Job Title: NetworkSecurity Engineer (Fortinet & Cisco) Job Type: Contract- Outside IR35 Job Summary: We are seeking an experienced Network Design Architect with a strong background in Fortinet and Cisco technologies to lead the design and implementation of secure, high-performance network solutions. This role requires deep expertise in network architecture , security design , and … configuration deployment , particularly across Fortinet SD-WAN, Fortinet Firewalls, Cisco Nexus switches, and enterprise wireless and LAN environments. Key Responsibilities: Lead the design and architecture of secure and scalable network infrastructures. Architect solutions involving Fortinet SD-WAN and Fortinet Firewall platforms. Design and validate architectures using Cisco Nexus switching platforms and Cisco Wi-Fi/LAN . Develop and … document end-to-end security and network designs , including routing, switching, firewall placement, and segmentation strategies. Write detailed configuration templates and deployment guides. Perform hands-on configuration, testing, and validation of network solutions. Modify and optimize existing configurations on deployed infrastructure. Collaborate with stakeholders to align network designs with business and technical requirements. Provide technical leadership More ❯
PRISM seeks a VoIP Network Engineer to join our team. In this role, you will have a strong understanding of voice and data networking technologies, focusing on Voice over IP (VoIP) systems. This role requires technical expertise, problem-solving skills, and a customer-centric approach. Responsibilities: Design, implement, and maintain VoIP systems, including IP PBXs, softphones, and other related … hardware and software. Troubleshoot and resolve complex VoIP network issues, such as voice quality problems, call failures and network congestion. Configure and optimize VoIP networks for optimal performance, reliability, and security. Monitor network performance metrics and proactively identify potential issues. Collaborate with other IT teams to ensure seamless integration of VoIP systems with existing network infrastructure. … Stay up-to-date with the latest VoIP technologies and industry best practices. Provide technical support to end-users and other IT staff. Document network configurations, procedures, and troubleshooting steps. Qualifications: Qualifications Active DoD Top Secret Clearance Bachelor's degree in a relevant field (e.g., Computer Science, Engineering) or equivalent experience. 14+ years of IT network engineering experience More ❯
This position provides 24x7 Tier I/II help desk support for all tenants in the DHA network. They work with other Tier I/II engineers in the networksecurity operations center. They are responsible for triaging issues and resolving and/or escalating to the appropriate network team for remediation. There will be frequent engagement … with internal and external customers. Roles and Responsibilities: 1. Troubleshooting and resolving network issues in a timely manner with a variety of different network devices and protocols. 2. Working in a team setting and making recommendations related to troubleshooting, device configuration, and documentation. 3. Effectively interacting with multiple customers on a daily basis. Other Duties: Please note this … for this job. Duties, responsibilities and activities may change at any time with or without notice. Requirements Required/Desired Skills: 5+ years relevant experience in supporting a large network infrastructure. Bachelor of Science degree in Computer Science or a related discipline is preferred but not required. Secret clearance or higher preferred 8140 compliance (Active Security and OS More ❯
Zachary Piper Solutions is seeking a Suricata engineer for a network threat detection team on a fully-funded program at the Defense Intelligence Agency. The work takes place onsite at JBAB, College Park, MD or Reston, VA . Job Responsibilities: Develop innovative solutions for secure and reliable enterprise computer systems. Ensure project completion and guide lower-level staff. Develop … server systems across multiple networks. Support daily operations, monitoring, and problem resolution for all devices. Configure and manage Windows, UNIX, and Linux systems, and install software like Host-based Security System, Endpoint Security Suite, Splunk, Cribl, and networksecurity tools like Firewalls and ForeScout. Support Windows and Linux systems engineering efforts in design, evaluation, solution engineering … Basic Qualifications: 4+ years of experience as a systems administrator. Experience with Linux and Windows servers. Experience with back end engineering and installing, configuring, or maintaining devices, applications, and security tools like Suricata, Palo Alto Firewalls, Trellix ESS, ePO, FireEye tools, Splunk, Cribl, or ForeScout. Experience with automating deployments, configuration management, or cybersecurity tools operations. Experience with DoD Risk More ❯
customer-oriented Senior Computer and Information Research Scientist to join our team in DC, Maryland, and Virginia (DMV) area. In this role you will drive innovation and solve complex security challenges within our Network Operations Security Center (NOSC). The ideal candidate will be responsible for conducting cutting-edge research, with a strong emphasis on data analysis … and trend reporting, to design and develop novel algorithms and systems that advance cybersecurity operations, threat detection, and incident response, ultimately improving cyber network defense. Leads R&D Team and reports directly to NOSC PM/DPM. Responsibilities include but are not limited to: Conduct research in computer science areas relevant to NOSC operations, such as networksecurity, intrusion detection, threat intelligence, and security automation. Design and develop new algorithms, software, and systems for security monitoring, analysis, and response. Analyze and evaluate the performance of security algorithms and systems using real-world NOSC data and scenarios. Publish research findings in peer-reviewed journals and present at cybersecurity conferences. Collaborate with NOSC analysts, engineers, and More ❯
