Title: Network Engineer IV Location: Colorado Springs, CO Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph Job Details: Develop system specifications, architecture designs, integration and test plans, and all relevant documentation Develop risk management and mitigation strategy Maintain compliance with QA standards as well as ensuring service performance indicators are met or exceeded … Change Requests (CRQs) and determining impacts on transport activities across the enterprise while providing technical solutions and cost impacts Experience in complex telecommunications applications involving all phases of telecommunications network design, implementation, and analysis Focus will be on requirements analysis, development and implementation Engineer and implement solutions for projects based on customer CRQs Serve as the technical representative for … to standards Manage requirements traceability information and track requirements status throughout the review process Identify requirement errors and defects, and write response statements to appropriate owners/organizations Support network traffic analysis and bandwidth optimization efforts to ensure attainment of performance and availability objectives Evaluate and report on new/emerging network/communication technologies to enhance capacity More ❯
Title: Network Engineer III Location: Colorado Springs, CO Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph Job Details: Develop system specifications, architecture designs, integration and test plans, and all relevant documentation Develop risk management and mitigation strategy Maintain compliance with QA standards as well as ensuring service performance indicators are met or exceeded … Change Requests (CRQs) and determining impacts on transport activities across the enterprise while providing technical solutions and cost impacts Experience in complex telecommunications applications involving all phases of telecommunications network design, implementation, and analysis Focus will be on requirements analysis, development and implementation Engineer and implement solutions for projects based on customer CRQs Serve as the technical representative for … to standards Manage requirements traceability information and track requirements status throughout the review process Identify requirement errors and defects, and write response statements to appropriate owners/organizations Support network traffic analysis and bandwidth optimization efforts to ensure attainment of performance and availability objectives Evaluate and report on new/emerging network/communication technologies to enhance capacity More ❯
Requisition Number: 23074 Required Travel: 0 - 10% Employment Type: Full Time/Hourly/Non-Exempt Anticipated Salary Range: $121,248.00 - $150,000.00 Security Clearance: TS/SCI Level of Experience: Senior This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR … systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Meet HII's Mission Technologies Division Our team of more … advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest More ❯
Ft. Shafter Flats, Hawaii SteelGate LLC is hiring a full-time Network Engineer to join our team. In this role you will be supporting the US Army Reserves. The US Army Reserves manages all C4IM missions and C4IM Service and Support for the Pacific. The US Army Reserves provides direct C4IM support to the Headquarters and staff elements, Direct … Reporting Units (DRU) on network functions pertaining to Operations and Plans, Network Operations, and Unified Communications. Strategic, tactical, and base sustaining C4IM support during peacetime and contingent operations are executed in support of all USAR units in the Pacific. The US Army Reserve provides mission command sustainment through the Pacific LandWarNet (PLWN) for assigned and attached USAR units … applications and services will severely degrade operations and missions in support of the US Army Reserve Mission throughout the Pacific Theater of Operations (PTO). Tasks include: • Provide ongoing network support, addresses availability issues, overcome performance problems, and provide overall level 2 support. • Manage network performance, diagnose performance problems, and undertake tuning activities to ensure network performance More ❯
Weeghman & Briggs is seeking Digital Network Exploitation Analysts/DNEA of multiple levels. Join our growing team and support an important mission within the Federal Government. Location: Annapolis Junction & Utah (DNEA3) Clearance Required: TS/SCI w/Polygraph As a Digital Network Exploitation Analyst, your responsibilities will include: evaluate target opportunities using all source data to understand … and map target networks, and to assist in developing detailed exploitation and operations plans. analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network. be involved in … Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may More ❯
clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM is looking for a Cyber Network Defense Analyst 3 . This position will support one of our Government clients in Arlington, VA. Responsibilities The majority of the CNDA's time (75%) will be spent executing … the following tasks: Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources Coordinate with enterprise-wide cyber defense staff to validate network alerts Document and escalate incidents (including the event's history, status, and potential impact for further action) that may cause an ongoing and immediate impact on the environment Perform … correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack Provide daily summary reports of network events and activity relevant to cyber defense practices Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts Provide timely detection More ❯
