Active Clearance TS/SCI - CI Poly Annual Salary Range $175k-$210k Certifications: (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Degree Type: Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if … programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering … hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count More ❯
Network & Telecoms Engineer Band 6 (Equivalent) £37,338 - £44,962 pro rata Location: Norfolk and Norwich University Hospital (NNUH) Contract: Temporary (3 months initially, potential to extend) Hours: Full-time, 37.5 hrs/week (Mon-Fri) Employer: gap personnel (on behalf of the NHS) About the Role: We're seeking a skilled and proactive Network & Telecoms Engineer to … design, maintain, and support our Trust's network, security, and telephony infrastructure. You will lead key projects, provide 2nd/3rd line support, and ensure systems perform optimally in line with SLAs. The role includes on-call duties and requires travel between Trust sites. Key Responsibilities: Lead design and implementation of network, security, and telephony systems … Diagnose and resolve complex infrastructure issues Support IT Service Desk escalations with excellent customer service Monitor network performance and propose improvements using management tools Follow ITIL best practices and assist in service improvements Deputise for the Network Services Manager as needed Skills & Experience: Strong knowledge of enterprise network, security, and telephony systems Proven troubleshooting and problem More ❯
Network & Telecoms Engineer Band 6 (Equivalent) | £37,338 – £44,962 pro rata Location: Norfolk and Norwich University Hospital (NNUH) Contract: Temporary (3 months initially, potential to extend) Hours: Full-time, 37.5 hrs/week (Mon–Fri) Employer: gap personnel (on behalf of the NHS) About the Role: We’re seeking a skilled and proactive Network & Telecoms Engineer to … design, maintain, and support our Trust’s network, security, and telephony infrastructure. You will lead key projects, provide 2nd/3rd line support, and ensure systems perform optimally in line with SLAs. The role includes on-call duties and requires travel between Trust sites. Key Responsibilities: Lead design and implementation of network, security, and telephony systems … Diagnose and resolve complex infrastructure issues Support IT Service Desk escalations with excellent customer service Monitor network performance and propose improvements using management tools Follow ITIL best practices and assist in service improvements Deputise for the Network Services Manager as needed Skills & Experience: Strong knowledge of enterprise network, security, and telephony systems Proven troubleshooting and problem More ❯
Overview We are seeking a Systems Administrator to support our Washington, DC office. Candidate will manage and support daily operations of network systems, including hardware, software, and security tools. Responsibilities include system upgrades, troubleshooting, user training, and maintaining secure and efficient IT environments for complex naval applications. What will you do? The Systems Administrator administers and supports daily … operational requirements of computer network systems including workstation, file servers, and web servers. Duties typically involve the installation of hardware, software, systems upgrades, network accounts, networksecurity, and web page design, interface and updates, and local system design documentation. This administrator will maintain, troubleshoot, and implement networksecurity tools including firewalls, anti-virus, and More ❯
Polygraph Protocol Analyst 3 Salary: $160,000 - $178,800 The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Qualifications: Associate's Degree with 10 years of relevant experience, bachelor's degree with 8 years … be in Engineering, Mathematics, Computer Science, a Physical Science, or related technical field Relevant experience must be in signals analysis, including protocol analysis, and preferably related to communication signals, network troubleshooting, network traffic characterization, and/or networksecurity analysis 450/451/452 Grads Tools: DVT, WVT, PKTSWING Ability to dig into massive sets … signal. Protocol Analyst 4 Salary: $212,000 - $236,500 The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Qualifications: A Bachelor's degree and 11 years of relevant experience or a Master's degree More ❯
Apply your deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise Apply your innate curiosity and analytical … data to attain and share insights Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such More ❯
OPS Consulting LLC is seeking a Protocol Analyst based out of Annapolis Junction, MD. Required Skills: Experience in protocol analysis, signals analysis, network troubleshooting, network traffic characterization, and networksecurity and analysis. Basic Qualifications: A bachelor's degree in engineering, mathematics, computer science, a physical science, or a related technical field. Security Clearance: A current More ❯
Maryland, Mayo County, Republic of Ireland Hybrid / WFH Options
Vivid Resourcing Ltd
