Manassas, Virginia, United States Hybrid / WFH Options
Centene
a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy … execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake. Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity. ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for … of this position. Technical Skills: Proficiency in Databricks platform Advanced data pipeline design and development Data quality and governance Machine learning model development and maintenance Data integration processes Data security and privacy regulations Data visualization tools development Data warehouse and data mart design and development ETL (Extract, Transform, Load) processes. Data governance and compliance Proficiency in SQL and Python More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
Centene
a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy … execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake. Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity. ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for … of this position. Technical Skills: Proficiency in Databricks platform Advanced data pipeline design and development Data quality and governance Machine learning model development and maintenance Data integration processes Data security and privacy regulations Data visualization tools development Data warehouse and data mart design and development ETL (Extract, Transform, Load) processes. Data governance and compliance Proficiency in SQL and Python More ❯
Richmond, Virginia, United States Hybrid / WFH Options
Centene
a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy … execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake. Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity. ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for … of this position. Technical Skills: Proficiency in Databricks platform Advanced data pipeline design and development Data quality and governance Machine learning model development and maintenance Data integration processes Data security and privacy regulations Data visualization tools development Data warehouse and data mart design and development ETL (Extract, Transform, Load) processes. Data governance and compliance Proficiency in SQL and Python More ❯
Virginia Beach, Virginia, United States Hybrid / WFH Options
Centene
a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy … execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake. Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity. ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for … of this position. Technical Skills: Proficiency in Databricks platform Advanced data pipeline design and development Data quality and governance Machine learning model development and maintenance Data integration processes Data security and privacy regulations Data visualization tools development Data warehouse and data mart design and development ETL (Extract, Transform, Load) processes. Data governance and compliance Proficiency in SQL and Python More ❯
Newport News, Virginia, United States Hybrid / WFH Options
Centene
a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: This role will support the Threat Infrastructure Security tools in the Centene environment. This role's focus will be Data engineering/science for a Security Data Lake and automation projects. This role includes: develop strategy … execute design and implement efficient data pipelines to ensure a smooth flow of information into the Security Data Lake. Data Storage and Management: Store and manage the data the ingested data. This involves optimizing data schemas and ensuring data quality and integrity. ETL (Extract, Transform, Load) Processes: Design ETL pipelines to transform raw data into a format suitable for … of this position. Technical Skills: Proficiency in Databricks platform Advanced data pipeline design and development Data quality and governance Machine learning model development and maintenance Data integration processes Data security and privacy regulations Data visualization tools development Data warehouse and data mart design and development ETL (Extract, Transform, Load) processes. Data governance and compliance Proficiency in SQL and Python More ❯
VPN (IPSec, IKE) technologies. Strong understanding and hands-on experience on firewall vendors, ideally Check Point and Fortinet. Knowledge about Load Balancing, ideally F5 vendor. Familiar with any other Security Solutions e.g. IPS, Web Proxies, EDR Strong troubleshooting skills. Be able to work in high-pressure, fast-paced and multi-tech environments. Experience designing network and security solutions. More ❯
State Street Identity and Access management (IAM) engineering team is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. This role will have a broad range of responsibilities within IAM. More ❯
Requisition Number: 23529 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $87,989.00 - $125,000.00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works … advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest … the ability to work as part of a team required Good analytical, critical thinking and problem solving skills Must be able to obtain and maintain a TS/SCI security clearance with advanced security checks Secret clearance minimum to start Preferred Requirements Experience with DoD sensor and weapon system engineering and devolvement desired Hardware and/or software More ❯
Description ICF International seeks an experienced and cleared Senior Databricks Engineer with cyber security experience to support the research and development of new cyber analytic capabilities that will help the US protect and defend its networks and critical information systems. The Senior Databricks Engineer will support a large federal cyber security analytic program. Your work will … are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Senior Databricks Engineer, you will work with our customers, program subject matter experts, and researchers to evolve, automate, and enhance cybersecurity capabilities. Additionally, you will provide support to a variety of teams … National Capital Region (Washington, DC Metro area). What You Will Be Doing: Perform knowledge elicitation from customer subject matter experts and convert that to build analytic solutions Design, engineer, and optimize sustainment of large-scale distributed computation platforms and supporting environment (ecosystems) for various stakeholders, business owners, and industry partners Work closely with cyber personnel to understand manual More ❯