Aperio Global is seeking Digital Network Exploitation Analysts (DNEAs) to support our IC program in Fort Meade, Maryland. The DNEA role involves evaluating target opportunities, understanding and mapping target networks, and developing detailed exploitation and operations plans, using various sources of data. The role requires analyzing SIGINT and cybersecurity data at different OSI network levels and possessing knowledge … of logical/physical IP core infrastructure, communication devices, and network traffic patterns. The candidate should actively contribute to the development of new tradecraft for analysis as technology evolves. Collaboration with a team to understand intelligence needs, mission relevance, and areas of expertise is essential. Additionally, the job involves using analytical skills and curiosity to form hypotheses, choose appropriate … insights from data, which will be documented, contextualized, and shared with teammates, stakeholders, and intelligence consumers. Analyzes SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and brings a solid understanding of logical/physical IP core infrastructure, communication devices, and how they connect to networks, as well as the traffic movements in a More ❯
Job Summary We are seeking a skilled and dedicated Information Systems Security Engineer to join our team. In this role, you will be responsible for safeguarding our organization's information systems and ensuring the integrity, confidentiality, and availability of data. You will work closely with IT teams to implement security measures, respond to incidents, and maintain compliance with … industry standards. Responsibilities Design and implement security protocols to protect sensitive information across IT infrastructure. Monitor networksecurity and conduct vulnerability assessments to identify potential threats. Manage incident response activities, including investigation and remediation of security breaches. Develop and maintain disaster recovery plans to ensure business continuity. Collaborate with cross-functional teams to integrate security into CI/CD pipelines. Utilize tools such as PRTG for network monitoring and performance management. Document security policies, procedures, and incident reports for compliance purposes. Stay updated on the latest cybersecurity trends, threats, and technologies. Requirements Active Secret Clearance Bachelors Degree with 5 years experience 2+ years experience in cybersecurity or information assurance in a DoD More ❯
Position: Security Engineer II Location: Washington, DC (Potential for Hybrid) Clearance: Public Trust "Must hold an active Public Trust clearance to apply" THE OVERALL PURPOSE OF POSITION: The purpose of the Security Engineer II position is to evaluate, implement, maintain, and monitor IT security measures across the organization. The individual in this role is responsible for reviewing … and accessing security vulnerabilities across customer applications SCOPE OF WORK • Three (3) to Four (4) years of directly related • experience. • Three (3) + years of advanced computer expertise. • Three (3) + years of IT networksecurity knowledge and • implementation experience (e.g. firewalls, secure topologies/architectures, SIEM Tools, intrusion detection, Microsoft and • UNIX OS security) • Three … + years of experience with MS Office Professional tools suite, security incident/forensics, and • system administration for Unix and/or Microsoft operating systems. Experience with system baseline configurations. • Knowledge of IT security policy and standards development and POA&M tracking and remediation. • Experience and/or • familiarity with Websense configuration/maintenance, security information/ More ❯
Job Number: 96 Job Category: GovTech Job Title: INFORMATION SECURITY ANALYST Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and implement … risk mitigation strategies Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Work with … ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of computer/ More ❯
R- Description Leidos is seeking multiple Security Control Assessors to support our assessment team. These positions can be based out of any of our three locations - Alexandria, VA, Fort Meade, MD, or Chambersburg, PA. These positions are primarily on-site, but partial telework may be available at the discretion of our customer and program management. Significant travel may be … systems and Defensive Cyberspace Operations using cyber threat emulation and performance-based testing. Adhere to policies and processes for each assessment type. Support assessment development and execution to ensure security expertise is properly applied. Coordinate logistics, test plans, and scope with the SCA Team Lead. Perform vulnerability assessments, capture results using STIG Viewer or designated tools, and document findings … in eMASS. Analyze security gaps and provide mitigation recommendations. Validate cybersecurity controls, TTPs, STIGs, RMF controls, and compliance with DoD policies and guidelines. Provide risk analysis and assessment results for authorization recommendations. Participate in daily assessment reviews, in-briefs, and out-briefs, sharing findings with the SCA-R. If senior staff, mentor and guide personnel by providing technical expertise More ❯
personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with restoring services. Responsibilities: - Providing support to plan, coordinate, and implement the lab's information security - Providing support for facilitating and helping the lab identify its current security infrastructure and defining future programs, design, and implementation of security related to lab systems - Assisting … the efforts of security staff to design, develop, engineer, and implement solutions to security requirements - Responsible for implementing and developing the DHS IT security - Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs - Performing risk analyses, which also includes risk assessment - Providing support to plan, coordinate … and implement the lab's information security - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design, and implementation of security related to lab systems - Possessing and applying expertise on multiple complex work assignments that are broad, requiring originality and innovation in determining how to accomplish tasks - Can apply More ❯
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical … Provides technical targeting and all-source intelligence analysis to support the Client across the entire intelligence lifecycle. Delivers expertise in areas such as threat analysis, cybersecurity, signals analysis, and network intrusion, delivering mission-critical support for every aspect of the mission. About The Role The Cyber Security Engineer monitors, analyzes, and detects cyber events and incidents within information … a relevant technical field, or 4 additional years of relevant technical experience may be accepted in lieu of degree; 3+ years of experience across technical competencies, such as: analysis, network engineering, networksecurity, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 1+ years of experience across three More ❯
