bonus + package Our client is a global security leader, operating at the cutting edge of digital transformation, cloud integration, and enterprise security. With a workforce of 7500+ cybersecurity specialists and strategic partnerships with top-tier security tech providers, they're redefining how enterprise-grade security is built, deployed, and continuously improved. They're now seeking a Security Development and More ❯
control, and visitor control protocols. • Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. • Collaborate with engineering, IT, and facility management teams to validate physical and cybersecurity postures. • Maintain documentation and provide reporting to internal leadership and government stakeholders. • Track regulatory and contractual requirements across multiple programs and advise stakeholders on compliance risk. • Serve as liaison More ❯
or Bash • Familiarity with cloud solution architectures and DevOps tools Why Join Us? • Meaningful work with a national impact • Supportive, mission-oriented culture • Opportunities for professional growth in cloud, cybersecurity, and infrastructure design • A chance to contribute to next-generation IT systems that keep our country secure More ❯
Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cybersecurity controls. Hands-on configuration and maintenance of live mission-critical networks and security tools. A strong understanding of network protocols, security architecture, and risk management. Imaging servers and storage More ❯
Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cybersecurity controls. Hands-on configuration and maintenance of live mission-critical networks and security tools. A strong understanding of network protocols, security architecture, and risk management. Imaging servers and storage More ❯
and support unified communications platforms (e.g., Teams, Skype for Business) Manage shared security services and endpoint infrastructure Implement and manage infrastructure as code (IaC) tools and templates Collaborate with cybersecurity teams to ensure compliance with NIST and DoD standards Qualifications: U.S. Citizen with Active TS/SCI Polygraph clearance 5+ years supporting cloud and enterprise infrastructure in federal or DoD More ❯
eligibility (or ability to obtain). Preferred Skills Prior experience testing within government or law enforcement environments. Familiarity with cloud testing platforms (AWS GovCloud, Azure Government). Experience in cybersecurity testing, vulnerability assessment, or penetration testing. Certifications such as ISTQB, CSTE, or technical certifications related to tools or CI/CD practices. More ❯
equivalent to 3 years of experience Relevant Masters/Doctoral Degree: equivalent to 2 years of experience Relevant Certifications: equivalent to 3 months of experience Proven ability to manage cybersecurity protocols, IT systems, and Assessment & Authorization (A&A) processes, ensuring compliance and security best practices. Skilled in the design, implementation, and management of secure and scalable cloud infrastructure solutions. Proficient More ❯
environments. Maintain accurate system and technical documentation. Ensure compliance with operational, security, and organizational processes. Plan, design, and implement software services. Perform OS patching utilizing RedHat Satellite servers. Analyze cybersecurity vulnerability scan reports and remediate vulnerabilities. Develop and analyze highly complex system standards, thresholds, and recommendations to maximize system performance. Serves as an extension of Tier 3 when resolving More ❯
Scott Air Force Base, Illinois, United States Hybrid / WFH Options
CEdge Software Consultants
Responsibilities: Responsible for working with network administration and system administration teams to ensure operational security of DoD networks and systems Install, configure, administer, and maintain DoD information assurance and cybersecurity tools including HBSS, ACAS, Nessus, Fortify, IDS systems, firewalls, etc. Continuously monitor systems for security, appropriate access per authorization, and configuration integrity Conduct vulnerability scans of software and systems More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Synertex LLC
TS/SCI clearance with CI Polygraph PREFERRED QUALIFICATIONS Experience supporting DoD or DIA missions Familiarity with the MARS, MIDB, or OB intelligence domains Additional training or certifications in cybersecurity, cloud platforms, or advanced analytics Experience developing solutions for Space/Counterspace or Intelligence Mission Data (IMD) systems Join a mission-driven team advancing defense intelligence capabilities through scalable data More ❯
Demonstrated experience optimizing connectivity between cloud-based services and on prem high performance cloud compute servers. 9. Demonstrated experience with DevSecOps solutions and tools. 10. Demonstrated experience in the cybersecurity domain to include: governance and risk management, compliance, encryption, software development security, access control, network security or secure architecture, or security operations. 11. Demonstrated experience preparing presentations and presenting More ❯