Title: Cybersecurity Engineer Software Defined Perimeter Location: Alexandria, VA Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph Overview: The Cybersecurity Engineer with specialty focus on network packet broker provides technical security engineering delivery leadership in several network areas of expertise, such as SD-WAN, SATCOM, and 5G. The candidate will be … increase the stability, reliability, and interoperability of customer networks. The ideal candidate will collaborate with other functional and technology leaders to define and execute business priorities. Job Details: • Perform security engineering, develops security architecture artifacts, oversee penetration testing and security exercises, supports hybrid cloud and network security, and automates security compliance for LAN/WAN … solutions deployed in a hybrid cloud environment • Engineersecurity into LAN and WAN system design, performing internal cyber hunt activities, and tailoring Zeek-based security sensors to feed SIEM and SOAR Splunk components • Engineersecurity into WAN/LAN monitoring fabric tools such as Arista, Cisco, and Extreme Networks • Collaborate in engineering and modeling securityMore ❯
Position: Information System SecurityEngineer (ISSE) Overview: Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Information System SecurityEngineer (ISSE) onsite in Denver, CO with a Secret Clearance or Higher. The ideal candidate will have a strong background in security engineering, risk management framework … and hands-on experience with ELK Stack (Elasticsearch, Logstash, Kibana) for log analysis. Responsibilities: • Design, test and implement secure operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research … evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. • Configure and utilize the ELK Stack for centralized logging, analysis and security monitoring. Qualifications: • Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline. • 3-5+ years of experience in information security, cybersecurity, or related More ❯
level Network Vendor Certification is required prior to onboarding from one of the following Vendors: Cisco, Juniper, Aruba, F5, Palo Alto, McAfee, Trellix. Position/Role: Transport Operations Network Security & Information Assurance Engineer proficient in network security technologies (i.e. Firewalls, DMZ, IPS, VPN). Responsible for designing, implementing, and maintaining robust & mature global network security solutions. … environments, configuring IPS, engineering secure VPN solutions, and administering Cisco network appliances will be crucial. Collaborate with engineering and project management teams to safeguard network infrastructure threats. • Provide Network Security and Network Engineering expertise (SME). • Responsible for network modification, design, integration, test, security, and implementation of Transport Services for the as-fielded NMCI network. • Collaborates with the … Network Operations Center, Network Administrators, and Network Engineering Team to define and/or continuously improve: -Network Security Appliances (i.e. IPS, DMZ, VPN, Firewalls, Load Balancers) -Test and Validate Automation and best practice insertion opportunities. -Continuous Service Improvements (CSI) -Create and maintain Engineering Implementation Plans (EIP More ❯
Cyber SecurityEngineer (Splunk) Senior and SME level positions available Top Secret Clearance is required Huntsville, AL ALTA IT Service is seeking a highly skilled and knowledgeable CyberSecurity Engineer - Senior Level to support a 24x7x365 Watch Floor team and safeguard the confidentiality, integrity, and availability of an organization's information assets. This position is located on a … customer site in Huntsville, AL or Clarksburg WV. Responsibilities include but are not limited to: • Develop, upgrade, and enhance the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration • Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms … Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) and Endpoint Detection and Response (EDR) capabilities. • Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.) • Monitor security events and alerts, conducting detailed analysis to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
AWD online
Cyber SecurityEngineer/Network Engineer who has experience working in cyber security, system engineering, or a similar role, with hands-on knowledge of security tools such as anti-malware, content filtering, SIEM and threat detection solutions is required to join our team at a well-established charity. SALARY: £45,000 - £48,000 per annum … JOB TYPE: Full-Time, Permanent WORKING HOURS: 35 Hours per Week, Monday - Friday, 9:00am - 5:00pm JOB OVERVIEW We have a fantastic new job opportunity for a Cyber SecurityEngineer/Network Engineer who has experience working in cyber security, system engineering, or a similar role, with hands-on knowledge of security tools such … as anti-malware, content filtering, SIEM and threat detection solutions. Working as the Cyber SecurityEngineer/Network Engineer which the organisation calls a SecurityEngineer, you'll be at the frontline of the cyber defence, working closely with the Security Operations Manager to monitor, maintain and enhance security tools and services. You More ❯
Description The Information Systems SecurityEngineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/… or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and More ❯
Information Systems SecurityEngineer MUST HAVE A TS/SCI Poly The Information Systems SecurityEngineer (ISSE) provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Provide analytical and technical security recommendations to the customer Lead the identification of projects' security requirement Participate in … network design reviews and security testing for the customer's networks Coordinate with system development teams to ensure network security standards are followed and implemented correctly Identify additional security requirements, based on RMF or as the result of security issues that put the customer's systems at risk Reviews and analyzes new systems (hardware and software … and provides recommendations concerning system security Review Security Requirements Traceability Matrixes (SRTMs), System Security Plans (SSPs) and other IA documentation for completeness Provide A&A and RMF guidance to system owners to ensure accreditation success Qualifications: Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated Polygraph Bachelors of Science Degree in Science, Technology, Engineering More ❯
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber SecurityEngineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with More ❯
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber SecurityEngineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with More ❯
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber SecurityEngineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with More ❯
