We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking CybersecuritySpecialist with the below skillset. CybersecuritySpecialist Fulltime with Karthik Consulting Location: National Capital Region (Local Area telework … or 2 days in the office) Clearance: TS/SCI Clearance Position Description CybersecuritySpecialist Purpose: The Air Force ISR Digital Infrastructure Transformation paves the way for intelligence analysts to securely harness the latest technological advancements. It is orchestrated through Data and Analytics, Sense Making/Automation … Augmentation and AI (AAA), Networks, Hybrid and Multi-Cloud, Enterprise Services, and cybersecurity capabilities. This structure allows integration, synchronization, and coordination with the Intelligence IC, Department of Defense (DoD), and commercial partners. The AF IC's ability to advance its digital infrastructure transformation and deliver intelligence at the speed More ❯
CybersecuritySpecialist II/III Full Time, Ft. Belvoir, VA Secret clearance required This position is contingent upon contract award Overview: Semper Valens Solutions is seeking an experienced CybersecuritySpecialist to support our organization in the Ft. Belvoir, VA area. Responsibilities: Level II: Serves … as subject matter expert for all cybersecurity/information technology aspects of assigned program. Performs top level system architecture related design, development, integration, testing, installation and troubleshooting. Translates military operational and mission requirements (ground, sea, air, and space) into practical systems concepts and design performance requirements. Participates in post … awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineering on assigned programs. Evaluates and conducts design efforts from a cybersecurity viewpoint to ensure integration of all required cybersecurity products and adequacy of the analyses Prepare and reviews cybersecurity related test More ❯
CybersecuritySpecialistCybersecurity, SME Wright Patterson Air Force Base Dayton, Ohio HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman … owned company with locations nationwide. HX5 is currently seeking a CybersecuritySpecialist in support of the Mobility Directorate at Wright-Patterson Air Force Base in Dayton, Ohio. Essential Duties and Responsibilities: Assist the Information Systems Security Manager (ISSM) and provide multi-discipline expertise covering project management, system … most current revision of the Security Directives applicable to Platform Information Technology (PIT), PITI and non-PIT systems being supported. ( These include DoDI 8500.01, Cybersecurity, DoDI 8510.01, RMF for DoD IT, JSIG, NIST 800-53, and directives/guidance identified in DoDI 5000.02.) Provide cybersecurity support to assigned More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Sawdey Solution Services Inc
Location: Fort Belvoir, VA Telework/Work-from-Home Authorized: Yes - When Authorized/Hybrid About the Role: This position will function as a cybersecurityspecialist and subject matter expert (SME) providing Advisory & Assistance Services (A&AS) support for the Defense Threat Reduction Agency (DTRA), Cooperative Threat … threat to the U.S. and its allies from WMD and related materials, technologies, and expertise, including associated delivery systems and infrastructure. The A&AS CybersecuritySpecialist position will be a critical component of the integrated team approach to tackling the challenges associated with this mission. This position … will be one of several cybersecurity SMEs working on a dedicated cybersecurity team supporting the CTR mission. As a member of the A&AS CTR cybersecurity team, you will have the opportunity to contribute to and shape the way CTR engage with DTRA's foreign partners in More ❯
Position Summary Odyssey Systems is recruiting for a CybersecuritySpecialist IV. In this role, you will support PM Soldier Survivability (SSV), which is located at Ft. Belvoir, VA and Huntsville, AL. The support required under this effort includes engineering, quality assurance and test support, acquisition support, business … Product Offices in PM SSV. Contingent upon contract award Responsibilities Duties include, but are not limited to: Serves as subject matter expert for all cybersecurity/information technology aspects of assigned program. Performs top-level system architecture-related design, development, integration, testing, installation, and troubleshooting. Translates military operational and … sea, air, and space) into practical systems concepts and design performance requirements. Participates in post awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineer on assigned programs. Evaluate and conduct design efforts from a cybersecurity viewpoint to ensure integration of all required More ❯
Description POSITION TITLE: CybersecuritySpecialist -Mid LCAT/POSITION #: Enterprise Risk Reporting DEPT/CONTRACT: Enterprise Cybersecurity Risk Tracking & Reporting/RMF CLEARANCE LEVEL: Secret REPORTING TO: _ Project Manager LOCATION: National Capital Region/DC Metropolitan area WORK SCHEDULE/HOURS: 40 hrs/week … JOB DUTIES: Create and maintain dashboards and reports for all necessary cybersecurity functions utilizing CDM dashboard, Splunk, Crystal Reports, PowerBI or other authorized platforms. Create a draft and final cybersecurity report by coordinating, consolidating and collecting the data and reports from multiple sources (for example, SERR, Cyber Hygiene … . Create component quarterly specific trending Scorecard. Generate quarterly and annual trending of DHS performance in the measured metrics. Generate draft and final monthly Cybersecurity Scorecards of HQ components and the Department as defined by the annual DHS ISPP from data resident in the DHS databases and other sources. More ❯
