an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerabilityassessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
/GCVE). - Dell's Superna Eyeglass Suite, including Superna Ransomware Defender for proactive ransomware detection, response, and forensic analysis within storage environments. - Cyber defense management including threat detection, vulnerabilityassessment, incident response, and forensics as they pertain to storage systems and data. - Data Vaulting solutions for secure, immutable storage, including air-gapped and logically isolated storage vaults More ❯
values is an essential condition of employment. Responsibilities What You'll Do Lead the implementation and management of SIEM systems, Fortinet tools, and endpoint detection & response (EDR) solutions. Conduct vulnerability assessments and penetration testing to stay ahead of cyber threats. Strengthen identity and access management (IAM) through Active Directory, Entra ID, MFA, and Zero Trust principles. Safeguard networks with More ❯
NSS continuous monitoring activities. • Research, develop, and implement policies to improve the effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor … and threat trends. • Actively participate in security meetings, including engineering review boards and cybersecurity supply chain risk management (C-SCRM) sessions, to inform and support NSS initiatives. • Develop automated assessment tools and dashboards to support continuous monitoring and ongoing authorization processes, leveraging tools like Splunk, Tenable, and Axonius. Basic Qualifications: • Bachelor's Degree in Information Technology, Cybersecurity, or a … to apply them to secure National Security Systems. • Strong background in cybersecurity risk analysis and reporting, with experience in creating detailed BoE artifacts. • Proficiency in using cybersecurity tools for vulnerability scanning and continuous monitoring. • Local to D.C. or Virginia with ability to work on-site for classified work. Preferred Qualifications: • Expertise in conducting SCAs and cybersecurity assessments for NSS More ❯
Lead Risk Management Framework (RMF) processes ensuring compliance with NIST standards and DoD directives • Develop and maintain Certification and Accreditation (C&A) packages for classified information systems • Prepare Risk Assessment Reports and System Requirements Traceability Matrices (SRTMs) Operational Security Excellence • Maintain day-to-day security operations for multiple information systems processing classified data • Evaluate and implement security solutions meeting … stringent requirements for classified information processing • Perform continuous vulnerability and risk assessments supporting ongoing authorization activities • Manage configuration control for security-relevant hardware, software, and firmware • Assess security impacts of system changes and coordinate remediation efforts Technical Security Management • Administer user identification and authentication mechanisms across diverse platforms • Maintain detailed records on security infrastructure including workstations, servers, routers, firewalls … DoD 8570 compliance with IAM Level I or higher (CAP, CND, GSLC, CISM, CISSP, or equivalent) • Clearance: Active security clearance with ability to maintain Technical Expertise • Proficiency with security assessment and authorization tools, particularly LatteArt, ScanBoy, Biscotti, Sear, and Exacta • Deep understanding of NIST Risk Management Framework and continuous monitoring strategies • Expert knowledge of Zero Trust architecture principles and More ❯
cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous More ❯
and operating as intended during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to risk assessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other FBI assets … on-time with the highest quality • Must have excellent written communication skills as the candidate's job will include written interaction with senior- level executives. • Well versed with using vulnerabilityassessment tools (NESSUS, AppDetective, etc.) and analyzing the results generated from these assessments. Minimum/General Experience: • B.S. degree required (B.S. degree may be substituted for 4 years More ❯
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … month(s) JOB DESCRIPTION: Job Summary:Cyber Security Engineering team for a Sr. Cyber Security Engineer ISSO position supporting the operations and maintenance of custom solutions and Assessment & Authorization (A&A) activities at Vandenberg Space Force Base (VSFB) in Vandenberg, California. The ideal candidate will have strong cyber experience across the full spectrum of cyber operations from a mission … execution perspective, to include vulnerability management, compliance management, database, and enterprise information security infrastructure. What You Will Do:Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerabilityassessment knowledge • Excellent problem-solving skills and ability to work collaboratively in a team environment • Effective communication skills to interact with diverse groups of technical and non-technical … Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetration testing and vulnerability assessments. Monitor and respond to security incidents in quantum environments. Develop and maintain security protocols and compliance frameworks. System Administration (20%) Manage and optimize Linux-based quantum computing platforms. More ❯
engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring More ❯
Working knowledge and/or familiarity with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerabilityassessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
Maintain classified and unclassified encryption systems Support cryptographic key management infrastructure Assist with security assessments of quantum communication protocols • Network Security and Testing (10%) Support penetration testing and vulnerability assessments Monitor and respond to security incidents in quantum environments Help maintain security protocols and compliance frameworks 3) System Administration (15%) • Linux System Administration (10%) Administer and optimize Linux-based More ❯
Oversee contractors and third-party delivery. Whats essential. Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetration testing and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365 More ❯
of, proactively hunting for threats, securing hybrid and multi-cloud environments, and ensuring compliance with industry best practices and regulatory frameworks. The Cloud Cybersecurity Engineer will lead efforts in vulnerabilityassessment, threat hunting, incident detection, and security automation while collaborating with cross-functional teams to safeguard mission critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures … in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetration testing to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and maintain security baselines, hardening guides, and compliance templates for cloud services. Automate … suspicious patterns, and emerging attack techniques. 5+ years of experience in cybersecurity engineering with a focus on cloud environments. Strong knowledge of security frameworks and best practices. Experience with vulnerability scanning, intrusion detection/prevention, and incident response. Familiarity with automation tools (Terraform, Ansible, or similar) and DevSecOps. Proficiency in analyzing security logs, network traffic, and attack artifacts. Strong More ❯
Rome, New York, United States Hybrid / WFH Options
Gridiron IT Solutions
with penetration testing or adversarial emulation Experience with NIST 800-53 security controls Knowledge of cyber threats and how to appropriately harden a system to prevent them Knowledge of vulnerabilityassessment tools, including Kali Linux, Wireshark, Tripwire, Burp Suite, and Metasploit TS/SCI clearance Master's degree OSCP, CISSP, CASP, Red Hat CSA, or GPEN Certification Clearance More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group Limited
following : In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles Experience with incident response, risk management, and vulnerabilityassessment Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) Experience in an organisation running or being part of an ISO27001 adoption project Incident management & change Management More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