Washington, Washington DC, United States Hybrid / WFH Options
Technica Corporation
solutions that meet or exceed our customer's expectations. We specialize in a wide range of advanced information technology solutions from Systems Engineering to CyberSecurity, and from Software Development to Product Solutions. From our locations across the DC Metro area, Hampton, Virginia, and Huntsville, Alabama, we provide technological subject More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Anson McCade
be working as part of a 24/7 shift rota , ensuring constant vigilance over critical national infrastructure systems. If you’re passionate about cybersecurity, thrive in high-pressure environments, and meet the security clearance requirements, this role offers a unique opportunity to make a meaningful impact at a national More ❯
starting position. Must be located within 75 miles of ECMA at Ft. Belvoir, VA. Preferred Education, Experience, & Skills Bachelor's Degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science. Certified Information Systems Security Professional (CISSP) ITILv4 Foundation Pay Information Full-Time Salary Range: $130355 - $221603 Please note More ❯
of the key players and coordinating with cyber elements in the intelligence community. In addition, work with other ONS customer teams to ensure the cybersecurity of the IT systems, especially on distribution & administration. What You Will Do Identify and assess potential threat information, recommend mitigation efforts, and incorporate findings into More ❯
of the key players and coordinating with cyber elements in the intelligence community. In addition, work with other ONS customer teams to ensure the cybersecurity of the IT systems, especially on distribution & administration. What You Will Do Identify and prioritize research and analysis topics within the Department and develops production More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
leverage automation opportunities and ensure successful integrations. Lead technical migration of log sources into Microsoft Sentinel SIEM. Required Skills and Experience: Demonstrated ability in cybersecurity, with at least 3 years in a technical role in security operations and/or security software development. Solid understanding of security operations, automations standard More ❯
starting position. Must be located within 75 miles of ECMA at Ft. Belvoir, VA. Preferred Education, Experience, & Skills Bachelor's Degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science. ITILv4 Foundation Certified DevSecOps Professional (CDP Certified Software Development Professional (CSDP) Scaled Agile Framework (SAFe) Pay Information Full More ❯
Architect Certification Must be located within 75 miles of ECMA at Ft. Belvoir, VA. Preferred Education, Experience, & Skills Bachelor's Degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science. Agile Certification ITILv4 Foundation Pay Information Full-Time Salary Range: $150370 - $255630 Please note: This range is based More ❯
opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices More ❯
opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices More ❯
the nation and its allies through innovations in digital transformation, space mission engineering and launch assurance, miniaturized sensors and satellites, advanced modeling and simulation, cybersecurity, and conventional and hypersonic missile support. Headquartered in Chantilly, VA with 16 global offices, Arcfield employs more than 1,500 engineers, analysts, IT specialists, and More ❯
the nation and its allies through innovations in digital transformation, space mission engineering and launch assurance, miniaturized sensors and satellites, advanced modeling and simulation, cybersecurity, and conventional and hypersonic missile support. Headquartered in Chantilly, VA with 16 global offices, Arcfield employs more than 1,500 engineers, analysts, IT specialists, and More ❯
facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Encompasses technical, engineering, data analytics, cybersecurity, management, operational, logistical, and administrative support for Bureau of Diplomatic Security, Cyber and Technology Security Directorate in three key offices/functional areas: CyberMore ❯
management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to More ❯
Basic Qualifications A minimum of a Bachelor's degree coupled with 3-5 years' experience in the Information Technology , Computer Science, IT, Information/CyberSecurity field from an accredited college or university arena or Master's Degree with 1 + years of relevant experience. Superior writing, communication and critical More ❯
shares; Site-to-Site VPN configuration & maintenance; PowerShell; Windows IIS security & management; Event Log analysis and troubleshooting; Working with external cloud and security providers; CyberSecurity experience including resolving issues raised from external PEN testing; Analytical skills in monitoring, evaluating and reporting on risk scenarios; Strong report-writing skills both More ❯
NIST SP 800-82 Rev. A, ISO/IEC 27001, CIS Controls, DoD 8500.01, etc. The Network Operations engineer should also be familiar with cybersecurity tools such as SIEM (Security Information and Event Management) systems, and vulnerability scanners i.e. Assured Compliance Assessment Solution (ACAS). This position is located in More ❯
of the country or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cybersecurity and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth More ❯
of the country or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cybersecurity and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth More ❯
Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). More ❯
technical information effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). More ❯
tools (e.g. Volatility). Analysis results documented in forensics report. Additional forensics/malware analysis activities may include: Perform efficient and prioritized identification of cybersecurity threats and incidents with an emphasis on clear articulation of the potential threat(s) and actualized risks associated with such threats and incidents. Objectively More ❯
Microsoft Defender, GitHub, Infrastructure as a code, Secrets Management Requirements And Qualifications: A bachelor's or master's degree in computer science, information technology, cybersecurity or a related field 8+ years of cloud security experience, focusing on designing and implementing secure cloud computing solutions mainly with AWS and Azure securityMore ❯
in securing DevSecOps and container platforms against accreditation requirements in classified environments. Strong experience in system engineering and collaboration with infrastructure service providers and cybersecurity stakeholders to architect and implement enterprise solutions. Strong experience architecting, designing, and building DevSecOps solutions at scale, in the cloud or on-premise, across multiple More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
with multiple agile teams across the program to determine the best DevSecOps practices across custom applications and COTS product •Apply hardware and software knowledge, cybersecurity standards in mission applications, & feedback from users to develop/modernize software. Basic Qualifications: • 3+ Years experience with DevSecOps principles and practices • Experience with More ❯