Overview Astrion is seeking a Senior Cyber Security Designer - FRCS (Facility-Related Control Systems) to support the US Space Force (USSF) and the Office of the Secretary of Defense (OSD) Operational Energy-Innovation (OE-I) office in a variety of operational energy projects in the Pentagon Washington DC. The ideal candidate will have experience in client-facing Cybersecurity design … and projects for new and existing installations, renovations, and system upgrades. Staff work includes cybersecurity of DAF Facility Related Control Systems (FRCS), assessing risk and driving IT/OT networksecurity and secure service hosting designs. Candidate is expected to meet and maintain IAT/IAM DoD Level 3 requirements (DoD 8570 Baseline) and have proficiency in the … needs. Primary Duties and Responsibilities: Participates in development and staffing of strategies, plans and programs, including technology and infrastructure projects, providing subject matter expertise (SME) on FRCS infrastructure, including network and data security design, operations concepts, and multi-discipline coordination across the DAF installations and facilities. Supports DAF in ensuring new and existing projects involving IT/OT More ❯
for new technology insertion by keeping up with new technologies and capabilities such as encryption, transport, networking, and routing, among other duties. Support the development or modification of System Security Plans (SSPs), security requirements, and other supporting documentation for the Assessment and Authorization process. Assist projects in determining their security requirements by analyzing projects' business needs and … helping evaluate industry offerings to identify products that meet security requirements. Develop and implement test plans for commercial off-the-shelf (COTS) and custom-developed systems. Collaborate with stakeholders to create and perform quality control on Sponsor's partners' RMF body of evidence documentation. Review assessment reports and assist projects in identifying security risks (technical and non-technical … and developing effective mitigation strategies such as Plans of Action and Milestones (PoAMs). Ensure the project completes mitigation strategies as scheduled to ensure timely delivery to customer. Provide security review and approval for changes to accredited systems, such as installation of new software and opening new ports, and determination of Security-Relevant Changes. Provide security review More ❯
Security Information & Event Management (SIEM) Team Lead Schriever Space Force Base Colorado Springs, Colorado HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently seeking a … Security Information and Event Management (SIEM) Team Lead to support the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. This position plays a key role in the engineering, operation, sustainment, and management of cyber defense tools, supporting the Missile Defense Agency (MDA) in a fast-paced and evolving environment. Essential Duties and … mitigation of cyber threats, ensuring the protection of critical infrastructure and key resources. Facilitate the design, implementation, and maintenance of applications using Kubernetes, monitoring of systems for stability and security, and mentor personnel to ensure the smooth operation of the cyber defense infrastructure. Be responsible for the personnel assigned to this team along with the daily/weekly/ More ❯
Description of Duties: The Security Information and Event Mgmt (SIEM) Team Lead supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. This position plays a key role in the engineering, operation, sustainment, and management of cyber defense tools, supporting the Missile Defense Agency (MDA) in a fast-paced and evolving environment. … mitigation of cyber threats, ensuring the protection of critical infrastructure and key resources. Facilitate the design, implementation, and maintenance of applications using Kubernetes, monitoring of systems for stability and security, and mentor personnel to ensure the smooth operation of the cyber defense infrastructure. Be responsible for the personnel assigned to this team along with the daily/weekly/… and sustaining a dedicated cyber defense infrastructure Participate in system design consulting, platform management, and capacity planning The successful candidate will have: Have a strong background in containerization technologies, networksecurity, and cybersecurity principles, the successful candidate Have knowledge in containerization technologies like Docker, Kubernetes architecture, and cloud platforms. Be skilled in troubleshooting and diagnosing cyber defense infrastructure More ❯
Piper Companies is looking for a CLEARED Senior Information Security Engineer to join DoD consulting company. This is based in Aberdeen Proving Ground, MD (APG) and fully onsite. Essential Duties of the Sr InfoSec Engineer: Provide engineering and analysis support in support of cybersecurity requirements per AR 25-2. Provide tailored C5ISR engineering analysis concerning Cybersecurity integration. Areas … of focus may include communications security development and engineering support as well as programmatic and technology development for external organizations, including joint programs. Technical subject areas include encryption technologies, communications security/transmission security, satellite networksecurity, cellular, radio and Tactical Internet security and cross-domain solutions. Provide desktop hardware and software support, to … include inter-operable and integrated standard office automation desktop software support. Qualifications of the Sr InfoSec Engineer: 5+ years of security engineering experience. Must be able to obtain and maintain an active Top Secret or TS/SCI clearance. Certifications such as Security+, CISSP, CySA+, CASP, CCNA Security (Any cert that meets IAT Level II or Level III More ❯