Vivid is looking for an Aruba Network Engineer to join their clients IT team. In this role, the candidate will be responsible for supporting an enterprise level wireless network environment, managing the day-to-day operations, as well as providing technical leadership on a variety of network projects. This is a customer-facing role, and the candidate … information to a variety of audiences with different knowledge backgrounds. Clearance Requirements: U.S. Citizenship and eligibility for Public Trust Key Responsibilities Architect, deploy, and manage a comprehensive Aruba wireless network solution to enable seamless wireless connectivity and support the organization's wireless office requirements. Provide expert operational guidance on network and security protocols, ensuring comprehensive information system … validation to maintain the integrity and security of the network infrastructure. Actively participating in laboratory testing of emerging technologies to evaluate their applicability and integration into existing systems. Provide network infrastructure, security and wireless support and technical leadership to drive the execution of multiple mission-critical projects and initiatives while ensuring the maintenance of a stable More ❯
Are you an experienced Freelance Senior Network Architect who thrives in the ever-changing world of Information Technology? Then we have exciting opportunities for you! Job Opening: Senior Network Architect - WAN Redesign & Segment Routing (Nokia) Location: Brussels Long-term project We are looking for a skilled Senior Network Architect to support the design and migration phases of … a major WAN redesign and upgrade. You will collaborate closely with the Design and Engineering teams, focusing on network optimization, security and building a scalable, reliable infrastructure. Key Qualifications: Proven experience migrating IP/MPLS networks to segment routing & EVPN Hands-on expertise with Nokia SR/SAR/PSS equipment Strong knowledge of Quality of Service (QoS … and networksecurity Familiarity with Cisco SD Access and/or Aruba SD Branch is a plus Willingness to work in a secure environment (EU/national clearance required) Languages: Dutch or French + active knowledge of English Experience: 5+ years as a Network Architect in complex infrastructures (LAN/WAN/SD-WAN) You will work More ❯
streamline OPIR data ingestion, scale data streams, and develop predictive analytic products Standardize process, scalability with local teams, and monitoring and maintenance of operational metrics. Facilitate data collection, cyber security compliance, and communication Collaborate with cross-functional teams including data scientists, analysts, network engineers, and software engineers to understand data requirements and develop scalable data solutions Develop, maintain … ensure the timely and accurate movement of data from source systems to data warehouses and other storage solutions Oversee and maintain the day-to-day operation of Linux-based network servers, cloud-based environments, and virtual environments Implement, administer, and troubleshoot security, data recovery, and network infrastructure solutions Configure and troubleshoot hardware and software issues related to … operative systems, network devices, and custom applications Identify, analyze, and resolve system issues Perform routine network startup and shutdown procedures and monitor system performance Monitor networksecurity and implement security policies Work with vendors and contractors to resolve outstanding issues Develop and implement system backup and recovery policies and procedures Ensure system and data securityMore ❯
Senior Network Engineer Worsley £50,000 + Bonus (up to 15%) + Excellent Benefits KO2's client are hiring a Senior Network Engineer to join a fast-growing company based in Worsley, leading the charge in IoT-connected technology across Europe. With 6,000-7,000 live devices operating across the continent and a complex LAN infrastructure connecting … them all, this is a high-visibility, mission-critical role at the heart of the business. You'll be working with a massive, high-availability network, bigger than most organisations of this size, with traffic across multiple APIs, customer endpoints, and network environments. What You'll Be Doing: Taking the lead on network performance, reliability, and futureproofing … focus on upload scheduling and time-sensitive data traffic. Planning the transition to a hybrid cloud model-currently in testing-migrating from local data centres to cloud without compromising networksecurity or device uptime. Owning all things network: Disaster Recovery, Data Protection, Security Policies, and compliance. Looking at ways to reduce costs and improve service performance More ❯
Company Description Since 2006, MAXISIQ has advanced the state of Cyber RDT&E by bringing together industry expertise in software, hardware, communications and security, and leveraging decades of operational experience to deliver exceptional value to communities and the critical missions they support. Join MAXISIQ where we innovate, develop smarter solutions, technologies, services, and actionable capabilities for our clients- right … The Cybersecurity Engineer will target, assess, exploit, and report risks and vulnerabilities of information systems to provide senior decision makers with actionable data. Cybersecurity Engineers are responsible for IT security/vulnerability assessments and managing overall networksecurity using network and security-related hardware and software. This position is a full-time opportunity in Chantilly … VA.Award expected in March 2025. Primary Responsibilities Identify and define applicable security controls and responses for the project Review responses, enter responses into the cyber risk management platform, and update risks Identify common controls and draft common control language for the cyber risk management platform Perform security maintenance duties, such as performing analyses of vulnerabilities and providing recommended More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering More ❯