Network and Infra Endpoint Security Architect - London Security Consulting Manager Senior Level Full time Please Note: Due to the nature of client work you will be undertaking, you will need to be willing to go through a Security Clearance process as part of this role, which requires 5+ years UK address history at the point of … technology to each business challenge. We believe in inclusion and diversity and supporting the whole person. Our core values comprise of Stewardship, Best People, Client Value Creation, One Global Network, Respect for the Individual and Integrity. Year after year, Accenture is recognized worldwide not just for business performance but for inclusion and diversity too. "Across the globe, one thing … impact we have with our clients and with the communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO As a Network and Endpoint Security Architect, you will: Act as the technical lead in customer-facing engagements, translating complex security needs into effective solution architectures Design Zero Trust-aligned More ❯
and infrastructure management. This individual will oversee hardware, software, networking, and classified system operations to maintain mission-critical infrastructure. The Infrastructure SME will serve as a technical authority for networksecurity, system integration, and operational resilience, ensuring compliance with DoD cybersecurity policies, infrastructure best practices, and mission objectives. Candidate must be familiar and worked in a 24/… Network Operations Center (NOC), or Infrastructure & Operations (I&O) environment, and a hybrid cloud environment. Ideal candidates will have worked in Space Force, Air Force, other Dept of Defense branches, or Dept of State. Key Responsibilities Infrastructure Operations & System Administration: Oversee IT infrastructure, networks, and system architecture supporting Space C2 operations. Network & Cybersecurity Management: Ensure network integrity … security, and performance in classified and unclassified environments. Incident Response & Troubleshooting: Serve as the Tier 3 escalation point for complex infrastructure and network issues. Agile-Based Reporting & Documentation: Maintain and update Standard Operating Procedures (SOPs), technical documentation, and system diagrams. Collaboration & Training: Work alongside Program Managers, Shift Managers, and 24/7 Operations Teams to provide technical expertise. More ❯
successful candidate will be expected to interact with team leadership, peers, and other IT departments to gain an understanding of the business process lifecycle. The primary responsibility of the Network Specialist is to assist in the deployment and maintenance of standard LAN, WAN and Load Balancing architectures. • Maintain a directory of domain names and translate them to Internet Protocol … IP) addresses. • Install, configure, and maintain network services, equipment, and devices. • Support network and computing infrastructure. • Provides list of mail servers which accept Emails for each domain name. • Documents network problems and resolution for future reference. • Monitor system performance and assist in implementing performance tuning. • Requires a thorough knowledge of networking essentials. • Assists in providing support for … network security. • Prepares and schedules computer setup, repair, configuration changes, or replacement. • Provides telephone, e-mail, remote access, or in-person solutions to day-to-day DNS issues. • Support IS team in meeting key performance indicators and metrics. • Assist with the maintenance of records for hardware and software use along with license usage. • Displays continuous improvement of current processes More ❯
highly skilled and experienced Hardware Engineer to join our team in maintaining and enhancing our enterprise on-premises environment. The ideal candidate will be responsible for supporting a robust network infrastructure, focusing on both the physical hardware components and the virtualization aspects of our servers. This position is in Reston, VA. Job Responsibilities: Provide support for all hardware components … enterprise on-prem enclave including servers, storage systems, networking devices, and other infrastructure-related hardware. Maintain and manage the virtualization infrastructure, predominantly working with virtual servers. Collaborate closely with network engineers to ensure seamless integration of hardware within the network enclave. Ensure all hardware operates at optimal performance levels and execute routine maintenance and upgrades. Respond to and … resolve hardware-related incidents and issues, minimizing downtime and ensuring continuity of operations. Implement and maintain strict security measures to safeguard the hardware against unauthorized access or breaches. Conduct regular hardware evaluations to determine the necessity for upgrades or replacements and manage the deployment of new hardware when required. Design and maintain documentation for system hardware architectures, configurations, and More ❯
