Job Title: Control Systems CybersecuritySpecialist Responsibilities of the Control Systems CybersecuritySpecialist: EDC Consulting LLC (EDC) is seeking a highly skilled Control Systems CybersecuritySpecialist with expertise in operational technology (OT) integration, control systems, and cybersecurity to join our … team. As a Control Systems CybersecuritySpecialist, you will play a pivotal role in supporting the US Air Force's control systems cybersecurity initiatives by developing policies, guidance, and programmatic documents. You will collaborate with cross-functional teams and stakeholders to provide analysis, recommendations, and oversight … for control systems governance and cybersecurity processes. The Control Systems CybersecuritySpecialist will: Coordinate, consolidate, and maintain control systems governance and programmatic documents. Develop action plan recommendations, task responses, and inquiry responses. Perform analysis and provide recommendations for control systems cybersecurity, including Industrial Control Systems More ❯
We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking CybersecuritySpecialist with the below skillset. CybersecuritySpecialist Fulltime with Karthik Consulting Location: National Capital Region (Local Area telework … or 2 days in the office) Clearance: TS/SCI Clearance Position Description CybersecuritySpecialist Purpose: The Air Force ISR Digital Infrastructure Transformation paves the way for intelligence analysts to securely harness the latest technological advancements. It is orchestrated through Data and Analytics, Sense Making/Automation … Augmentation and AI (AAA), Networks, Hybrid and Multi-Cloud, Enterprise Services, and cybersecurity capabilities. This structure allows integration, synchronization, and coordination with the Intelligence IC, Department of Defense (DoD), and commercial partners. The AF IC's ability to advance its digital infrastructure transformation and deliver intelligence at the speed More ❯
CybersecuritySpecialist II/III Full Time, Ft. Belvoir, VA Secret clearance required This position is contingent upon contract award Overview: Semper Valens Solutions is seeking an experienced CybersecuritySpecialist to support our organization in the Ft. Belvoir, VA area. Responsibilities: Level II: Serves … as subject matter expert for all cybersecurity/information technology aspects of assigned program. Performs top level system architecture related design, development, integration, testing, installation and troubleshooting. Translates military operational and mission requirements (ground, sea, air, and space) into practical systems concepts and design performance requirements. Participates in post … awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineering on assigned programs. Evaluates and conducts design efforts from a cybersecurity viewpoint to ensure integration of all required cybersecurity products and adequacy of the analyses Prepare and reviews cybersecurity related test More ❯
CybersecuritySpecialistCybersecurity, SME Wright Patterson Air Force Base Dayton, Ohio HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman … owned company with locations nationwide. HX5 is currently seeking a CybersecuritySpecialist in support of the Mobility Directorate at Wright-Patterson Air Force Base in Dayton, Ohio. Essential Duties and Responsibilities: Assist the Information Systems Security Manager (ISSM) and provide multi-discipline expertise covering project management, system … most current revision of the Security Directives applicable to Platform Information Technology (PIT), PITI and non-PIT systems being supported. ( These include DoDI 8500.01, Cybersecurity, DoDI 8510.01, RMF for DoD IT, JSIG, NIST 800-53, and directives/guidance identified in DoDI 5000.02.) Provide cybersecurity support to assigned More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Sawdey Solution Services Inc
Location: Fort Belvoir, VA Telework/Work-from-Home Authorized: Yes - When Authorized/Hybrid About the Role: This position will function as a cybersecurityspecialist and subject matter expert (SME) providing Advisory & Assistance Services (A&AS) support for the Defense Threat Reduction Agency (DTRA), Cooperative Threat … threat to the U.S. and its allies from WMD and related materials, technologies, and expertise, including associated delivery systems and infrastructure. The A&AS CybersecuritySpecialist position will be a critical component of the integrated team approach to tackling the challenges associated with this mission. This position … will be one of several cybersecurity SMEs working on a dedicated cybersecurity team supporting the CTR mission. As a member of the A&AS CTR cybersecurity team, you will have the opportunity to contribute to and shape the way CTR engage with DTRA's foreign partners in More ❯
Position Summary Odyssey Systems is recruiting for a CybersecuritySpecialist IV. In this role, you will support PM Soldier Survivability (SSV), which is located at Ft. Belvoir, VA and Huntsville, AL. The support required under this effort includes engineering, quality assurance and test support, acquisition support, business … Product Offices in PM SSV. Contingent upon contract award Responsibilities Duties include, but are not limited to: Serves as subject matter expert for all cybersecurity/information technology aspects of assigned program. Performs top-level system architecture-related design, development, integration, testing, installation, and troubleshooting. Translates military operational and … sea, air, and space) into practical systems concepts and design performance requirements. Participates in post awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineer on assigned programs. Evaluate and conduct design efforts from a cybersecurity viewpoint to ensure integration of all required More ❯
