the Agile Methodology.
Experience in a cloud native architecture.
Experience working in a Kafka infrastructure, preferred.
Experience with container security in AWS.
Building and maintaining secure CI/CD Pipelines.
Strong understanding of federal security requirements.
Trilogy Innovations, Inc. is a minority-owned (8a) certified systems and software engineering company that delivers superior technical solutions across private and public sectors. Since 2010, our talented personnel have successfully provided Innovative IT solutions across government agencies and private industries.
Trilogy Innovations, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
Senior Information Systems Security Engineer
Security engineer job in Clarksburg, WV
Tygart is seeking a Senior Information Systems Security Engineer to support a DOJ office in Clarksburg, WV. The ideal candidate must possess a current a Top-Secret clearance. The Senior Information Systems Security Engineer will be responsible for briefing diverse audiences on technical matters and conveying information clearly and concisely. This role requires experience preparing written reports and oral presentations for designed projects, tailored for presentation to a variety of individuals within and outside the organization.
Job Description:
Demonstrated ability to brief diverse audiences on technical matters and convey information clearly and concisely
Experience preparing written reports and oral presentations for designed projects for presentation to a variety of individuals within and outside the organization
Expert-level understanding of Cloud Security Providers (CSP) and secure engineering and design of cloud-based solutions via automation
Experience and working knowledge of security for cloud technologies and services, specifically AWS and Microsoft Azure
Expert-level experience and knowledge of government security standards and industry best practices, including the NIST Risk Management Framework (RMF) and NIST security and privacy controls
Experience conducting industry research to create detailed reports, whitepapers, and technical comparisons
Working knowledge of agile development methodology, specifically including:
Scaled Agile Framework (SAFe)
Lean systems development
Continuous Integration/Continuous Deployment (CI/CD) methodology
Significant hands-on experience implementing, operating, and maintaining infrastructure and applications
Experience working within diverse teams of architects, developers, and integrators
Experience leading or co-leading technology projects with enterprise dependencies
Experience developing, maintaining, and revising policies and guidelines relating to information security
A minimum of 10 years of experience (required)
Active Top Secret (TS) Security Clearance (required).
Preferred Qualifications:
Master's Degree in Computer Science, Cybersecurity, Information Technology, or related field.
Certified Information Systems Security Professional (CISSP),
Cloud Certification
Why Join Tygart Technology? At Tygart Technology, we value innovation, integrity, and technical excellence. You'll join a team of dedicated professionals who deliver mission-critical solutions to our government partners. We offer competitive compensation, benefits, and the opportunity to grow your career while supporting impactful work.
Tygart Technology, Inc. is a premier professional services and software development organization providing a broad range of Information Technology (IT) services to public and commercial sector customers. Founded in 1992, Tygart's customer first mind set and agile development methodology have led to our continued success. Tygart supports the Department of Defense, Federal Bureau of Investigation, Intelligence Community, Federal Election Commission, Pension Benefit Guaranty Corporation, and various other Federal and State organizations and maintains offices in West Virginia and Northern Virginia.
Tygart Technology is an equal opportunity employer. We do not discriminate in employment decisions based on race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected status under applicable federal, state, or local law. We are dedicated to providing a work environment where all individuals are respected and their contributions are valued.
For information on Tygart and our career openings, please visit *******************************