standards for avionics; as well as Military standards such as MIL-HDBK-516C, MIL-STD-882E, and MIL-STD-1553B • Experience in the areas of reliability, systems safety, and cybersecurity solutions More ❯
critical initiative focused on enhancing digital governance, data control, and secure system access across the enterprise. Our goal is to ensure seamless user experiences while maintaining strong compliance and cybersecurity standards. We're looking for a dedicated Project RightClick Administrator to help manage platform operations and ensure continued system efficiency and user satisfaction. The Project RightClick Administrator will support the More ❯
maintaining complex software systems that support Computer Network Operations (CNO). As a member of our team, you will work on mission-critical projects, providing innovative solutions to emerging cybersecurity challenges. Responsibilities: o Software Development: • Design, develop, test, and maintain low-level software in a CNO environment. • Work with assembly, C/C++, Python, or other relevant programming languages to More ❯
at least 8 years of related work experience. Experience with, or interest in, learning, deploying, and maintaining Splunk SOAR. Experience operating in classified environments. Robust understanding of identity, SIEM, cybersecurity, and infrastructure concepts. Strong Linux and scripting (Python, Ansible, Teraform, JSON, others.) experience. Ability to troubleshoot Splunk instances. Create custom Splunk reports, dashboards, and content per customer requirements. Experience working More ❯
Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Customer Service Specialists, Database Engineers, Information Systems Security Officers, Information Systems Security Engineers, Sharepoint Developers, Systems Engineers, Network More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Codescratch LLC
self-motivated and talented professional who is seeking a challenging opportunity as a DevOps Engineer. This role will lead the DevOps effort across a team of software engineers, and cybersecurity SMEs to design, implement, support, and maintain solutions. The successful candidate will contribute to deploying and maintaining infrastructure supporting the development and integration of a distributed endpoint collection tool More ❯
Laurel, Maryland, United States Hybrid / WFH Options
ALTA IT Services
based scoping activities. • Assists in evaluating and refining internal procedures for issue tracking, testing, and documentation to improve audit efficiency and effectiveness. • Maintains working knowledge of IT general controls, cybersecurity frameworks (e.g., NIST, COBIT), and regulatory expectations applicable to financial institutions. • Upholds the confidentiality of sensitive audit findings, remediation plans, and IT/security documentation. Required Qualifications: • Associate or bachelor More ❯
Washington, Washington DC, United States Hybrid / WFH Options
ClearanceJobs
enhance system performance, scalability, and reliability through observability tools, automation, and best practices. • Security & Compliance: Implement and maintain security controls aligned with FedRAMP, NIST 800-53, and other federal cybersecurity standards. • Infrastructure as Code (IaC): Develop and manage infrastructure automation using Terraform and Ansible. • CI/CD & Automation: Enhance DevSecOps pipelines, automate deployments, and improve system resilience through tools like More ❯
DoD environments Understanding of Agile or DevSecOps frameworks Experience participating in governance boards or technical review committees CLEARANCE LEVEL SECRET Clearance EDUCATION REQUIRMENTS Bachelor's degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science from an ABET-accredited or CAE-designated institution. Will consider an additional four (4) years of related experience in lieu of a degree. More ❯
required by OSC, and the Government contacting office Required Qualifications/Education and Experience • Bachelor's degree is required or equivalent experience (preferably in Information Technology, Information Management, or CyberSecurity • Must have and maintain Secret personnel clearance and must be eligible for a Top-Secret clearance • Must be DoD 8570 certified at the IAT-II/IAM-II level More ❯
and implement tuning solutions. Perform database upgrades, patches, and migrations across environments. Implement and manage database clustering, replication, and high-availability solutions. Ensure databases comply with information security and cybersecurity policies. Manage user access, authentication, and role-based privileges. Conduct regular audits and enforce data protection and regulatory compliance requirements. Develop and maintain database backup and recovery procedures. Conduct disaster More ❯
NetOps, Splunk, ACAS). Develop and enforce operational procedures, incident response workflows, and escalation protocols. Act as the senior technical point of contact for major outages, network events, or cybersecurity incidents. Interface with mission partners, DISA, Joint Forces, and Combatant Commands on network status, issues, and operational impacts. Ensure all network changes follow configuration management (CM) and DoD Change Advisory More ❯