Reporting to the Head of Network & Operations, the Network Engineers are responsible for supporting the evolution of the company's Network from its current test lab environment at their datacenter through to the upcoming network deployment and the continuous expansion plan. The network, which is multi-vendor and white label, is at the leading edge … of next-generation network design and will inspire the imagination and curiosity of highly technical network engineers with previous experience as senior network engineers within an ISP or Carrier environment. Ideally, candidates will have significant network engineering experience to at least CCNP/JNCP level and will be striving for CIIE, within a carrier/ISP … environment. This role is probably not suitable for an Enterprise-based NW Engineer. The key deliverables for the Network Engineers will include: Taking engineering accountability for this innovative start-up's Next Generation ISP/Carrier network throughout its evolution. Handling day-to-day Network Management tasks such as troubleshooting network issues. Configuring network hardware More ❯
Annapolis Junction, Texas (EA3), Hawaii (EA3) Clearance Required: TS/SCI w/Polygraph As an Exploitation Analyst, your responsibilities will include: Apply your deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are execute Be part of a team, working together with government, military … to attain and share insights Distill, document, contextualize and share your findings-including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such More ❯
system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities … synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities • Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and … event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering More ❯
R- Description Leidos has a new and exciting opportunity for a Senior Software Engineer in our National Security Sector's (NSS) Cyber & Analytics Business Area (CABA). Our talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At Leidos, we … and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security! Job Summary: Do you thrive working in small teams that collaborate closely with customers? Are you intrigued by offensive cyber vulnerability analysis and reverse engineering (VR/RE)? How … and cyber testing to develop capabilities against a wide variety of networking devices. This work will leverage your ability to deconstruct a variety of hardware and software, focusing on network devices and technologies, and developing capabilities to utilize the vulnerabilities discovered. Don't miss the opportunity to take your career to the next level and be part of an More ❯
Identifies and remediates potential implementation conflicts of CDS technologies across the Enterprise. Respond and resolve service outages, technical queries, and other system related issues. Perform system checks (processes, services, network, storage) to ascertain overall system health. Develop and maintain detailed technical documentation, deliver technical presentations, effectively and accurately communicate technical information with co-workers and stakeholders Performs other job … related duties as assigned Cross Domain Provisioning Engineer Experience, Education, Skills, Abilities requested: Current TS/SCI security clearance with the ability to successfully pass and maintain a Government Polygraph (post-hire requirement) Bachelor's Degree in a Technical Field and Six (6) years of applicable experience DoD Information Assurance Technical (IAT) Level II Experience with Linux operating systems … understanding of general operating system security practices, TCP/IP networking, and networksecurity concepts. Ability to develop new concepts and processes. Ability to analyze root causes and resolve issues. Ability to support junior level technicians and specialists in their activities. Ability to perform all tasks of lower level technicians or specialists. Ability to work individually, actively More ❯
Software Developer Location: Hanover, MD (On-Site) Salary: $130,000 - $170,000 Security Clearance: TS/SCI w/poly Ring0 Technologies ("Ring Zero") is hiring a Software Developer passionate about learning and expanding their cyber programming skills. This developer will be integrated into a cutting-edge cyber security team and will be thrust into performing in the … most challenging computer environments. Security Requirement: US Citizen with a Top Secret/SCI Clearance w/poly Responsibilities include, but are not limited to: Design and develop new bleeding edge software. Work with the entire Software Development Lifecycle Add your expertise at any level to our team in areas including compilers, multi-threading, networking, memory management, and more … networking (TCP/IP) and socket level programming. Software Analysis/Reverse Engineering experience. Proficiency in low-level internals in one or more technology areas (e.g. Windows, Unix, Mobile, Network devices). Understand assembly programming concepts. Unit Test experience. Experience using Atlassian products (JIRA, Confluence, Crucible) Seniority LevelMid-Senior level Industry Software Development IT Services and IT Consulting Computer More ❯
