training in a computer-related field plus 10 years of relevant experience, OR +High School diploma/GED plus 12 years of relevant experience. Degree in Information Assurance, Information Security, Information Systems, Information Technology, Computer Networking, Information Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/… cyber/networksecurity, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the Risk Management Framework (RMF), Information Systems Security technologies, IT policies, and ability to interpret policies and directives is desired. Network … of assignment to the position. Maintaining certification status is required through continuous education training or sustainment training while serving in this work role. General LCAT Description: The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for an information system (IS). ISSO responsibilities support the Secure the Enterprise (STE)/ More ❯
Radiance Technologies, a rapidly growing employee-owned company, is searching for a talented MicroElectronics Security Engineer to join the Microelectronic Technology Operation (MTO). MTO is focused on microelectronics and hardware security, and is involved in the development of anti-tamper/protective technologies, failure analysis, reverse engineering, full spectrum cyber operations, and cyber tool development and solutions. … working on cutting-edge Science & Technology (S&T) programs for the Department of Defense, with aspirations to deploy these capabilities to the field. Flexibility is a must, as the Security Engineer will support and contribute to a wide range of activities: providing theoretical and statistical analyses, contributing to hardware security technology development, conducting vulnerability and exploitation assessments, conducting … to our DoD customers in areas such as Side-Channel Analysis Cryptography Physically Unclonable Functions (PUFs) Counterfeit detection Hardware Vulnerability research Anti-Tamper And other topics in the microelectronic security field Depending on candidate skillsets, this position may contribute to multiple Divisions within the Operation. NOTE: This is NOT a Cybersecurity/Information Systems Security/NetworkMore ❯
Zachary Piper Solutions is seeking a Personnel Security Specialist to support the US Space Force (USSF) in in Vandenberg, CA. Responsibilities: - Formulates plans, policies, procedures and other documentation required to deal with the operation of SCI protection functions and activities IAW DoD 5105.21 Volumes 1-3, ICD 704/5, AFMAN 14- 304, AFI 16-1404/06 and … for SCI eligibility, recertification, and special purpose and interim SCI Accesses, insuring validity of the requests. - Focus on processes related to processing PERSEC related functions - Assisting with preparation of security plans, reviewing applicable guidelines, and established procedures for all areas of security to include Information Security, Physical/Technical Security, Classification Management, Communication Security (COMSEC … and Program Security - Working with security systems of record such as the Defense Information Security Services (DISS) and JADE database or the legacy Joint Personnel Adjudication System (JPAS) - Preparing, processing and maintaining personnel security packages for Special Access Programs (SAPs) - Supporting facility and networksecurity actions, inspections and daily activities Qualifications: - Bachelor's degree More ❯
POSITION: Information Systems Security Engineer LOCATION: Colorado Springs, CO REQUIRED SECURITY CLEARANCE: Active TS with SCI; willing to take CI polygraph POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours THE OPPORTUNITY: Upon award, BTAS will be filling potential openings for the Space Systems Command (SSC). SSC plays a critical role in advancing the United States … manage program Authority to Operate, Authority to Test, Authority to Connect, and Interim Authorities. Support cyber testing and assessment activities, documenting findings and corrective actions per the Federal Information Security Management Act. Develop draft intelligence requirements and staffing packages. Advise on intelligence reports and translate program requirements into intelligence needs. Recommend courses of action to support mission-related activities. … acquisition and intelligence community standards. MINIMUM QUALIFICATIONS: Experience analyzing and evaluating current events, and providing recommendations to the Unit leadership to help assure continuity of activities and processing of security requirements are effectively integrated through security architecture, design, development, and configuration Knowledgeable on organization and execution of contingency planning, testing, and validation for all aspects of information systems More ❯
San Diego, California, United States Hybrid / WFH Options
G2 Ops, Inc
Authority to Test, and Authority to Connect for classified and unclassified environments including for Platform IT (PIT) Assess Only or PIT Full Authorizations Hands-on experience performing system and networksecurity analysis on NIPRNet, SIPRNet, and similar networks Proficiency with key DoD cybersecurity tools and artifacts such as ACAS, HBSS, STIGs, SCAP, eMASS or XACTA, and POA&Ms … Years of Industry Experience: 5+ years of experience in an Information Assurance/cyber related field Security Clearance Requirement: Must be able to obtain and maintainActive DoD Secret Clearance What makes someone choose one company over another? Pay, benefits, training, work satisfaction, culture? What if you can have it all? At G2 Ops, we have extremely competitive pay and … proposal generation and risk modeling, G2 Ops is embedding AI directly into how we work. We're now launching the next phase: AI playbooks, secure tooling aligned with government security protocols, and real-time support for hands-on use across all departments. At G2 Ops, you'll not only work with cutting-edge technology, you'll help define how More ❯
