professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows environments across DoD … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram More ❯
professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows environments across DoD … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram More ❯
professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows environments across DoD … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram More ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Infrastructure Support certifications: CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop … modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and More ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Infrastructure Support certifications: CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop … modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and More ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Infrastructure Support certifications: CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop … modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and More ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Infrastructure Support certifications: CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop … modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and More ❯
Job Number: 72 Job Title: INFORMATION SYSTEMS SECURITY OFFICER - FLORIDA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: On-site Job Location: FL Tyndall AFB Salary: 100k - 150k Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Ensure appropriate security controls are in place … that will safeguard digital files and vital electronic infrastructure Respond to computersecurity breaches and viruses Implement information system security requirements, system security plans, assist with the development of ATO packages and ensure all auditing requirements are completed Ensure all system security procedures are followed including updates to system security software patches, updates to … antivirus definition files, and ensuring audit files are maintained and reviewed Interface regularly to address any issues and ensure compliance with all pertinent regulations related to information system security Provide IAO/ISSM functions necessary to maintain mission effectiveness Requirements BS degree 5-9 years of experience Experience assisting in the development of ATO packages Experience as a network More ❯
This role is 100% onsite Job Description A Global Government Contracting Company is looking for a Senior Cyber Architect. The qualified candidate will be working on and possibly leading security engineering teams supporting cybersecurity engineering activities in a rapid development environment to support the specification, development, and application of computersecurity technologies, cybersecurity and information assurance management … engineering, cyber implementation engineering, verification and Validation, and continuous monitoring efforts during deployment, Operations and Sustainment Supporting offensive architecture analysis and design of defense-in-depth solutions Supporting Development Security Operations (DevSecOps) integration Developing and assessing system security plans including, security concepts of operation, risk management matrix, security control traceability matrix, security test procedures, and … plan of action and milestones Conducting and analyzing vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) Analyzing static code scans and dynamic code scans to validate Application Security and Development STIG compliance This position may require business travel to customer locations in support of customer meetings, product demonstration, Integration and More ❯
exceptional cache of capabilities that enable mission-critical operations and decision making. We provide the expertise and guidance needed to help customers succeed in today's era of defense, security, maintenance engineering, logistics, and business transformation. Our core competencies are aligned with the current needs of our customers; and those competencies anticipate and facilitate work with our customers to … practices into system development/modernization/management efforts. • Support implementation of the RMF for assigned programs, organizations, and systems. • Conduct comprehensive assessments of the management, operational, and technical security controls employed within or inherited by an information system to determine the overall effectiveness of the controls. • Perform annual security reviews, annual testing of Information Assurance (IA) controls. … Travel • This position includes a low level of travel. Education, Knowledge, Experience, Skills, and Abilities Required • Education: A Bachelor's degree in Information Systems, Computer Engineering, Computer Science, Cyber Security, or a related field is preferred. A Master's degree may substitute for two years of the required relevant experience. • Experience: • Minimum of seven years of directly More ❯
An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C#, etc.) Possess one or more of the following certifications: Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Education: Bachelor of Science in Information Systems, Bachelor More ❯
An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C#, etc.) Possess one or more of the following certifications: Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Education: Bachelor of Science in Information Systems, Bachelor More ❯
An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C#, etc.) Possess one or more of the following certifications: Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Education: Bachelor of Science in Information Systems, Bachelor More ❯
An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C#, etc.) Possess one or more of the following certifications: Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Education: Bachelor of Science in Information Systems, Bachelor More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering recommendations based More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced network security professional to join our team! As a Network Security Engineer IV, you will perform all aspects of network security including the design, implementation, configuration, and control enforcement of security controls on hardware and software components of network devices. … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices Manage enterprise level of Active More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced network security professional to join our team! As a Network Security Engineer IV, you will perform all aspects of network security including the design, implementation, configuration, and control enforcement of security controls on hardware and software components of network devices. … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices Manage enterprise level of Active More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced network security professional to join our team! As a Network Security Engineer IV, you will perform all aspects of network security including the design, implementation, configuration, and control enforcement of security controls on hardware and software components of network devices. … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices Manage enterprise level of Active More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced network security professional to join our team! As a Network Security Engineer IV, you will perform all aspects of network security including the design, implementation, configuration, and control enforcement of security controls on hardware and software components of network devices. … December of 2025. ** Clearance: An ACTIVE Secret clearance (IT Level II Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices Manage enterprise level of Active More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering recommendations based More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering recommendations based More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computersecurity incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Twelve (12) years of related work experience in the field of security authorization. • A Bachelor's degree in ComputerMore ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computersecurity incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Ten (10) years of related work experience in the field of security authorization. • A Bachelor's degree in ComputerMore ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless … Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps More ❯
An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless … Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps More ❯