only drive business success but also support our overall mission to uplift economically disadvantaged Native Hawaiian families and preserve the Native Hawaiian heritage. You Are An experienced Information System Security Officer (ISSO) with a laser focus on protecting sensitive systems and ensuring regulatory compliance in high-stakes environments. You thrive on solving complex security challenges, translating policies into … actionable security procedures. You are agile and strategic while managing daily security operations, responding to incidents under pressure, and contributing to long-term cybersecurity planning. How You Will Make an Impact You'll serve as a key security authority and trusted advisor, helping secure sensitive systems and fortify the network from evolving threats. Shaping and enforcing … and MHS. Use DoD and MHS approved vulnerability assessment and mitigation tools to identify vulnerabilities, apply mitigation, and to identify potential areas of weaknesses in the IA programs. Identify security problems and requirements through studies, analysis, and research. Responsible for disseminating information, policies, procedures, and/or guidance to superior and subordinate units and for the management of tasks More ❯
Job Title: Information Systems Security Engineer L2 -5996 Job Location: Colorado Springs, CO 80919 Job Salary: $130,000 - $150,000 Job Summary Galapagos Federal Systems LLC is seeking a skilled and proactive Information Systems Security Engineer (ISSE) Level 2 to support the United States Space Force (USSF). This role offers a unique opportunity to contribute directly to … DoD) and Intelligence Community (IC) standards, solid technical expertise, and excellent communication skills-someone who thrives in a fast-paced, mission-focused environment. Skills/Experience Required Information Systems Security Engineer L2 Skills and Experience: Active Top Secret/SCI clearance Over 5 years of cybersecurity experience, supporting DoD and/or Intelligence Community (IC) information assurance (IA) activities … in alignment with the Risk Management Framework (RMF) for mission-critical defense programs Proven expertise in applying IT security controls to ensure the confidentiality, integrity, and availability of system data and resources, securing necessary approvals from configuration managers Strong analytical and engineering skills, with experience evaluating hardware and software designs to deliver technical recommendations that enhance system and networkMore ❯
environment, operating at massive levels of scale. Businesses, from start-ups to enterprises, run their operations and applications on AWS' multi-tenant infrastructure. Key job responsibilities As a Senior Security Engineer, you'll help to build and manage services that detect and automate the mitigation of cybersecurity threats across Amazon's infrastructure. You'll work with data scientists, software … development engineers, and other security engineers across multiple teams to develop innovative security solutions. Our services protect the AWS cloud for all customers and preserves our customers' trust in us. You'll get to use the full power and breadth of AWS technologies to build services that proactively protect AWS customers, both internally and externally, from security threats. You will be working in a team of industry-leading security experts working with UK customers to operate and continuously improve industry-leading security programs and processes. This team manages the underlying security programs and processes for personnel security, physical and logical accreditations, education, awareness and training, assurance, and cyber security. This position will More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
Novacoast Staffing is excited to announce an opportunity for a dynamic Prisma Cloud Platform Security Engineer. In this role, you'll be the cornerstone of our client's security and compliance initiatives in the Public Cloud. This position requires a seasoned professional with a deep understanding of cloud security who thrives in a HYBRID work environment. This … onsite 2-3 days/week. This is a contract position available on W2 only. We're seeking individuals with exceptional Prisma Cloud expertise complemented by a substantial cloud security background. Together, we're ready to navigate the digital security realm. Key Responsibilities: Act as the primary technical authority in securing and ensuring compliance across various Public Cloud … clients to support their development objectives. Engage deeply within Docker and Kubernetes environments, assisting clients in optimizing their containerization and orchestration processes. Configure, implement, and manage the maintenance of Security Operating Platforms, tailoring solutions to align with client security requirements. Requirements: Solid experience in IT/operations engineering, consulting, or similar roles, with a robust background in Information More ❯
Senior Information Systems Security Engineer Cyber Security V Redstone Arsenal Huntsville, AL HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently seeking a qualified … Senior Information Systems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program and enterprise requirements, policies, standards … guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of threats, and More ❯
Senior Information Systems Security Engineer Cyber Security V Schriever Space Force Base Colorado Springs, CO HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently … seeking a qualified Senior Information Systems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program and enterprise … standards, guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of threats More ❯
Information Systems Security Manager - Level 3 Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a highly skilled and experienced professional to provide comprehensive management support for an organization's Information Assurance (IA) program. … The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibilities: The candidate will be responsible for managing the operational security posture of an Information System, ensuring compliance with established policies, procedures, and standards. In this role, the … candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security authorization activities, including preparation and review of critical documentation such as System SecurityMore ❯