are inspired by making a positive impact through developing data driven solutions, FTI would appreciate the opportunity to learn more about you. We are seeking a highly qualified SAP Security Specialist to support the B-2 System Program Office (SPO) at Wright-Patterson Air Force Base, OH. In this role, you will serve as the primary liaison between the … Chief of the Security-Facilities Branch, the Site Security Lead, internal staff, and external agencies. The role involves managing a complex and diverse security program in strict compliance with U.S. Government regulations, including Dept. of Defense (DoD), SCI, and SAP requirements across multiple programs of varying size and scope. You will be the key point of contact … for all matters related to information, industrial, and personnel security. You will also ensure that all security integration efforts are thoroughly coordinated with the Advanced Programs and Integrated Functional Capability Branches. Additional key responsibilities include implementing, updating, and overseeing security policies and procedures within the B-2 Division to ensure full compliance with all relevant federal securityMore ❯
Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Training and Tuition Assistance, Paid Time Off, and Holidays Description Markon is seeking an experienced Information Systems Security Engineer to support an Intelligence customer Responsibilities SME level knowledge of Risk Management Framework and manage potential systems through the full Lifecyle of RMF Communicate system complexities with Assessors … and ISSMs Prepares security test and evaluation plans. Provides certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Recommends system enhancements to improve security deficiencies. Develops, tests, and integrates computer and networksecurity tools. Secures system configurations and installs security tools, scans systems to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Provides information assurance support for the development and implementation of security architectures to meet new and evolving securityMore ❯
Relevant experience must be in signals analysis, related to comms signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Degree in Eng, Math, Comp Sci, Phys Sci or related tech field. Level 1 - 6 years or AA + 4 years or BS + 0 years; Level More ❯
EU Passport is needed to apply for this role Fujitsu is looking for a Network Operations Specialist to work on a project within the EU Institutions in Brussels . Main tasks Network automation engineer to implement solutions and integrations with technologies and platforms Network support engineer for 2nd level support and troubleshooting Firewall configuration, routers, switches Support … lifecycle management activities for network services Top 5 most important technical skills: Programming skills (REST API, ansible, python, terraform) Network virtualization (NSX-T, Kubernetes) Networksecurity (Checkpoint) Networksecurity (Fortinet) F5 BIG-IP LTM, F5 BIG-IP ASM (WAF) Certifications Certification in Cisco DevNet (or a comparable vendor-neutral DevOps/automation program) would … be a distinct advantage Holding a CCIE (particularly in Security) is a significant advantage Languages: English Location: Brussels Contract: Employee or Freelance - YOU DECIDE More ❯
escription Zachary Piper Solutions is seeking a XSOAR Consultant out of Colorado Springs, CO. The XSOAR Consultant is responsible for the creation and integration of XSOAR playbooks and security tools for external customers. Responsibilities of the XSOAR Consultant includes: Create and integrate SOC playbooks in Cortex XSOAR Automate the integration/orchestration of EDR and SIEM technologies using Python … Learn and understand customer requirements and customer XSOAR playbooks to the specific customer environment Qualifications for the XSOAR Consultant includes : 6+ years of IT/networksecurity experience with at least 2+ years of XSOAR playbook creation PCNSE is highly preferred or other Palo Alto certification Bachelor's degree is highly preferred Compensation for the XSOAR Consultant includes … . Applications for this job will be accepted for at least 30 days from the posting date Palo Alto, Panorama, Global protect, NGFW, firewall, PANW, PAN, Prisma, Python, Networksecurity, network engineer, network, security, encryption, XSOAR, Cortex, XDR More ❯
Experience must be in the design/development of computer or information systems, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will … count as 6 months of experience). Degree in network/systems eng, Info Tech, or related (Gen Engineering, Comp Eng, Elec Eng, CS, Cyber Security, etc.) Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA + 7 years or BS + 5 years or MS + 3 years; Level 3 - AA + More ❯
with POLY Work Arrangement: On-site Job Location: Fort Meade MD Salary: 105K -162K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field … degree plus 4 years of relevant experience Need deep understanding of data link layer of OSI model, also with sonet and optical net Preferred Must be able to understand network architectures More ❯
SCI with POLY Work Arrangement: On-site Job Location: HI Wahiawa Salary: 65K -125K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field More ❯
SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 115K Background Relevant experience must be in signals analysis, including protocol analysis Demonstrated experience in network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in Engineering, Mathematics, Computer Science, Physical Science, or a related technical field More ❯
technologies. The Protocol Analyst shall possess the following capabilities: The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Requirements Position requires active Security Clearance with appropriate Polygraph A Bachelor's degree and More ❯
streamline OPIR data ingestion, scale data streams, and develop predictive analytic products • Standardize process, scalability with local teams, and monitoring and maintenance of operational metrics. • Facilitate data collection, cyber security compliance, and communication • Collaborate with cross-functional teams including data scientists, analysts, network engineers, and software engineers to understand data requirements and develop scalable data solutions • Develop, maintain … ensure the timely and accurate movement of data from source systems to data warehouses and other storage solutions • Oversee and maintain the day-to-day operation of Linux-based network servers, cloud-based environments, and virtual environments • Implement, administer, and troubleshoot security, data recovery, and network infrastructure solutions • Configure and troubleshoot hardware and software issues related to … operative systems, network devices, and custom applications • Identify, analyze, and resolve system issues • Perform routine network startup and shutdown procedures and monitor system performance • Monitor networksecurity and implement security policies • Work with vendors and contractors to resolve outstanding issues • Develop and implement system backup and recovery policies and procedures • Ensure system and data securityMore ❯
Experience must be in computer or info systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint … Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Degree must be in Computer Science More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Do you want to work for a UK Bank that are going through a digital transformation? Our client is seeking a highly skilled and motivated Infrastructure Security Manager. Reporting into the head of security, You will play a leading role in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks … This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics … related to networksecurity, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in networksecurity, including firewalls, micro-segmentation, DDoS protection, WAF, and NAC. Familiarity with open-source frameworks such as OWASP, CVSS, etc. Experience with security products More ❯
variety of sources to identify and analyze vulnerabilities and report potential or actual events. CDNAs identify, analyze, map, and/or protect against vulnerabilities, intrusions, and threats to computer network systems Education and training requirements include: TS/SCI w/CI or FS 10 years of experience and an Associate's Degree. 18 semester hours of military training … Associate's Degree 8 years of experience and a Bachelor's degree Relevant experience: Must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward … education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will More ❯
variety of sources to identify and analyze vulnerabilities and report potential or actual events. CDNAs identify, analyze, map, and/or protect against vulnerabilities, intrusions, and threats to computer network systems Education and training requirements include: TS/SCI w/CI or FS 13 years of experience and an Associate's Degree. 18 semester hours of military training … Associate's Degree 11 years of experience and a Bachelor's degree Relevant experience: Must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward … education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise domains to enable the business to deliver its outcomes in a secure manner, building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your … approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries More ❯
Network Architect 6 Month contract initially Based: Hybrid - Maximum of 3 days p/w - Coventry Rate: £450 - £550 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. … We have a great opportunity for a highly experienced Network Architect to join the team. The NetworkSecurity Architect will consider the HD architecture and the culture of the organisation along with the operating model and factor this into their solution selection and design. They will challenge themselves to strive to find the right solution and not … deliver the textbook happy-path solution. Key Responsibilities: The NetworkSecurity Architect will look at the wider networksecurity roadmap and network roadmap and look at how their solution sits within that wider architecture challenging the need and the approach taken for their solution looking for efficiencies with wider changes to consolidate technology platforms, to More ❯
to stakeholders of multiple seniority levels and differing levels of technical understanding Other specialized skills will be requested upon application to position Desired Skills: Working knowledge in computer and network operating systems, cryptocurrency, networksecurity, enterprise networksecurity Prior experience working with the customer Key Skills: 5 years of SOO experience with the customer. Experience More ❯