through the use of industry-standard tools such as ACAS (Tenable.sc), AWS Inspector, and DISA STIG frameworks. The engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. Core Responsibilities: Lead enterprise-wide vulnerability scanning, analysis, and reporting using ACAS for traditional infrastructure and … expertise with compliance systems such as eMASS, STIG Viewer, and SCAP tools Strong technical writing and communication skills to support findings, reports, and remediation plans Preferred Qualifications: AWS Security Certification or equivalent cloud security credential Scripting languages (e.g., Python, PowerShell, Bash) to support security automation Experience with STIG Manager, Splunk Enterprise Security … Walker Lane) 3.) Cyber experience in an AWS environment is a must have 4.) Strong understanding of NIST SP 800 controls and the RMF process 5.) Any AWS Security Certification More ❯
coordination of cloud architecture. • Supports cultural change for cloud adoption. • Development of cloud strategies • Coordinate adoption of cloud-based solutions Required Skills and Experience: • Active TS/SCI SecurityClearance • Bachelor's degree or higher in Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or equivalent Mid-level experience as a Cloud Architect • Mid More ❯
to join our growing team. This position requires a TS/SCI clearance with a polygraph. You will be instrumental in providing support to our Development, Operations and Security teams. You will join a team of 20+ who work together to provide full-lifecycle support to a software application providing audio ingest, storage, query, playback, analysis, and transcription … Administration Level 2 (SA2): 10 years with a Bachelor's in Computer Science (or related field) Certification Requirements: IAT Level II Certification (i.e. CompTIA Security+ and SSCP (Systems Security Certified Practitioner More ❯
Microsoft 365 applications - Monitor and optimize Microsoft 365 services Identity and Access Management: - Manage user identities and access controls in Azure AD and Microsoft 365 - Implement and enforce security policies - Conduct regular security audits and vulnerability assessments Troubleshooting: - Diagnose and resolve technical issues related to Azure and M365 - Provide technical support to end-users Documentation: - Create … Azure AD, Microsoft 365, Active Directory, PowerShell, and networking concepts - Problem-Solving: Excellent problem-solving and troubleshooting skills - Communication: Strong written and verbal communication skills - Clearance: Active Secret SecurityClearance or higher is required. Skills and Abilities: - Technical Skills: Proficiency in MS Azure and remote access tools, with the ability to troubleshoot issues independently. - Communication: Strong interpersonal skills More ❯
a large, complex networking infrastructure. This includes providing network administration and operational support to more than 8000 networked devices. The F5 Network Engineer will provide comprehensive network administration, security enhancements and remediation, and troubleshooting of network devices such as routers, switches, load balancers, VPNs, 802.11 Wireless, and VoIP. This position requires an understanding of best practices pertaining to … network security and may require the development, deployment, and integration of network security services. The F5 Network Engineer should be able to work both independently and as part of a team. WHAT YOU'LL NEED TO SUCCEED - REQUIRED: SecurityClearance: Active Top Secret clearance Certifications: DoD 8570 IAT Level II certification. Must have ONE … experience troubleshooting, managing, and monitoring the health of Cisco and Juniper routers and switches. Extensive experience in Software Define Networks (SDN). Broad understanding of network infrastructure topologies, security policies, firewalls, and the L2/L3 switch and router infrastructure. Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS More ❯
growing cybersecurity team supporting federal government clients. The successful candidate will be responsible for detecting, analyzing, and responding to cybersecurity incidents and threats in a 24/7 Security Operations Center (SOC) environment. Key Responsibilities: • Monitor and analyze network traffic, logs, and alerts from security systems (e.g., SIEM, IDS/IPS, endpoint protection). • Perform initial … triage and investigation of security events and escalate as necessary. • Analyze and respond to phishing attempts, malware infections, and other suspicious behavior. • Maintain detailed documentation of incidents, findings, and response actions. • Collaborate with cross-functional teams including IT, compliance, and engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense … strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring activities. Minimum Qualifications: • Active Top-Secret clearance (required) • Associate's or Bachelor's More ❯
King George, Virginia, United States Hybrid / WFH Options
TMC Technologies
expected to work on-site in the Dahlgren area until performance is effectively established with the customer. Relocation assistance can be provided where applicable. A SECRET (or higher) securityclearance is required. Job Requirements Secret (or higher) securityclearance Bachelor's degree in the area of Science, Technology, Engineering or Mathematics 3+ years of experience in More ❯
TS/SCI with Full Scope Polygraph clearance Preferred Expert in Microsoft AD, AD LDS, authentication troubleshooting (Kerberos, NTLM), classification tools (Titus by Fortra), PowerShell scripting, File Service Security, Dynamic Access Control (DAC), and Thales CT Hardware Security Modules and Windows Certificate Authority (PKI) Skilled in cloud print products (PaperCut), Windows Server Update Services, debugging tools More ❯
operational configurations Configure, upgrade, and troubleshoot configuration management tool components including Linux and database administration Develop monitoring dashboards to alert on software operational status Ensure compliance with organizations security compliance requirements Requirements Experience performing system administration with applications such Bash, Python, Perl, Ruby or similar scripting tools or software, etc. Using puppet or other software configuration management tool More ❯