As we continue to grow at a rapid pace, we need some amazing new recruits to join our team. We are seeking an experienced CybersecuritySpecialist II to primarily support our contingent, based on award, upcoming program. If you are a strategic thinker with a passion for … level, Level II Clearance Required for this role: Secret Requirements: Bachelors Degree 5 years of experience Responsibilities: Serves as subject matter expert for all cybersecurity/information technology aspects of assigned program. - Performs top level system architecture related design, development, integration, testing, installation and troubleshooting. Translates military operational and … sea, air, and space) into practical systems concepts and design performance requirements. Participates in post awards, program reviews, design reviews, and IPTs as the cybersecurityspecialist/engineering on assigned programs. Evaluates and conducts design efforts from a cybersecurity view point to ensure integration of all More ❯
Overview We are seeking a highly skilled and detail-oriented CybersecuritySpecialist to join our team. The ideal candidate will be responsible for implementing and maintaining security measures to safeguard our organization's IT infrastructure, data, and networks from cyber threats. As a CybersecuritySpecialist … Education: Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). Proven experience (3+ years) as a CyberSecuritySpecialist or in a similar role. Strong understanding of security protocols, cryptography, firewalls, intrusion detection systems, and VPNs. Proficiency in security tools such as More ❯
Springfield, Virginia, United States Hybrid / WFH Options
Softek International Inc
Description POSITION TITLE: CybersecuritySpecialist Sr LCAT/POSITION #: Component Rist/Mgt/Compliance DEPT/CONTRACT: Component Services Risk Mgt & Compliance CLEARANCE LEVEL: Top Secret REPORTING TO: _ Project Manager LOCATION: Hybrid, SCIF, TSA Headquarters at 6595 Springfield Center Dr. Springfield, VA 22150_(National Capital … SETS/EDUCATION/CERTIFICATES: Bachelor Degree in Computer Science or related field CERTIFICATES: CISSP or CISM or CRISC or CSSP Requirements POSITION TITLE: CybersecuritySpecialist Sr LCAT/POSITION #: Component Rist/Mgt/Compliance DEPT/CONTRACT: Component Services Risk Mgt & Compliance CLEARANCE LEVEL More ❯
JRC is actively recruiting for a CybersecuritySpecialist-Advanced to assist in the assessment of the DoD current cyber policies, the coverage of those policies, and areas of risks. You will evaluate and audit how policies stack up to regulations, best practices, and industry standards. As you … client operates securely as they navigate an evolving IT environment. Join us as we protect the DoD through strategic cyber policy development. As a CybersecuritySpecialist - Advanced, you will Develop and monitors the implementation of policy and procedures to support information security goals and operations. Develop changes … Management (IAM) HS Diploma or GED minimum DoD 8570 Information Assurance Management (IAM-III) Certification Secret (Top Secret with SCI eligibility preferred) Knowledge of cybersecurity engineering, cyber forensics, network security tools and technologies, cybersecurity policy, procedures, and workforce structure to design, develop, and implement recommendations for a secure More ❯
JRC is actively recruiting for a CybersecuritySpecialist-Advanced to assist in the assessment of the DoD current cyber policies, the coverage of those policies, and areas of risks. You will evaluate and audit how policies stack up to regulations, best practices, and industry standards. As you … client operates securely as they navigate an evolving IT environment. Join us as we protect the DoD through strategic cyber policy development. As a CybersecuritySpecialist - Advanced, you will Develop and monitors the implementation of policy and procedures to support information security goals and operations. Develop changes … Management (IAM) HS Diploma or GED minimum DoD 8570 Information Assurance Management (IAM-III) Certification Secret (Top Secret with SCI eligibility preferred) Knowledge of cybersecurity engineering, cyber forensics, network security tools and technologies, cybersecurity policy, procedures, and workforce structure to design, develop, and implement recommendations for a secure More ❯
accrual, professional development reimbursement, corporate-funded technology certifications, and robust employee recognition and appreciation programs. Position Overview: We are seeking a highly skilled Senior CybersecuritySpecialist to support a critical cybersecurity program. The ideal candidate will provide subject matter expertise in cybersecurity compliance, FISMA data … collection and analysis, and risk assessments while ensuring adherence to federal security standards. Key Responsibilities: Serve as a technical subject matter expert (SME) for cybersecurity programs, focusing on FISMA compliance, data analysis, and Cyberscope reporting. Apply principles and methodologies to develop solutions for complex cybersecurity challenges, ensuring compliance … with FISMA, NIST, OMB, and other regulatory frameworks. Plan, develop, and review key cybersecurity program deliverables, including risk assessments, security categorization documents, contingency plans, and vulnerability assessment reports. Engage with stakeholders across technical, administrative, and executive teams to gather system requirements and provide security recommendations. Map complex technical requirements More ❯