Description SAIC's Space & Intel Business Group, USG Mission and Information Technology Division, is seeking a Cyber SecurityEngineer to provide information security support. This position is in Reston, VA and requires an active TS/SCI clearance with Polygraph. This Customer's office is the force of choice for the development of global infrastructure and delivery … of solutions that drive influence operations. If you have specialized skills in information security and tech ops, this is the role for you. Job responsibilities include, but are not limited to: Provide physical and environmental protection, personnel security, incident handling, and security training and awareness in regards to information security. Support the maintenance, deployment, and security … and ISO in monitoring the information system(s) and its environment of operations to include developing and updating the authorization documentation, and implementing configuration management across authorization boundaries. Assess security impacts of changes and make recommendations to the ISSM. Qualifications Active TS/SCI with Polygraph. Bachelor's degree and 9 years or more experience; Master's degree and More ❯
SecurityEngineer - Product & Production Infrastructure Remote - United Kingdom Product Security Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses. Trusted by security teams all over … to our record growth. Come join our team and help us create secure cloud environments that allow the best companies to move faster. SUMMARY Wiz is looking for a SecurityEngineer for Product & Production Infrastructure who has experience performing security reviews, vulnerability management, and detection and response operations in cloud-native environments. You'll get to collaborate … also have the opportunity to influence our product roadmap by utilizing Wiz-for-Wiz to assess, monitor, and harden our environments. WHAT YOU'LL DO Lead threat modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive vulnerability management and More ❯
Mid-level, FIPS 140 SecurityEngineer & CVP Certified Tester Work model: REMOTE Department: FIPS/Testing Location: Columbia, MD Role Type: Contract No Clearance Required Not available on C2C contract basis Not able to provide sponsorship About Our Client Our client offers an exciting opportunity to work in the rapidly expanding IT Security field, integral to supporting … national defense initiatives. This organization plays a crucial role in ensuring national security by evaluating and validating IT security products that are deployed to facilitate secure communications for military and defense systems. You will join a team of industry experts and work with a wide range of Commercial Off-The-Shelf (COTS) products across various technology types in … company fosters a supportive culture with performance-based career development, flexible hours, work-life balance, and opportunities for continuous learning and professional growth. Job Description As a FIPS 140 SecurityEngineer, you will be a vital member of a dedicated team focused on performing in-depth security evaluations and validation projects. Your day-to-day work will More ❯
ARS is seeking a full-time mid-level Cyber SecurityEngineer to support a cloud services team. The Cyber SecurityEngineer's primary functions will include conducting comprehensive Risk Management Framework (RMF) assessments to include preparation, execution, and documentation to support Authorization and Accreditation (A&A) of next-generation autonomous unmanned systems. The Cyber SecurityEngineer will conduct comprehensive technical analysis of system design and system architecture to identify and remediate vulnerabilities. Must possess an active secret clearance. Why Work with us? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. … Use digital content management and web-authoring skills and tools to create interactive and automated functions to aid in team-wide information sharing Facilitate the implementation and operationalization of security technologies and controls to protect critical DoD systems Assist in conducting system analysis to identify and protect Critical Program Information (CPI) and Critical Information (CI) Assess security events More ❯
Labor Category: Cyber SecurityEngineer Position Title: Cyber Security Project Engineer Position Level: Level 1 - Subject Matter Expert Salary: Up to $185,000.00 per year Core Hours: 9am to 4pm Location: Tysons VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. Cyber Security Project Engineer Details: Labor Category: Cyber … SecurityEngineer Position Title: Cyber Security Project Engineer Position Level: Level 1 - Subject Matter Expert Salary: Up to $185,000.00 per year Core Hours: 9am to 4pm Location: Tysons VA Mandatory Requirements: • Demonstrated experience bringing programmatic discipline to the management of a complex systems. • Demonstrated experience administering communications solutions. • Demonstrated experience administering beaconing solutions • Demonstrated experience … schedule with comp time (with customer approval) Tuition and Training: Free CBTNuggets Online Training Account - More than 200 online IT courses on a large variety of topics, including networking, security, virtualization, and the cloud - Cisco, Microsoft, and Google - Virtual Labs Free L inux Academy Online Training Account Internal Tracking -GV-2416-02/2893 If you would like to More ❯
As a Network Security Systems Engineer, you will leverage your deep expertise in network architecture, advanced security protocols, and DoD systems to inform the design, implementation, and defense of secure networks critical to national security. You will play a crucial role in the analysis and mitigation of vulnerabilities in software designs, development of innovative software security solutions, and the integration of secure coding practices and architectures for applications and systems. Responsibilities: • Provide expert technical guidance in the architecture, implementation, and security assessment of secure networks • Guide comprehensive security audits, penetration testing, and risk assessments, proactively identifying vulnerabilities and developing sophisticated mitigation strategies • Shape the design and implementation of cutting-edge security solutions … development of technical requirements and specifications for secure network design in alignment with industry best practices, government regulations, and certification standards • Collaborate with engineers and stakeholders to transition prototype security solutions into operational systems • Proactively research and analyze emerging threats and vulnerabilities, staying ahead of adversaries to maintain a proactive security posture Requirements: • Demonstrated expertise designing, implementing, and More ❯