Job Title: Senior SOC Analyst - 4 On 4 Off Shifts (Days & Nights) Role : We are rapidly expanding our Security Operations Centre (SOC) team and are looking for driven SOC Analysts who thrive in fast-paced, high-tech environments. This is a fantastic opportunity to support multiple high-profile clients across enterprise-scale environments while using industry-leading tools like … Microsoft Sentinel, Splunk, and MISP. If you're ready to lead from the front, contribute to national security, and grow your cybersecurity career—this is the role for you. Responsibilities: Monitor, triage, and investigate security incidents on critical client infrastructure. Conduct in-depth analysis of network traffic, system events, and logs to detect security threats and … sharing across the team. Prepare and present reports for managed clients, tailoring content for both technical and non-technical stakeholders. Skills/Must have: Proven experience working in a Security Operations Centre. Hands-on experience with Microsoft Sentinel and Splunk. Familiarity with the Mitre ATT&CK framework. Strong understanding of networking fundamentals (TCP/IP, WANs, LANs, common Internet More ❯
Salisbury, Wiltshire, United Kingdom Hybrid / WFH Options
Sopra Steria Group
There is so much opportunity in the world of IT Defence and this large site now have a brand-new position for a Network Solution Architect. As the solution owner for the full lifecycle of a solution from feasibility to delivery you will make sure the solution has continuity from an architectural and design perspective. Come and build and … implement end-to-end solution/technical design. Provide solution and technical SME mentorship. Provide a customer concern point for design related issues within projects. Align standards, frameworks and security with overall business and technology strategy. Identify, communicate, and address Information Assurance risks. Design security architecture elements to mitigate risks in liaison with Solution Leads. Create solutions that … balance business requirements with information and cyber security requirements. Identify security design gaps in existing and proposed architectures and recommend changes or improvements. What you'll bring:. Experience of core Cisco Networking technologies covering switching, routing, firewall, wireless(ASA,ACI,NX-OS,IOS etc.). Good knowledge of network orchestration and automation. Concrete understanding of fundamental More ❯
Company Description Since 2006, MAXISIQ has advanced the state of Cyber RDT&E by bringing together industry expertise in software, hardware, communications and security, and leveraging decades of operational experience to deliver exceptional value to communities and the critical missions they support. Join us where we innovate, develop smarter solutions, technologies, services, and actionable capabilities for our clients- right … operations in Arlington, VA. This is a full-time position pending award, expected in March 2025. What You'll Be Doing: Administer, configure, manage, patch, upgrade, design, and optimize network and host-based security tools and systems. Evaluate, install, configure, test, and update network and host-based security systems and hardware. Develop network and host … based security systems and security operation center knowledge base articles, how-to documents, standard operating procedures, and policies. Develop scripts or code to automate operations, administration, maintenance, or analysis of data and systems. Develop, document, and review secure baseline configurations for each technology used within the environment. Assist in determining authorization boundaries and placement of new systems within More ❯
and Planning Specialist to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes and systems. The successful candidate analyzes federal civilian executive branch, OMB, and DHS information security laws, regulations, and policy guidelines and provides … collaborate with key stakeholders to develop strategy and roadmap to comply, identifying and tracking risks and challenges for implementation Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. … Conduct data analysis and provide recommendations based on analysis; create financial models and perform data analytics to assess current business activities. Monitor and analyze network and cloud performance metrics and operations to identify potential risks or challenges that may impact compliance; provide recommendations for optimization, and propose strategies to minimize, avoid, or address the potential or realized compliance impacts More ❯
highly motivated and skilled CNO Developer/Computer Scientist/Reverse Engineer to join our team. This role involves designing, developing, and maintaining complex software systems that support Computer Network Operations (CNO). As a member of our team, you will work on mission-critical projects, providing innovative solutions to emerging cybersecurity challenges. Responsibilities: o Software Development: • Design, develop … to create robust, high-performance software. • Develop custom tools and scripts to automate tasks, analyze data, and improve system performance. • Write clean, efficient, and well-documented code that meets security and performance standards. o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in … targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to identify anomalies, potential threats, and areas for improvement. • Develop and implement solutions for networksecurity, ensuring systems are protected against potential intrusions. o More ❯
architecture and design of cloud-hosted information systems are functional and secure. You will conduct strategic planning and recommend implementation strategies. You will provide advice and assistance on various security and privacy matters, including policy, trusted product assessment, enterprise security engineering, secure cloud systems management, penetration testing, insider threat analysis, cyber situation awareness, attack detection, secure networking, secure … operating systems, secure workstations, secure data management, secure web technology, secure protocols, and authentication. Responsibilities include, but are not limited to: Lead and conduct cloud cyber security analysis investigations, including data recovery, analysis, and reporting; write forensics and incident response reports, investigate computer attacks, and extract data from electronic systems; Draft and brief contract and government leadership as needed … collaborate with other cybersecurity professionals, law enforcement agencies, and intelligence organizations to share information and coordinate response efforts. Provide advice, design, recommend, develop, and implement cloud and hybrid cyber security solutions optimizing the enterprise networksecurity posture Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems. Perform More ❯