As we continue to grow at a rapid pace, we need some amazing new recruits to join our team. We are seeking an experienced CybersecuritySpecialist III to primarily support our contingent, based on award, upcoming program. If you are a strategic thinker with a passion for … successful implementation of associated security controls and reviews all RMF documentation packages, and system fielding, operations, or upgrade requirements Assist Program Management Offices with Cybersecurity related Acquisition documentation requirements (i.e. Cybersecurity Strategies) and statutory/regulatory/policy compliance. Coordinate integration of Cybersecurity, COMSEC, and TEMPEST into … the entire system life-cycle design, development, and deployment. Support maintenance of DOD Inspector General (IG) Cybersecurity Self-Assessment checklist compliance and Federal Information Security Management Act (FISMA) Implement audit measures to ensure compliance with regulatory requirements, participate in organizational inspections and surveys of computer systems, provide inspection results More ❯
Overview The CybersecuritySpecialist is responsible for designing, implementing, and maintaining the security controls and protocols for the C2P Mod project. This position will directly impact the C2P Mod project by providing security guidance and expertise to development/system engineering/DevOps teams, conducting vulnerability assessments More ❯
CybersecuritySpecialist Senior Level(Key Person Task Area Lead) Task Area 6: Component Risk Management and Compliance/Senior Risk Analyst Certification Required: CISSP or CISM or CSSP or CAP Security Clearance Required: Top Secret Required Years of Experience: 8 Job Location: Currently remote due to COVID … Federal POA&M Lead. Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify trends and anomalies cybersecurity performance and mitigation of risk. Provide research and development support of data analytic and data management technologies including those associated with collecting, analyzing, parsing More ❯
CyberSecuritySpecialist Flexible location - Glasgow, Ipswich, London, Northampton or Selby Permanent, full-time Closing date: Monday 12th May 2025 Who we are We're committed to making a difference by generating dispatchable, renewable power and creating stable energy in an uncertain world. Building on our heritage, we … carbon, lower-cost energy future for all and are dedicated to decarbonising the planet for future generations. About the role As a CyberSecuritySpecialist, you'll be responsible for designing, developing, and maintaining cybersecurity products. This involves working closely with cross-functional teams to ensure products … breaches. Monitoring systems and networks for intrusions and unusual activity. Staying updated on security developments and emerging threats. Product Development & Support Designing and developing cybersecurity products, including software and hardware solutions. Participating in product implementation, installations, and migrations. Installing, configuring, and upgrading cybersecurity products. Monitoring compliance with securityMore ❯
work with our government customers in defense and civilian agencies to identify new technologies. The Opportunity: NexTech Solutions (NTS) is actively seeking an Offensive CybersecuritySpecialist to join our team. As an Offensive CybersecuritySpecialist, you will conduct business intelligence activities, vulnerability assessments, company … and supporting technology stacks, utilizing tactics, techniques, and procedures (TTPs) and analysis of publicly available and commercially available information. Coordinate vendor engagements and develop cybersecurity questionnaires to discuss their security posture, current protocols, processes, and mitigation efforts. Write technical reports for stakeholders, documenting findings, risk analysis, and recommendations for … assessment methodology and TTPs. Work directly with the team to identify, develop, and deploy custom threat detection monitoring. Requirements: Education: Bachelor's degree in cybersecurity, computer science, or a related field, or equivalent work experience. Desired Certifications: eJPT, eCPPT, PNPT, GPEN, OSCP, cRTO. Experience: 5+ years of demonstrated securityMore ❯
Phalanx Griffon (PG) is a top priority, open architecture airborne node that stitches warfighter data into the DAF BATTLE NETWORK. As Senior CybersecuritySpecialist, you will be the program's authority on securing Nomad hardware, Smith software, and Watch operations throughout Major Release 2 (FY ). Your … and cross domain safeguards will decide when PG can fly-and fight-in contested environments. Essential Job Functions Cyber Strategy & Governance • Own the PG Cybersecurity Strategy, System Security Plan (SSP), and Plan of Action & Milestones (POA&M). • Align all efforts with NIST , CNSSI 1253, and Air Force Zero … a DevSecOps, fail fast mindset inside classified environments. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. B.S. in Cybersecurity, Computer Science, Information Systems, or related field (M.S. preferred) and 12 + years securing DoD or IC C4ISR/avionics systems; at least More ❯
