preferably supporting DGFC or JFHQ Experience with regex and signature development Experience with coding/scripting Cybersecurity certifications such as CISSP and/or GIAC certifications Splunk certifications Special Requirements/Security Clearance Active TS and TS/SCI clearances are required. More ❯
host or network Knowledge of network communications, routing protocols, compliance standards, and internet applications Knowledge of system and network policies Relevant certifications such as GIAC GREM, GCFA, GNFA, or Offensive Security certifications like OSCP and OSCE Commitment to Non-Discrimination: All qualified applicants will receive consideration for employment without regard More ❯
OSP, EIGRP) and firewall engineering Demonstrated experience using scripting languages such as Python Demonstrated experience with certifications or degrees in the cybersecurity discipline (CISS), GIAC, GPEN, CEH, OSCP) Demonstrated experience with a Master's degree in a relevant technical field (engineering, computer sciences, or computer forensics) Demon experience with mobile More ❯
HSD/GEDyrs Associatesyrs Bachelorsyrs Mastersyrs PhD+8yrs Relevant professional certifications will be considered equivalent to six (6) months of relevant experience. Training and Certifications: GIAC Reverse Engineering Malware (GREM) or equivalent. DoDD 8140/DoD 8570.01M IAT Level III Baseline Certification. DoDD 8140/DoD 8570.01M CNDSP Analyst (CND-A More ❯
rus ion set tactics, techniques, and procedures Top Secret clearance Bachelor's degree Additional Qualifications: Experience with Micro sof t Sentinel Experience with Splunk GIAC Continuous Monitoring ( GMON ) CertificationGIAC Certified Incident Handler ( GCIH ) CertificationGIAC Certified Forensic Analyst ( GCFA ) CertificationGIAC Certified Int rus ion Analyst ( G CIA ) Certification … GIAC Network Forensic Analyst ( GNFA ) CertificationGIAC Cloud Threat Detection ( GCTD ) CertificationGIAC Cloud Forensics Resp ond er ( GCFR ) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; Top Secret clearance is required. Compensation At Booz More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
Adaptability: Keeps current with evolving threats, vulnerabilities, and cybersecurity mitigation techniques. Desired Skills/Experience Advanced certifications such as Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), and GIAC Vulnerability Assessment Professional (GVAP). Experience in a DoD, Army, or Intelligence Community environment with a focus on vulnerability More ❯
in a fast-paced environment May require CONUS and/or OCONUS travel to customer sites. Preferred Requirements: Any of these Certifications: CISSP, CySA+, GIAC Penetration Tester (GPEN), CEH, or GIAC certifications (e.g., GCIH, GCIA), Splunk Core Certified User/Power User, Cisco Certified CyberOps Associate,Offensive Security Certified Professional More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
s degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 InformationAssurance Technician (IAT) Level III Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP More ❯
university may be substituted for two (2) years of CDA experience on projects of similar scope, type, and complexity. Requires GlobalInformation Assurances Certificate (GIAC). Requires Global Certified Incident Handler (GCIH) certification. Two (2) years of demonstrated and practical experience in TCP/IP fundamentals. Two (2) years of More ❯
discover the unknown Desirable Requirements Microsoft SC200 Certified Splunk Certified Power User/Advanced Power User CompTIA Certifications (Security+/Network+/Linux+) Crest, GIAC or CISSP Certification Degree in related field. Other relevant certifications. Working Hours: The working hours are hrs Mon-Fri, and you would be expected to More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
Engineering, or a related technical discipline.Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent.Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms.Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK CNI More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
Good reasoning skills and the ability to clearly identify key issues. Desirable: CISSP, CISM or other equivalent foundational security qualifications or experience. CEH, OSCP, GIAC or other penetration testing security qualifications or experience. SABSA, SANS or other technical architecture qualifications. SAFE, Scrum, or other Agile methodology experience. Data Protection, Risk More ❯
Working knowledge database Administration and application development with Oracle, PostresSQL, SQL Server, and/or MySQL These Qualifications Would be Nice to Have: Advanced GIAC and/or (ISC)2 network/cyber security specialties Familiar with 802.11, Bluetooth and LTE protocols and technologies Experience with wired telephony technology (hardware More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