and Planning Specialist to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes and systems. The successful candidate analyzes federal civilian executive branch, OMB, and DHS information security laws, regulations, and policy guidelines and provides … collaborate with key stakeholders to develop strategy and roadmap to comply, identifying and tracking risks and challenges for implementation Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. … Conduct data analysis and provide recommendations based on analysis; create financial models and perform data analytics to assess current business activities. Monitor and analyze network and cloud performance metrics and operations to identify potential risks or challenges that may impact compliance; provide recommendations for optimization, and propose strategies to minimize, avoid, or address the potential or realized compliance impacts More ❯
we can understand what aspects of our site are effective and identify areas for improvement. This is a secondary processing purpose. This is a secondary processing purpose. Analyst, IT Network Engineering page is loaded Analyst, IT Network Engineering Apply locations London Remote-UK Zone 1 (London/Thames Valley) time type Full time posted on Posted 7 Days … technology company that leads with our humanity-driving our business priorities alongside meaningful social, community, and societal impact. What will you do at Ciena? As part of the Global Network Services Team, you will help design, implement, support, and automate secure, high-performance network solutions that power Ciena's global operations. You'll work closely with IT, security … remote access Implementing: Solutions from Ciena, VeloCloud, Zscaler, Aruba, Juniper, Palo Alto, and Fortinet; cloud networking across Azure, AWS, OCI Supporting: Troubleshooting, on-call rotation, RCA, vendor escalations Automating: Network tasks via Terraform, Ansible Documenting: Using SharePoint and JIRA Must-haves 2-5 years of hands-on experience in IT network infrastructure Strong working knowledge of routing, switching More ❯
nation's security. In this role, you'll be counted on to help understand cyberspace capabilities to evaluate potential weaknesses as well as the effectiveness of mitigations for cyber security solutions. You will work with your team to leverage cyberspace operations systems to aggregate threat feeds that inform briefings for senior leadership aligned to the Intelligence Community. This is … first line of defense influencing the most critical global cyber missions, this is the opportunity for you. Qualifications You Have: 2+ years of experience as a Cybersecurity Analyst, Information Security Analyst, or in a related security role Experience with security monitoring tools, such as SIEM, firewalls, antivirus software, and vulnerability management tools Experience with security frameworks … and regulations, such as NIST, ISO 27001, PCI-DSS, and GDPR Experience with vulnerability scanning and penetration testing tools such as Nessus, OpenVAS, or Metasploit Knowledge of networksecurity concepts, firewalls, VPNs, IDS/IPS, and encryption technologies Knowledge of operating systems and network protocols TS/SCI clearance with a polygraph HS Diploma or GED Nice More ❯
from emerging threats by advancing electronic warfare (EW) through RDT&E of technologies. Responsibilities Manage a VMware vSphere 7.X infrastructure in order to support maintained operation and compliance with security hardening/patching schedule. Maintain documentation for the configuration of the network in accordance with input from the ISSM/ISSO and approved SOPs. Maintain Horizon 8 Connection … in both virtual and physical capacities in order to maintain compliance with patching and software needs of users. Manage both virtual and physical switches for compliance and operability of network core functions to operate site networking for clients. Maintain hardware and software lists to maintain documentation to keep track of known devices and software in use on the system. … On occasion; perform after hours upgrades of core networking features to maintain compliance of system security and minimize network downtime. Qualifications Bachelor's Degree and 6+ years of technical experience Strong knowledge of Windows, Unix, and VMware software products and OSes Knowledge of various SIEM applications and how to manage and configure them (i.e. Event Sentry, Splunk, etc. More ❯
Are you an experienced IT Security Architect who thrives in the ever-changing world of Information Technology? Then we have exciting opportunities for you! We are looking for multiple freelance professionals for different projects. Your personal passion, interests, and experience will be decisive in setting the right accents and determining your personal journey. Your Job Responsibilities: Drawing up security project plans : Develop comprehensive project plans for implementing security measures across IT systems, outlining the scope, objectives, and deliverables. People management for the members of the various (security) teams : Lead and manage security teams, ensuring effective collaboration and performance among team members. Planning the security project in terms of timeline and milestones : Establish project timelines … and milestones, ensuring that all phases of security implementation are completed on schedule. Assigning tasks and responsibilities to the security team members : Delegate tasks and responsibilities to team members based on their skills and expertise in IT security. Mapping and managing security risks (and measures) : Identify potential security risks and develop strategies to mitigate them, ensuring More ❯