Job Description Job Title: Training Range Engineer Location: Colorado Springs, CO Minimum Requirements: Minimum of 2 years of cyber security experience with emphasis on range development and a minimum of 2 years of experience with SIEM/IDS/IPS (Elastic Stack, Splunk, HBSS, or equivalent). Strong background/familiarity with Windows and Linux command line, networking More ❯
day support of deploying Python-native ML pipelines Support architectural leadership, technical support, and advisement services to ensure identity management system technologies are integrated and meeting the appropriate security requirements Support leadership who engage with senior level executives at a public facing Federal agency and provide subject matter expertise in security architecture and other key domain … high-performance enterprise big data application deployment and solution architecture on complex heterogeneous environments in AWS Experience with automation and engineering tasks, implementation, data, infrastructure/operations, and security engineer tasks in cloud environments The ability to perform, but not limited to, automation and engineering tasks, testing, implementation, data, AI/ML, infrastructure/operations, and securityMore ❯
Enhancements: Regularly review and implement system updates, patches, and enhancements to ensure the optimal performance of the Office 365 environment. • OneDrive Maintenance: Oversee and maintain the integrity and security of data stored in OneDrive, including sharing permissions and access controls. • Microsoft Exchange Support: Provide end-to-end support for Microsoft Exchange, ensuring smooth and secure email communications within … end-users, understanding their needs, and ensuring a positive user experience. • Collaboration Tools Management: Administer collaboration tools such as Microsoft Teams and SharePoint, including setup, maintenance, and troubleshooting. • Security: Implement and monitor security measures for the protection of systems, networks, and information within the Office 365 suite. • Documentation: Maintain accurate documentation for system configurations, processes, and … contact for Office 365-related technical issues, providing timely and effective resolution. • Compliance: Ensure all Office 365 activities comply with legal and company policies and procedures, maintaining operational security posture. Requirements: • Bachelor's Degree and 4 or more years of related professional experience • Must be a US Citizen • Must possess a Secret Clearance or higher, or be able More ❯
of the time • Must be a US Citizen • CLEARANCE: Must be able to obtain a DoD Secret clearance Preferred Qualifications for Sr. Principal Network Engineer: • DoD 8570 Security certification such as Sec+, CASP, CISSP, or equivalent. • A professional certification specific to the networking industry like a CCNA/CCNP/CCIE or equivalent. • Familiar with network management applications … like Splunk, Firepower Management Center (FMC), and/or Cisco ISE. • Exposure to the Risk Management Framework, associated security controls, and STIGs. • Familiar with Windows, Linux, and VMWare configuration and troubleshooting. • Experience with HAIPE/TACLANE and other military COMSEC/CRYPTO equipment and procedures. • Experience with tactical/military radio networks, like Common Data Link (CDL) and More ❯
Excellent verbal and written communication skills, with fluency in English. Education: • Bachelor's degree from an accredited U.S. university in Business, Analytics, Information Systems, or a related field. SecurityClearance Required: Active SECRET clearance is required. More ❯
users in resolving technical issues with applications, connectivity, and other IT-related concerns. • Cybersecurity Expertise: Conduct environmental vulnerability scans, remediate vulnerabilities, and perform system hardening to ensure the security of our systems. • Root Cause Analysis: Perform in-depth analysis to resolve technical issues in Linux environments, identifying and addressing the root causes of problems. • System Performance Optimization: Analyze … qualified certificate • Experience performing successful root cause analysis for problem resolution in Unix and Linux environments, with significant experience in: - Installing operating routine server/workstation patches, system security patches and firmware updates - Creating/managing security groups - Coordinating hardware repair activities - Diagnosing and resolving hardware/software problems/issues - Creating scripts to automate system … administration tasks - Creating/editing Standard Operating Instructions (SOI) documentation - Vulnerability remediation and security management (system hardening, log management, configuration management i.e., Nessus, Trellix, Splunk, SCAP, HBSS ) Desired Skills: • Experience with RedHat Enterprise Linux (RHEL) • Experience administering virtual machines with VMWare ESXi • Experience with Solaris and CentOS • Advanced proficiency in scripting (shell/Ansible) • Experience successfully installing/ More ❯
years of job-related experience, or a Master's degree plus 3 years of job-related experience. Agile experience preferred. CLEARANCE REQUIREMENTS: Department of Defense TS/SCI securityclearance is preferred at time of hire. Candidates must be able to obtain a TS/SCI clearance within a reasonable amount of time from date of hire. Applicants … selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Qualifications: ROLE AND POSITION OBJECTIVES: As a Site Reliability Engineer (SRE) for Space and Intelligence Systems line of business, you will be a member More ❯
platforms and secure systems. We are seeking Software Engineers with strong experience in embedded systems, real-time development, and CI/CD pipelines to support mission-critical, high-security programs. Key Responsibilities: Design, develop, test, and maintain embedded software for integrated hardware systems Translate requirements into scalable and efficient software using C++ or similar Build and support CI More ❯
