Role: Software Engineer Client: Defense-Aerospace Hourly Rate: up to $68/hr W2, non-benefited Length: Long-term Location: Scottsdale, AZ Clearance: Department of Defense Secret securityclearance is preferred at time of hire Description: Software application development in a process-oriented organization Maintains hardware, software, and related components of project Infrastructure development in a process-oriented More ❯
Requiried : TS/SCI with CI Poly Location: Chantilly, VA The ideal candidate will be responsible for implementing, managing, and optimizing the Splunk platform to automate and orchestrate security operations. This role requires expertise in developing custom playbooks for various stakeholders, integrating with other security tools, and enhancing the overall security posture of the … issues as necessary. Aid Associate, Level I, and Level II Engineers on sophisticated tasking. What we're looking for Currently holds a TS/SCI with CI polygraph. Security Certification (i.e, Security+, CISSP, etc) Experience operating in classified environments. Strong understanding of identity, SIEM, cybersecurity, and infrastructure concepts. Splunk Core certification Splunk IT Service Intelligence (ITSI) certification desired. … deploying, and maintaining Cribl Stream. Robust understanding of identity, SIEM, cybersecurity, and infrastructure concepts. Strong Linux and scripting (Python, Ansible, Terraform, JSON, others.) experience. Experience working in a Security Operations Center (SOC) Experience operating in classified environments. Initial understanding of leadership concepts and ideas. Strong interpersonal skills and ability to work collaboratively in a team. Ability to clearly More ❯
or 4 additional yrs. in place of B.S Preferred: Prior CNO experience. Knowledge of Network Protocols. Experience developing UIs with 508 compliances in mind. Experience with analyzing cyber security-related data sets (network traffic, OS events). Knowledge of end-to-end SIGINT collection and analysis systems This position is 100% on site. Applicants for positions requiring securityclearance will be automatically rejected for candidates not meeting the SecurityClearance requirement. More ❯
for backup and restore for development, test, and production instances. Desired Skills and Experience: While not required, the following skills are highly desirable: 1. Addressing problem sets within security domains such as executive protection, threat identification, personnel vetting, counterterrorism, and counterintelligence. , 2. Experience interacting with the Sponsor's authentication services and PKI certificates. 3. Familiarity with the Sponsor … Sponsor's organization or mission. Technologies and Tools: Mandatory: Splunk, Microsoft SQL Server, AWS, Python, JavaScript, CSS, REST, C#, Databricks Desired: Java, familiarity with Sponsor-specific processes and security domains More ❯
applications software. Support the troubleshooting and debugging of networks using network test equipment and tools. Perform system and network administration tasks including managing user accounts, data backup, networking, security, disk management, software license management, etc. Utilize understanding of standard DOD security practices such as, STIG/RMF compliance and system accreditation implementation efforts to oversee the … network and server security compliance, auditing, and remediation. Develop documentation for specific installations and configurations necessary to support operations and ongoing support activities. Desired Skills: Experience with Kubernetes, Rancher RKE2 Experience with RedHat Enterprise Linux (RHEL) Experience with Rancher or Rancher Mult Cluster Manager Experience coding and scripting (Python, C++, Java, Bash) Experience with CI/CD services … in Information Systems, Computer Science, Computer Engineering or equivalent 2-6 Years of hands on relevant experience Must be a US Citizen Ability to obtain an Active DoD SecurityClearance Experience configuring, integrating, and maintaining server software/hardware environments Experience with Linux. More ❯
Work Type: Onsite Location: Colorado Springs, CO Interview Process: One 45-minute interview - Feedback the next day Hiring timeline: Immediate - Once selected, a few Security Forms will need to be filled out. Nobody can start until the TSA background check is complete. (6-8 weeks) Project Timeline: 2 initial years with 5 additional (2030) Clearance: Secret About the … airport sterile areas or board aircraft. This screening is designed to identify known or suspected terrorists or other individuals who may be a threat to transportation or national security, to prevent some identified individuals from gaining access to airports and airplanes where they may jeopardize the lives of passengers, and to ensure that other identified individuals receive enhanced … support of their mission critical systems in defense of our Homeland. As a key member of our team, the DevSecOps Engineer will play a pivotal role in integrating security practices into the software development lifecycle and ensuring the reliability and security of mission-critical systems. Project Specific Responsibilities: Innovate, and develop cutting edge solutions through automation More ❯
Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Boca Raton FL Background Oversee daily SOC activities, ensuring prompt detection and resolution of security incidents for our healthcare-focused clients Manage, mentor, and develop a diverse SOC team of Tier 1, 2, and 3 analysts Coordinate incident response efforts, working closely with internal … root causes and implement corrective actions Regularly review and enhance SOC processes, including playbooks, response protocols, and threat hunting strategies Requirements Bachelor's degree in Computer Science, Information Security, or a related field. 6+ years of cybersecurity experience, with at least 2 years in a SOC leadership role Expertise in cybersecurity frameworks (e.g., MITRE ATT&CK, NIST, CIS … incident response, and threat intelligence In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerability management Strong background in cloud security operations and monitoring across AWS, Azure, and GCP Preferred Proven success in incident resolution within SLAs and based on severity. Experience in threat hunting, digital forensics, or malware analysis. More ❯
are seeking a dedicated and experienced professional with a strong foundation in cybersecurity, a comprehensive understanding of current threats and vulnerabilities, and the ability to implement cutting-edge security measures. In this role, you will contribute to the development, deployment, and maintenance of cybersecurity infrastructure while staying current with evolving trends in the field. Responsibilities Design, implement, and … manage advanced security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to safeguard networks and systems. Conduct routine security assessments to identify and address vulnerabilities and weaknesses across networks, applications, and systems. Develop and execute incident response plans to handle and mitigate security breaches effectively. Collaborate with teams across … IT, development, and compliance to establish and enforce robust security policies and procedures. Monitor network activity, system logs, and security alerts to detect and respond to potential threats promptly. Investigate and analyze security anomalies and breaches, taking appropriate steps to minimize risks. Integrate security best practices into all stages of the development More ❯
Description Assured Information Security is seeking a skilled Senior-Level FSR/Developer supporting our government customer between two sites: Hanover and Fort Meade, MD. The ideal candidate will have hands-on experience with expertise across various IT disciplines, including virtualization, operating systems, networking, automation, and security. This position requires on-call availability as needed. What You'll … domain controller configurations, while executing secure offline updates using WSUS or CAB files. Support and maintain network environments, applying foundational knowledge of Cisco IOS/NXOS, performing basic security maintenance, and ensuring robust Layer 2/3 connectivity. Leverage automation tools, especially Ansible, to streamline deployments and configuration management; contribute to version control practices via Git, creating merge … and pull requests to support collaborative development. Apply DevSecOps principles to manage and deploy features securely and efficiently, integrating security into every step of the Software Development Lifecycle. Assist in security and compliance efforts, including running and interpreting scans using ACAS/Tenable Security Center, and addressing identified vulnerabilities. Education/Experience/Skillset More ❯
Policy Objects (GPOs), Trusts, DNS, AD Sites and Services, and other AD components. Perform user provisioning and de-provisioning, ensuring the application of best practices for Active Directory security (e.g., least privilege, proper account permissions, password policies). Implement and manage Active Directory Federation Services (ADFS) for authentication and federation with cloud and external resources. Manage Azure Active … Proficient in using PowerShell for automation and management of AD and Azure AD environments. Knowledge of IAM-related protocols like SAML, OAuth, OpenID Connect, and LDAP. Familiarity with security best practices in identity management, including multi-factor authentication (MFA) and role-based access control (RBAC). Ability to analyze and resolve complex IAM issues, including authentication, access, and … security problems. Strong verbal and written communication skills, capable of explaining complex technical issues to both technical and non-technical stakeholders. Ability to work cross-functionally with other teams, such as security, network, and applications teams, to address identity management challenges. Nice-to-Haves Certs: Microsoft Certified: Azure Solutions Architect, Okta Certified Administrator, or other relevant More ❯
for Software developers to support the development of modeling and simulation software. Possess expert level knowledge in one or more area of computing such as computing, database, numerical, security theory and analysis and advanced computing hardware development, primarily in a Microsoft Windows environment. The programmer will design, code, test, debug, and document programs based on customer requirements and More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Zolon Tech, Inc
reporting solutions Collaborate with stakeholders to gather requirements and translate them into actionable data visualizations and tools Create reusable templates and workflows that align with program goals and security policies Optimize report performance, ensure data accuracy, and support ongoing data quality efforts Participate in Agile development processes and use version control tools such as Git for source management … with Microsoft Power Platform, especially Power Apps and Power Automate Proven ability to integrate data from multiple systems, including SharePoint, SQL, and Excel Solid understanding of data governance, security roles, and user access management in Microsoft environments Familiarity with Agile methodologies and working within federal or highly regulated environments Strong problem-solving skills and ability to work independently … and collaboratively Preferred Qualifications: Experience supporting federal government contracts Microsoft certifications in Power BI or Power Platform Familiarity with NIST, FISMA, or FedRAMP security requirements Understanding of cloud platforms like Azure for data services Location: Hybrid - Preferred candidates local to the DC metro area Clearance: Must be clearable (Public Trust or higher More ❯