Description POSITION TITLE: CybersecuritySpecialist -Mid LCAT/POSITION #: Enterprise Risk Reporting DEPT/CONTRACT: Enterprise Cybersecurity Risk Tracking & Reporting/RMF CLEARANCE LEVEL: Secret REPORTING TO: _ Project Manager LOCATION: National Capital Region/DC Metropolitan area WORK SCHEDULE/HOURS: 40 hrs/week … JOB DUTIES: Create and maintain dashboards and reports for all necessary cybersecurity functions utilizing CDM dashboard, Splunk, Crystal Reports, PowerBI or other authorized platforms. Create a draft and final cybersecurity report by coordinating, consolidating and collecting the data and reports from multiple sources (for example, SERR, Cyber Hygiene … . Create component quarterly specific trending Scorecard. Generate quarterly and annual trending of DHS performance in the measured metrics. Generate draft and final monthly Cybersecurity Scorecards of HQ components and the Department as defined by the annual DHS ISPP from data resident in the DHS databases and other sources. More ❯
As we continue to grow at a rapid pace, we need some amazing new recruits to join our team. We are seeking an experienced CybersecuritySpecialist II to primarily support our contingent, based on award, upcoming program. If you are a strategic thinker with a passion for … level, Level II Clearance Required for this role: Secret Requirements: Bachelors Degree 5 years of experience Responsibilities: Serves as subject matter expert for all cybersecurity/information technology aspects of assigned program. - Performs top level system architecture related design, development, integration, testing, installation and troubleshooting. Translates military operational and … sea, air, and space) into practical systems concepts and design performance requirements. Participates in post awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineering on assigned programs. Evaluates and conducts design efforts from a cybersecurity view point to ensure integration of all More ❯
Responsibilities PeopleTec is currently seeking a CybersecuritySpecialist Advanced to support our Huntsville, AL location. Serving as a recognized expert in developing strategies, policies, and programs related to cyberspace operations in the Area of Responsibility (AOR). Compiling, editing, coordinating, and updating cybersecurity strategies, policies, directives … and guidance to implement cybersecurity operational requirements within the Enterprise Mission Assurance Support Service. Advising senior leadership of cybersecurity challenges, issues, and opportunities for improvements. Advises supervisory personnel on matters related to analysis, audit, and remediation for the protection of Missile Defense Agency information and resources. Senior level … Framework (RMF) techniques, policies, and procedures. Identifies threats and vulnerabilities of computer system(s) and developing Plans of Action and Milestones (POA&Ms). CybersecuritySpecialist is responsible for executing the following essential functions in support of contract mission. Essential Functions: Applies knowledge of Cyber policy, procedures More ❯
Overview We are seeking a highly skilled and detail-oriented CybersecuritySpecialist to join our team. The ideal candidate will be responsible for implementing and maintaining security measures to safeguard our organization's IT infrastructure, data, and networks from cyber threats. As a CybersecuritySpecialist … Education: Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). Proven experience (3+ years) as a CyberSecuritySpecialist or in a similar role. Strong understanding of security protocols, cryptography, firewalls, intrusion detection systems, and VPNs. Proficiency in security tools such as More ❯
Springfield, Virginia, United States Hybrid / WFH Options
Softek International Inc
Description POSITION TITLE: CybersecuritySpecialist Sr LCAT/POSITION #: Component Rist/Mgt/Compliance DEPT/CONTRACT: Component Services Risk Mgt & Compliance CLEARANCE LEVEL: Top Secret REPORTING TO: _ Project Manager LOCATION: Hybrid, SCIF, TSA Headquarters at 6595 Springfield Center Dr. Springfield, VA 22150_(National Capital … SETS/EDUCATION/CERTIFICATES: Bachelor Degree in Computer Science or related field CERTIFICATES: CISSP or CISM or CRISC or CSSP Requirements POSITION TITLE: CybersecuritySpecialist Sr LCAT/POSITION #: Component Rist/Mgt/Compliance DEPT/CONTRACT: Component Services Risk Mgt & Compliance CLEARANCE LEVEL More ❯
JRC is actively recruiting for a CybersecuritySpecialist-Advanced to assist in the assessment of the DoD current cyber policies, the coverage of those policies, and areas of risks. You will evaluate and audit how policies stack up to regulations, best practices, and industry standards. As you … client operates securely as they navigate an evolving IT environment. Join us as we protect the DoD through strategic cyber policy development. As a CybersecuritySpecialist - Advanced, you will Develop and monitors the implementation of policy and procedures to support information security goals and operations. Develop changes … Management (IAM) HS Diploma or GED minimum DoD 8570 Information Assurance Management (IAM-III) Certification Secret (Top Secret with SCI eligibility preferred) Knowledge of cybersecurity engineering, cyber forensics, network security tools and technologies, cybersecurity policy, procedures, and workforce structure to design, develop, and implement recommendations for a secure More ❯