Intermediate Data Analyst Clearance: Top Secret SecurityClearance with SCI Eligibility Job Location: FBI, Washington, D.C. JOB OVERVIEW The Intermediate Data Analyst performs analysis on relevant information from various sources to prepare documents, reports, summaries, and replies to inquiries, ensuring the accuracy and proper format of the information provided. JOB RESPONSIBILITIES Provide expert business process analysis, requirements analysis … and presenting existing or newly developed reports (data, dashboards, graphs, charts), guidelines, directives, policies, etc. to obtain accurate and relevant information. JOB REQUIREMENTS Must possess a Top Secret SecurityClearance with Sensitive Compartmented Information (SCI) Eligibility. Must have a Bachelor's degree from an accredited university or college with a minimum of five (5) years of data analysis More ❯
Horizon View to support virtual desktop infrastructure (VDI) solutions. This role requires an analytical and detail-oriented professional who can troubleshoot system issues, enhance performance, and contribute to security best practices. Key Responsibilities: - Windows System Administration: Maintain, upgrade, and support Windows Server environments, Active Directory, and enterprise workstations. - VMware Management: Deploy, configure, and optimize VMware ESXi, vSphere, and … vCenter solutions. Horizon View Implementation: Support VDI environments, manage virtual desktop configurations, and ensure seamless end-user experience. - Security & Compliance: Implement system hardening, patch management, and access controls per organizational standards. - Troubleshooting & Support: Provide Tier 2/3 technical support, diagnosing and resolving system/network issues efficiently. - Performance Optimization: Monitor system health, implement automation, and fine-tune … of experience in VMware, and Horizon View. - 2 years of experience with VMware ESXi, vSphere, and Horizon View. - 2 years of experience with PowerShell scripting and automation. - CompTIA Security +, equivalent or higher -Must live a commutable distance to Newport News, VA. Preferred Qualifications: - Additional (at least one) certifications include Microsoft (MCSA, MCSE), VMware (VCP-DCV), and Horizon More ❯
Responsibilities: • Employing security concepts, theories, insights, tools and methodologies to mitigate system weaknesses and vulnerabilities • Appling advanced analytical skills and technical resources at the tactical levels and implementing infrastructure solutions supporting command decision making and execution of mission requirements • Providing support as needed to lab staff in the tasks of provisioning and issuing equipment to end users, as … of granular access control • Maintaining Fly Away Kits (FAKs) sanitization, inventory, repairs, and maintenance - Monitoring systems for acceptable performance and user accessibility, establish back-ups, and monitor systems security • Creating monitoring reports and logs • Providing insight and expertise to a Federal Lab Manager as Subject Matter Expert (SME) in regards to network architecture, hardware and software implementation, and … standard operating procedures (SOPs) and policies • Determining appropriate courses of actions in response to identified and analyzed anomalous network activity • Assessing network topology and device configurations identifying critical security concerns and providing security best practice recommendations • Assisting with conducting peer reviews and provides quality assurance reviews for junior personnel • Assisting with overseeing technical analysis by mentoring More ❯
Enterprises is looking for a User Activity Monitoring (UAM) Analyst to support a federal client. This analyst will play a crucial role in detecting, analyzing, and mitigating potential security risks. This work will be onsite in Huntsville, AL. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and … and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on network traffic, intrusion attempts, and data loss prevention technologies. • Support Insider Threat Programs by integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related More ❯
technical or operational setting. Prior work with DSCS or WGS systems is preferred. Experience in Space Domain Awareness mission. Experience in supporting modeling, simulation, and analysis of national security space-related problems is desired. Experience working with JSON and XML files, often used for data exchange and API definitions. SKILLS/ABILITIES Ability to operate or learn orbital … possess a valid and unrestricted driver's license. Must possess, or be able to obtain, and maintain a Top Secret with SCI eligibility clearance. Must be able to be cleared for base or site access. Must be a US Citizen. Must be available for a flexible work schedule to include nights, weekends, and holidays. Salary Range More ❯
and operations • Familiarity with IC cloud environments to include Microsoft, Google, Oracle, IBM • Candidate with Geospatial experience within CIO-T Cloud Operations, will be a huge plus • TS securityclearance or higher • Prefer candidate with bachelor's degree, but additional experience may substitute Responsibilities Will Include the following. • Leading architecture, deployments, and operations across the MC&G Mission … transitions and coordinating with the Geo CIO-T Cloud PMO • Managing cloud artifacts, guidance, standards, and efficiency metrics • Supporting cloud budgeting, WAR inputs, and briefings • Helping ensure cloud security postures align with ATO standards The role is technical but will also require superb coordination skills across Geo customer and IC stakeholder offices. Candidate with cloud, IC experience, and More ❯
Enterprises is looking for a User Activity Monitoring (UAM) Analyst to support a federal client. This analyst will play a crucial role in detecting, analyzing, and mitigating potential security risks. This work will be onsite in Washington, DC. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and … and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on network traffic, intrusion attempts, and data loss prevention technologies. • Support Insider Threat Programs by integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related More ❯