DC area firms and continues to grow. We are actively hiring a Protocol Analyst - Level 3 with TS/SCI clearance and polygraph to join our Defense and Homeland Security Division working in Annapolis Junction, MD. REQUIRED EDUCATION & EXPERIENCE A Bachelor's degree and 8 years of relevant experience or a Master's degree plus 6 years of relevant … Computer Science, a Physical Science, or a related technical field. Relevant experience must be in: Signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis) Network troubleshooting Network traffic characterization and/or Networksecurity analysis Pay Range : There are many factors that can influence final salary including, but not limited to More ❯
Overview Abile Group has an exciting and challenging opportunity for a Cyber Security Engineer on a contract providing Network and Cybersecurity services supporting an Intelligence Community customer. All the personnel on the team will work together to support transport and cybersecurity information technology (IT) services on multiple networks and security domains, at multiple locations worldwide, inclusive of … Identifies and remediates potential implementation conflicts of CDS technologies across the Enterprise. Responds and resolves service outages, technical queries, and other system related issues. Performs system checks (processes, services, network, storage) to ascertain overall system health. Develops and maintains detailed technical documentation, delivers technical presentations, effectively and accurately communicates technical information with co-workers and stakeholders. Qualifications Clearance Required … a technical field. Six (6) years of applicable experience. Required Certifications: DoD 8570.01-M IAT Level II. Required Skills: Experience with Linux operating systems; understanding of general operating system security practices, TCP/IP networking, and networksecurity concepts. Desired Skills: Experience working with Cross Domain Solutions and operationally supporting CDS technologies on the NCDSMO approved products More ❯
leverage leading-edge secure systems and software development, backed by industry-leading subject matter expertise, and business intelligence to enable decision-support and remain ahead of ever-evolving national security challenges. Our success rests squarely on three bedrock principles: People, our center of gravity; Mission, what inspires us; and an unyielding commitment to Excellence, what separates us. Job Description … Cydecor is seeking a Systems Administrator to provide support to a Naval Sea Systems Command (NAVSEA) customer. This role will support daily operational requirements of computer network systems including workstation, file servers, and web servers. Candidates should possess strong systems administration and information technology fundamentals. Responsibilities include: Installation of hardware, software, systems upgrades, network accounts, networksecurity, and web page design, interface and updates, and local system design documentation Maintain, troubleshoot, and implement networksecurity tools including firewalls, anti-virus, and intrusion detection services Train staff on software applicable to their position, assist customers with information technology, monitor system configuration (hardware and software), and provide instruction on computers and applications Here's what you More ❯
in installation and testing of HPC system components, including setup and configuration of: Hardware and software Computing and data storage servers Networking equipment Computing peripherals Provide responsive backup management, security issues, set up and configuration of Linux servers and software. Perform timely hardware replacement not covered by third-party vendor maintenance agreements. Assist Network personnel in configuration of … networking equipment, ensuring networksecurity, and managing firewalls. Implement necessary measures to comply with all Program security requirements. Adhere to all IT policies, processes, and procedures. Manage changing priorities. Qualifications Active TOP SECRET clearance with SCI eligibility U.S. Citizenship Required for the purposes of obtaining/holding a U.S. security clearance Bachelor's degree in STEM More ❯
As a Security Architect (Consultant) in Kainos, you'll be responsible for the design and application of good security practices in the platforms and services we build for our customers. You'll work with Agile delivery teams to develop good security practices throughout the software development journey. You'll learn about and apply new technologies and approaches … provide direction and leadership for your team as you solve challenging problems together. Experience in the secure design and delivery of new cloud services and solutions. Experience in identifying security issues in existing system designs or products, including recommending sensible mitigations that balance cost, risk and usability. Knowledge of security standards and regulations (e.g. NCSC, ISO, SoC, NIST … PCI, GDPR). Experience in application architecture, software development and/or infrastructure architecture. Experience testing the security of software and infrastructure using appropriate security tools. Experience with Continuous Security, Continuous Integration and Continuous Delivery techniques. Experience of networksecurity (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. More ❯