JRC is actively recruiting for a CybersecuritySpecialist-Advanced to assist in the assessment of the DoD current cyber policies, the coverage of those policies, and areas of risks. You will evaluate and audit how policies stack up to regulations, best practices, and industry standards. As you … client operates securely as they navigate an evolving IT environment. Join us as we protect the DoD through strategic cyber policy development. As a CybersecuritySpecialist - Advanced, you will Develop and monitors the implementation of policy and procedures to support information security goals and operations. Develop changes … Management (IAM) HS Diploma or GED minimum DoD 8570 Information Assurance Management (IAM-III) Certification Secret (Top Secret with SCI eligibility preferred) Knowledge of cybersecurity engineering, cyber forensics, network security tools and technologies, cybersecurity policy, procedures, and workforce structure to design, develop, and implement recommendations for a secure More ❯
accrual, professional development reimbursement, corporate-funded technology certifications, and robust employee recognition and appreciation programs. Position Overview: We are seeking a highly skilled Senior CybersecuritySpecialist to support a critical cybersecurity program. The ideal candidate will provide subject matter expertise in cybersecurity compliance, FISMA data … collection and analysis, and risk assessments while ensuring adherence to federal security standards. Key Responsibilities: Serve as a technical subject matter expert (SME) for cybersecurity programs, focusing on FISMA compliance, data analysis, and Cyberscope reporting. Apply principles and methodologies to develop solutions for complex cybersecurity challenges, ensuring compliance … with FISMA, NIST, OMB, and other regulatory frameworks. Plan, develop, and review key cybersecurity program deliverables, including risk assessments, security categorization documents, contingency plans, and vulnerability assessment reports. Engage with stakeholders across technical, administrative, and executive teams to gather system requirements and provide security recommendations. Map complex technical requirements More ❯
As we continue to grow at a rapid pace, we need some amazing new recruits to join our team. We are seeking an experienced CybersecuritySpecialist III to primarily support our contingent, based on award, upcoming program. If you are a strategic thinker with a passion for … successful implementation of associated security controls and reviews all RMF documentation packages, and system fielding, operations, or upgrade requirements Assist Program Management Offices with Cybersecurity related Acquisition documentation requirements (i.e. Cybersecurity Strategies) and statutory/regulatory/policy compliance. Coordinate integration of Cybersecurity, COMSEC, and TEMPEST into … the entire system life-cycle design, development, and deployment. Support maintenance of DOD Inspector General (IG) Cybersecurity Self-Assessment checklist compliance and Federal Information Security Management Act (FISMA) Implement audit measures to ensure compliance with regulatory requirements, participate in organizational inspections and surveys of computer systems, provide inspection results More ❯
CyberSecuritySpecialist Flexible location - Glasgow, Ipswich, London, Northampton or Selby Permanent, full-time Closing date: Monday 12th May 2025 Who we are We're committed to making a difference by generating dispatchable, renewable power and creating stable energy in an uncertain world. Building on our heritage, we … carbon, lower-cost energy future for all and are dedicated to decarbonising the planet for future generations. About the role As a CyberSecuritySpecialist, you'll be responsible for designing, developing, and maintaining cybersecurity products. This involves working closely with cross-functional teams to ensure products … breaches. Monitoring systems and networks for intrusions and unusual activity. Staying updated on security developments and emerging threats. Product Development & Support Designing and developing cybersecurity products, including software and hardware solutions. Participating in product implementation, installations, and migrations. Installing, configuring, and upgrading cybersecurity products. Monitoring compliance with securityMore ❯
CybersecuritySpecialist Senior Level(Key Person Task Area Lead) Task Area 6: Component Risk Management and Compliance/Senior Risk Analyst Certification Required: CISSP or CISM or CSSP or CAP Security Clearance Required: Top Secret Required Years of Experience: 8 Job Location: Currently remote due to COVID … Federal POA&M Lead. Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify trends and anomalies cybersecurity performance and mitigation of risk. Provide research and development support of data analytic and data management technologies including those associated with collecting, analyzing, parsing More ❯
large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking a CybersecuritySpecialist 2 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be … system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products to ensure secure reliable and uninterrupted availability of the Sponsor's developed and deployed … information; ACTIVE TS/SCI w/POLY REQUIRED Education: 0+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity 2+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 6+ Years of Experience with an Associate's More ❯