Job Number: R Cybersecurity Engineer, Senior The Opportunity: Are you looking for an opportunity to share your experience in network and system security to safeguard our nation? As a cybersecurity engineer, you can identify, implement, and operate the systems, tools, and approaches needed to assess vulnerabilities, repel threats, and improve enterprise security. We need your experience to lead … the development and implementation of security solutions that protect critical national security missions. On our team, you'll troubleshoot and analyze complex challenges for customers using your knowledge of cybersecurity, information security, system security, and networksecurity devices, applications, and tooling. You'll use your curiosity for te chn ology and market trends to … further research and develop security solutions to advance the customer mission. With mentoring, challenging hands-on problem-solving, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers. Join us. The world can't wait. You Have: Experience with Windows and Unix operating systems Experience implementing More ❯
will support the requirements of the 33 Cyber Operations Squadron (33 COS) in efforts to provide incident response on alerts from systems newly aligned to the Air Force Cyber Security Support Provider (CSSP) RESPONSIBILITIES: Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. Characterize and analyze network traffic to identify anomalous activity … and potential threats to network resources. Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Coordinate with enterprise-wide cyber defense staff to validate network alerts. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to … the environment. Identify and analyze anomalies in network traffic using metadata. Identify applications and operating systems of a network device based on network traffic. Perform cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. More ❯
incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and/… or security updates for designated sites, and execute monthly security scans. - Maintain a 24/7 presence for system administration and maintenance support. What you will bring - TS/SCI with Full Scope Polygraph clearance. - 8570 IAT II minimum (Sec+ or equivalent). - Minimum 8-10 years of experience providing support for users and monitoring/optimizing systems … of experience in Linux or Unix server administration using RHEL and/or CentOS within an enterprise environment. - At least 2 years working on Cisco and/or Juniper network switches, routers, and firewalls (or similar enterprise vendors). - Hands-on experience managing YUM repository. - Advanced PowerShell or Bash scripting. - Practiced understanding of software and security architectures such More ❯
Ops lead to work in Albuquerque, New Mexico. To join our team of outstanding professionals, apply today! Responsibilities Lead Tier-2 and higher cybersecurity operations, ensuring 24/7 security monitoring and rapid response to threats. Analyze security alerts, intrusion attempts, and advanced persistent threats (APTs) to mitigate risks. Coordinate incident response efforts, investigating security events and … implementing corrective actions. Manage and maintain firewalls (Cisco ASA, Palo Alto, or equivalent), intrusion detection/prevention systems (IDS/IPS), and security logs to ensure compliance and security integrity. Utilize SIEM tools to correlate security logs, identify anomalies, and proactively address vulnerabilities. Conduct log analysis, security forensics, and root cause investigations for cyber incidents. Information … Assurance (IA) Policy & Compliance Ensure compliance with DoD, DOE, and Law Enforcement cybersecurity regulations, including RMF, NIST 800-53, and FISMA. Develop, implement, and enforce IA policies, security guidelines, and best practices to safeguard IT systems. Oversee patch management, system hardening, and vulnerability scanning to maintain compliance. Conduct regular audits, risk assessments, and security control evaluations to identify More ❯
ensuring that project management best practices are followed by performers and independent verification and validation entities funded by DARPA. The ideal candidate should possess technical expertise and experience in network engineering of DOD classified networks, notably the design, implementation, operations, and maintenance of enterprise, tactical, or expeditionary communications networks. Exemplary candidates will have demonstrated success with learning new subjects … mitigate risks to critical assets and operations. • Evaluate emerging technologies, prototype novel solutions, and contribute to the development of advanced resilience strategies. • Leverage expertise in cryptography, data analytics, and networksecurity to enhance the program's capabilities in threat detection, analysis, and mitigation. • Contribute to the design, development, and execution of red teaming exercises to proactively identify and … of cryptographic systems, key management, and cryptographic modernization initiatives. • Data Analytics: Expertise in leveraging data analytics techniques for threat detection, anomaly detection, and predictive modeling. • Networking: Comprehensive knowledge of network protocols, architectures, and security best practices for both traditional and software-defined networks. • Prepare and deliver technical reports, briefings, and presentations to senior government officials and technical stakeholders. More ❯