and tools such as Git, Jenkins, Terraform, or Ansible. Favorable if you have: Certified Information Systems Security Professional (CISSP). GIAC Security Expert (GSE) or other GIAC certifications. Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP). AWS Certified Security - Specialty, Azure Security Engineer Associate, or Google Professional Cloud Security Engineer. Certified Cloud Security Professional (CCSP). More ❯
Operations activities. Demonstrated ability to lead, mentor, and collaborate across teams. Holds recognised industry certifications relevant to Cyber Defence such as: CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) CISM (Certified Information Security Manager) CompTIA Security+ Strong technical background with deep familiarity in: Cyber defence principles and best practices Security standards and frameworks Security services and systems More ❯
scripting and automation skills (PowerShell, Bash, or Python). Favorable if you have: Certified Information Systems Security Professional (CISSP). GIAC Security Expert (GSE) or other GIAC certifications. Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP). AWS Certified Security - Specialty, Azure Security Engineer Associate, or Google Professional Cloud Security Engineer. Certified Cloud Security Professional (CCSP). More ❯
reports and security plans Security Clearance Level: TS/SCI with active polygraph Preferred Certifications: CompTIA Security+ Certified Information System Security Processional (CISSP) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) AWS Certified Cloud Practitioner (CCP) Microsoft Azure Google Cloud Platform (GCP) Location: Reston, VA GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages More ❯
tools and techniques. 8570 compliant certifications, and one of the following relevant certifications: Certified Information Systems Security Professional (CISSP), Certified Incident Handler (GCIH), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH) Preferred Qualifications: Experience working in a government or defense environment. Familiarity with DHS policies and procedures. Proficiency in programming languages such as Python, Java, C++, and scripting More ❯
information assurance, preferably within a DoD or federal agency environment (DISA experience highly preferred). Certifications (Preferred): Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) Security+ or other DoD 8570.01-M certifications (IAM/IAT Level III preferred) Skills & Competencies: Expertise in DoD security frameworks, risk management, and compliance (e.g., NIST More ❯
to contribute to a growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethicalhacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including … world scenarios and hands-on practice in a safe, controlled environment. Industry Standards Alignment: Ensure that the course content aligns with industry-recognized certifications, such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized … Seminars: Organize or participate in cybersecurity workshops, boot camps, or industry-related seminars for student enrichment. Compliance: Ensure all instructional materials and lab activities comply with relevant legal and ethical standards, such as the Cybersecurity Framework (NIST) and other related regulations. Required Qualifications: Educational Background Minimum Education: Master's degree in Cybersecurity, Computer Science, Information Technology, or a related More ❯
and experience with Windows and Linux Operating Systems Strong analytical skills Strong verbal and written communication skills DESIRED SKILLS: Knowledge of and experience with securing cloud-based systems Certified Ethical Hacker (CEH) certification Scripting knowledge Understanding of regular expressions EDUCATION AND EXPERIENCE: Twenty (20) years experience as an ISSE on programs and contracts of similar scope, type, and complexity More ❯
Experience with cloud security platforms and tools Experience with scripting or automation tools for security tasks Bachelor's degree Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), or CompTIA Security+ Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access More ❯
in developing and tuning SIEM use cases, correlation rules, and alerts Preferred Qualifications: Relevant certifications, such as: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH) -OR- SIEM specific certifications (e.g., Splunk Certified Power User) A master's degree Experience working in a government or defense environment (specifically DHS policies and procedures). More ❯
in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO 27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
of the Following: (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH), CompTIA Security+ The objective is to provide specialized expertise to complement the organization's inherent resources for effective and efficient mission accomplishment and continuity, introduction of innovation … Risk and Compliance (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH), CompTIA Security+ More ❯
are seeking highly motivated individuals with a positive attitude looking to join our rapidly growing company. The ideal candidates for this position have strong attention to detail, analytical and ethical, who can excel in a very fast- paced government contractor environment. As a Cybersecurity Systems Engineer Mid-Level, you will support the System Engineering Support Services (SESS) team performing … Microsoft Certified Systems Engineer (MCSE). • Certified Cloud Security Professional (CCSP). • AWS Solutions Architect. • Offensive Security Certified Professional (OSCP). • GIAC Penetration Tester (GPEN). • Security +. • Certified Ethical Hacker (CEH). Education Requirements: • Bachelor's degree in an IT- or Engineering-related field (e.g., cybersecurity, computer science, computer engineering). Clearance Requirements: • Active DoD Secret Security Clearance More ❯
and Event Management (SIEM) systems Strong understanding of cyber threat intelligence and incident response processes Preferred Qualifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), or similar are highly desirable. Master's degree Experience working in a government or defense environment (familiarity with DHS policies and procedures a plus) Knowledge of broader More ❯
field of study (or equivalent experience). One of the following relevant certifications: Certified Information Systems Security Professional (CISSP), Certified Incident Handler (GCIH), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH) Proficiency with SIEM tools (e.g., Splunk, ArcSight). Experience with intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR) tools, and firewalls. Strong More ❯
product updates and security best practices Qualifications: Education: Bachelor's degree in Computer Science, Information Security, Information Technology, or a related field are a plus. Relevant certifications such Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC) are a plus. Certifications: CompTIA Security+ Tenable Certified Nessus Expert (TCNE) or other relevant certifications a plus. Additional certifications such as CISSP More ❯
as CISSP, CISM, CISA, or other relevant certifications preferred. Additionally, certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified SCADA Security Architect (CSSA) Information Technology Infrastructure Library (ITIL More ❯
technologies, such as networking, cybersecurity, cloud computing, software development, databases, etc. Relevant industry certifications, such as: CompTIA (A+, Network+, Security+), Cisco (CCNA, CCNP), Microsoft (MCP, MCSA, Azure certifications), Certified Ethical Hacker (CEH), GIAC, or CISSP. Experience with automation, scripting (Python, PowerShell, Bash), and Infrastructure as Code (IaC). Knowledge of regulatory compliance frameworks (HIPAA, GDPR, SOC 2, etc.). More ❯
Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. 7. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. 8. Software Development Support: 9. Demonstrated experience using Java or Java using Spring. 10. Demonstrated experience with Sponsor networks, systems, and services. 11. Demonstrated experience with the Sponsor More ❯
as CISSP, CISM, CISA, or other relevant certifications preferred. Additionally, certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified SCADA Security Architect (CSSA) Information Technology Infrastructure Library (ITIL) Applicant selected will be subject to a government security investigation and must meet More ❯