Position requires US Citizenship and a Secret securityclearance! We're seeking an experienced Modernization Software Engineer that focuses on integrating cutting-edge technology with legacy systems to enhance operational capabilities. The ideal candidate has experience with large legacy systems, a passion for modernization, and thrives in small, disconnected team environments. Adaptability to new technologies is a must. More ❯
Senior Linux Automation System Administrator Location: Aurora, CO (Onsite) SecurityClearance: Active TS/SCI with Poly (CI/FS) required Schedule: Monday - Friday, 8:00 AM - 5:00 PM Pay: Starting at $140,000 - 145,000 (Negotiable) - Full benefits included Duration: 12-month contract - likelihood of year-over-year extension What You Will Do As a Senior … Active and transferable U.S. government TS/SCI with polygraph (must be in place before start) U.S. Citizenship DoD 8570 IAT Level 2 certification (e.g., Security+ CE, CCNA Security, GICSP, GSEC, SSCP, CySA+, or CND) Hands-on experience with Red Hat Enterprise Linux (RHEL) Proficiency in automation and scripting (Ansible, Bash, Python) Qualifications We Prefer Experience with VMware More ❯
of relevant software engineering experience • Experience with JavaScript and Angular • Experience developing user interface software • The ability to obtain and maintain a U.S. government issued TS/SCI securityclearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a securityclearance JOB DESCRIPTION: In this role, you will be joining a More ❯
create solutions that support critical customer missions. The selected candidate will collaborate with cross-functional teams to deliver comprehensive, end-to-end mission system solutions. TS/SCI securityclearance is required at the time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to … administration. At least four years of experience as a domain administrator. Demonstrated experience with Microsoft Exchange Server 2016 or 2019, including: Performance monitoring and optimization. Applying patches and security updates. Planning and executing Exchange upgrades. Advanced troubleshooting of Exchange-related issues (mail flow, database corruption, client connectivity, etc.). Strong understanding of networking principles and protocols. Excellent problem More ❯
writing and modifying Java-based applications for network-connected databases, designing complex data queries, developing and executing test procedures, and collaborating with systems engineers to ensure performance and security standards are met. Tasks Performed: • Analyze user requirements to derive software design and performance requirements • Debug existing software and correct defects • Provide recommendations for improving documentation and software development … Java • Experience with JMS • Experience with Mongo, MySQL, or similar • Experience with Jira • Experience with Confluence, SharePoint, or similar Other Job Requirements: • Minimum Active Top Secret/SCI securityclearance with a Full Scope Polygraph • U.S. Citizenship, and successful background check • Location: Fort Meade, MD Salary Range & Benefits: • $105,648/Year • 401K • Health Insurance • Dental Insurance • Basic More ❯
user-friendly collaboration portal for document sharing, workflow management, and team communication. Implement integrations with enterprise systems, AI APIs, and cloud services. Develop access controls, user roles, and security features aligned with corporate and government compliance standards. Optimize performance, scalability, and user experience. Required Qualifications Bachelor's degree in Computer Science, Data Science, Engineering, or related field (Master … APIs. Hands-on experience with collaboration platforms (SharePoint, Confluence, custom-built portals, etc.). Proficiency with cloud environments (AWS, Azure, GCP) and related DevOps pipelines. Understanding of data security, identity management, and compliance in government or regulated environments. Preferred Qualifications Experience with FAR-based government contracting tools or proposal evaluation systems. Familiarity with vector databases, semantic search, and More ❯
communicate cross-sell and up-sell opportunities with the account team across services. What we're looking for (Required) Active TS/SCI clearance with CI Poly required. Security Certification (i.e, Security+, CISSP, etc) required. Splunk Certified Admin required. Bachelor's degree in a related area or at least 8 years of related work experience. Experience with, or … Linux and scripting (Python, Ansible, Teraform, JSON, others.) experience. Ability to troubleshoot Splunk instances. Create custom Splunk reports, dashboards, and content per customer requirements. Experience working in a Security Operations Center (SOC) Strong understanding of governance and compliance, specifically with FAR, DFARs, CUI and CMMC. Broad understanding of FedRAMP and IL constructs. Strong understanding of leadership concepts and … keen attention to detail. What we're looking for (Preferred) Active TS/SCI clearance with FS Poly preferred. Splunk IT Service Intelligence (ITSI) certification preferred. Splunk Enterprise Security Certified Admin preferred More ❯