Phalanx Griffon (PG) is a top-priority, open-architecture airborne node that stitches warfighter data into the DAF BATTLE NETWORK. As Senior CybersecuritySpecialist, you will be the program's authority on securing Nomad hardware, Smith software, and Watch operations throughout Major Release 2 (FY … and cross-domain safeguards will decide when PG can fly-and fight-in contested environments. Essential Job Functions Cyber Strategy & Governance • Own the PG Cybersecurity Strategy, System Security Plan (SSP), and Plan of Action & Milestones (POA&M). • Align all efforts with NIST 800-53, CNSSI 1253, and Air … a DevSecOps, fail-fast mindset inside classified environments. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. B.S. in Cybersecurity, Computer Science, Information Systems, or related field (M.S. preferred) and 12 + years securing DoD or IC C4ISR/avionics systems; at least More ❯
Description SAlC is seeking a CybersecuritySpecialist to support the U.S. Army Combat Capabilities Development Command (CCDEVCOM), Engineering and Systems Integration (ESl) Directorate, Quick Reaction Capability (QRC) Branch. This position is on-site in Aberdeen, MD on Aberdeen Proving Ground (APG). ln support of the information … experienced professional who has in-depth experience in the achievement of strategic goals and objectives related to the ongoing execution and maturity of its cybersecurity and assessment and authorization (A&A) programs. Job Responsibilities: Support the maintenance and upkeep of system packages using a GRC application (e.g., eMASS/… NIST 1800 series, etc. Demonstrated experience with the development and update of policies to align with OMB, DHS, NIST, CNSS, ICD, Congressional and other cybersecurity mandates, and directives. Experience with Application Security Audits and Risk Scoring. Maintain updated knowledge in the field of risk management and compliance to efficiently More ❯
SMX is seeking a Senior CybersecuritySpecialist in Norfolk, VA to join our growing team! Essential Duties & Responsibilities Collaborate with existing ISSO/ISSEs in completing A&A activities through RMF Step 3 Mitigate and/or remediate vulnerabilities or misconfigurations Provide documentation findings and severity levels … in RMF A&A support, extensive knowledge and hands on experience in developing and documenting processes and procedures used in various IT operations and cybersecurity plans and required A&A artifacts, such as: Access Control Plan (ACP) Configuration Management Plan (CMP) Information System Contingency Plan (ISCP) that can effectively … implementing applicable Computer Network Defense (CND) policies, regulations, and compliance guidance Knowledge of security plan management and validation CISSP Certification DISA HBSS Certification DoD Cybersecurity Workforce (CSWF) CSSP Analyst certification (ie, CEH, CCNA-Security) Navy Qualified Validator II Desired Skills and Experience Navy Qualified Validator III Application Deadline: May More ❯
updates. Draft DHS NSS Assessment, Compliance, and Policy Support Standard Operating Procedures and Playbooks Draft DHS RMF Processes and Procedures Provide Analysis Report from Cybersecurity Threats and Vulnerabilities Research (both OSINT and other sources) Assist with the development and maintenance of formal documented NSS Assessment and Compliance SOPs. SOPs … and track communications with executives and HQ components. Create and maintain forms, document templates and a register for CISOD forms and templates which support cybersecurity activities throughout the department. Prepare, track, and provide status reports on data calls. Develop, maintain, and update Standard Operating Procedures (SOPs), handbooks, ConOps and … Federal SMEs on processes and projects. Provide customer service support to DHS Enterprise by responding and resolving DHS Helpdesk tickets. Support modernization of all Cybersecurity processes and methodologies to be employed across the Enterprise and MGMT Collaborate/coordinate successfully with other contract vendors/Government personnel. Respond to More ❯
We have an outstanding Contract ( 6 months, possible extension/hire) position for an Information SecuritySpecialist to join a leading Company located in the Washington, DC. THIS IS A FULLY ONSITE POSITION Pay Rate: $65-89.97/hr US Citizenship is required. Candidates must possess an … active Public Trust. We are seeking a proactive, detail-oriented Information SecuritySpecialist to join our growing team. In this role, you will be responsible for implementing and maintaining our organization's security posture, monitoring for threats, and ensuring compliance with relevant frameworks and regulations. The ideal candidate … Criteria: Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). Minimum 3 years of hands-on experience in cybersecurity roles. Strong understanding of networking, operating systems (Windows, Linux), and cloud security (AWS/Azure). Hands-on experience with tools such as Splunk More ❯
Are you interested in joining a business that is redefining an industry and launching products that help cement the place of our private hire/taxi operator customers in a global marketplace? What You'll Do: Enhance the security of More ❯
Job Description What You Will Be Doing: Under broad direction, operating and managing all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation. Implementing and monitoring security measures for communication systems and networks and providing advice that More ❯