work with our government customers in defense and civilian agencies to identify new technologies. The Opportunity: NexTech Solutions (NTS) is actively seeking an Offensive CybersecuritySpecialist to join our team. As an Offensive CybersecuritySpecialist, you will conduct business intelligence activities, vulnerability assessments, company … and supporting technology stacks, utilizing tactics, techniques, and procedures (TTPs) and analysis of publicly available and commercially available information. Coordinate vendor engagements and develop cybersecurity questionnaires to discuss their security posture, current protocols, processes, and mitigation efforts. Write technical reports for stakeholders, documenting findings, risk analysis, and recommendations for … assessment methodology and TTPs. Work directly with the team to identify, develop, and deploy custom threat detection monitoring. Requirements: Education: Bachelor's degree in cybersecurity, computer science, or a related field, or equivalent work experience. Desired Certifications: eJPT, eCPPT, PNPT, GPEN, OSCP, cRTO. Experience: 5+ years of demonstrated securityMore ❯
large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking a CybersecuritySpecialist 4 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be … system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products to ensure secure reliable and uninterrupted availability of the Sponsor's developed and deployed … information; ACTIVE TS/SCI w/POLY REQUIRED Education: 5+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity 7+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 10+ Years of Experience with an Associate's More ❯
Phalanx Griffon (PG) is a top-priority, open-architecture airborne node that stitches warfighter data into the DAF BATTLE NETWORK. As Senior CybersecuritySpecialist, you will be the program's authority on securing Nomad hardware, Smith software, and Watch operations throughout Major Release 2 (FY … and cross-domain safeguards will decide when PG can fly-and fight-in contested environments. Essential Job Functions Cyber Strategy & Governance • Own the PG Cybersecurity Strategy, System Security Plan (SSP), and Plan of Action & Milestones (POA&M). • Align all efforts with NIST 800-53, CNSSI 1253, and Air … a DevSecOps, fail-fast mindset inside classified environments. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. B.S. in Cybersecurity, Computer Science, Information Systems, or related field (M.S. preferred) and 12 + years securing DoD or IC C4ISR/avionics systems; at least More ❯
SMX is seeking a Senior CybersecuritySpecialist in Norfolk, VA to join our growing team! Essential Duties & Responsibilities Collaborate with existing ISSO/ISSEs in completing A&A activities through RMF Step 3 Mitigate and/or remediate vulnerabilities or misconfigurations Provide documentation findings and severity levels … in RMF A&A support, extensive knowledge and hands on experience in developing and documenting processes and procedures used in various IT operations and cybersecurity plans and required A&A artifacts, such as: Access Control Plan (ACP) Configuration Management Plan (CMP) Information System Contingency Plan (ISCP) that can effectively … implementing applicable Computer Network Defense (CND) policies, regulations, and compliance guidance Knowledge of security plan management and validation CISSP Certification DISA HBSS Certification DoD Cybersecurity Workforce (CSWF) CSSP Analyst certification (ie, CEH, CCNA-Security) Navy Qualified Validator II Desired Skills and Experience Navy Qualified Validator III Application Deadline: May More ❯
Duties You will serve as an IT CybersecuritySpecialist (PLCYPLN-INFOSEC), GS-2210-13 responsible for managing IT projects and services. Being a Coast Guard civilian makes you a valuable member of the Coast Guard team. Typical work assignments include: Staying abreast of developments and new applications More ❯
updates. Draft DHS NSS Assessment, Compliance, and Policy Support Standard Operating Procedures and Playbooks Draft DHS RMF Processes and Procedures Provide Analysis Report from Cybersecurity Threats and Vulnerabilities Research (both OSINT and other sources) Assist with the development and maintenance of formal documented NSS Assessment and Compliance SOPs. SOPs … and track communications with executives and HQ components. Create and maintain forms, document templates and a register for CISOD forms and templates which support cybersecurity activities throughout the department. Prepare, track, and provide status reports on data calls. Develop, maintain, and update Standard Operating Procedures (SOPs), handbooks, ConOps and … Federal SMEs on processes and projects. Provide customer service support to DHS Enterprise by responding and resolving DHS Helpdesk tickets. Support modernization of all Cybersecurity processes and methodologies to be employed across the Enterprise and MGMT Collaborate/coordinate successfully with other contract vendors/Government personnel. Respond to More ❯
Who We Are:SwRI Cybersecurity Operations' mission is to secure the enterprise by evaluating, implementing, and operating a full suite of cybersecurity tool and services. We are responsible for configuring, administering, and supporting network and endpoint security systems. Operations include firewa More ❯