and operation needs Ensuring consistent support for all environments (Development, Test, Integration, and Production) across all layers, modules, integration, connections, and interfaces Implementing and testing software patches and security fixes Performing installation, configuration, hardening, and testing for new and updated system changes Developing, executing, and improving documentation for installation, configuration, hardening, and operations and maintenance tasks Ensuring compliance … and procedures Conducting root cause analysis and resolving system and application faults and errors Ensuring operating systems and applications comply with Department of Defense (DoD) guidelines, including DISA Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental benefits 401k plan Paid time off Rewards More ❯
Arlington, Virginia, United States Hybrid / WFH Options
NewGen Technologies, Inc
NewGen is seeking a DevOps Engineer with hands on development and cloud experience. DoD Secret clearance preferred. Requirements: • 8+ years of IT professional services consulting or application development experience with a Bachelor's degree in Computer Science or Computer Engineering More ❯
of Linux to include use cases supporting patching, SSL toolset, capacity planning, routing protocols, and firewall rules. SPL/Dashboard experience in support of user analytics, systems performance, security, and environmental health. Knowledge of Splunk DataModels and their management to include implementation, tuning, and data normalization. Familiarity with Department Information Systems Agency (DISA) Security Technical Implementation … DoD 8570.01-M Information Assurance Technical (IAT) Level II certification to begin on contract: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE (Continuing Education) (ISC) Systems Security Certified Practitioner (SSCP) GIAC Global Industrial Cyber Security Professional (GICSP) GIAC Security Essentials Certification (GSEC) (ISC) Systems Security Certified Practitioner (SSCP) Requires one More ❯
and consistent dataset. • Normalization Techniques: Utilize normalization principles to reduce redundancy and improve data integrity. • Indexing Strategies: Implement indexing techniques to optimize query performance and data retrieval. • Database Security: Use data security best practices to enforce data privacy and protect sensitive information. • Scalability and Performance: Design database that can scale horizontally or vertically to handle increasing … command of SQL (Structured Query Language) for querying, manipulating, and managing data within databases. • Database Administration: Familiarity with database administration tasks such as performance tuning, backup and recovery, security management, and user access control. • Communication Skills: Effective communication skills to collaborate with team members, stakeholders, and business users, and to translate technical concepts into non-technical terms. Working … check. • Once candidate's resume is approved and interview passed, the agency is responsible for providing drug screening. Failure to submit the drug screening results will delay the securityclearance process. • If a candidate is given an interim clearance, continuation of employment is then based on the candidate receiving a sensitive clearance. Regards, Shweta Pandey Sr. Technical Recruiter More ❯
and implementation of software systems/services solutions based on requirements analysis; perform operational feasibility evaluations and recommend improvements; develop and maintain system and solution code, architecture, and security documentation. Required Qualifications: 15+ years' work experience plus a Bachelor's Degree in a technical discipline such as Computer Science, Information Technology, or equivalent work experience. Experience with designing … facilitating engineering discussions across teams representing multiple stakeholders to develop and execute implementation strategies that meet mission needs. Experience with agile software development and testing. Experience with data security, regulatory and compliance requirements, and security accreditation package development. Experience with data security and governance using centralized security controls like LDAP, encryption, and … auditing. Experience with specialized technologies that are optimized for the particular use of the data, such as relational databases, NoSQL database, or object storage Experience using centralized security controls like LDAP, encrypting data, and auditing access to data. Experience and understanding of IT Service Management and common SLA measurements. Experience working with container orchestration technologies such as AWS More ❯
code modules. Assist in maintaining internal tools and scripts. Develop and run tests using team-approved frameworks. Optimize existing code and log, track, and close bugs. Adhere to security coding practices. Follow established processes for configuration management, change control, and software release. Testing and Quality Assurance Assist QA engineers in writing and running test plans. Participate in integration … to participate in code reviews and learn coding standards. Capability to write, debug, and test code modules. Ability to work independently while knowing when to request support. SECRET securityclearance or ability to obtain within 6 months. Nice-to-Haves Experience with electronic warfare or defense systems. Background in system integration projects. Familiarity with QA testing methodologies. Experience More ❯