SECURITY

Information Systems Security Engineer (ISSE) & Information Systems Security Officer (ISSO) | TS/SCI FS Poly | Annapolis Junction, MD | $220K–$260K

Job Title: Information Systems Security Engineer (ISSE) & Information Systems Security Officer (ISSO)
Location: Annapolis Junction, Maryland (100% Onsite)
Clearance Required: TS/SCI with Full Scope Polygraph (FS Poly)
Compensation: $220,000 – $260,000 base salary
Employment Type: Full-time
Relocation Assistance: Possible for ideal candidate
Benefits: Full benefits offered
Visa Candidates: Not considered

Overview:

We are hiring two experienced cybersecurity professionals for an exciting and mission-critical government program based in Annapolis Junction, MD. Both roles require active TS/SCI with Full Scope Poly (poly must be within the past 5 years and from a Maryland Intelligence Customer). While both positions are integral to the security posture of the program, each requires a different focus, background, and certification path.

1. Information Systems Security Engineer (ISSE)

Role ID: 727
Seniority Level: Mid to Senior
Clearance: TS/SCI w/ FS Poly (mandatory)
Certifications Required:

  • CISSP (Required)

  • ISSEP (Preferred or willing to obtain during crossover if CISSP has been held for 2+ years)

Key Responsibilities:

  • Develop and implement system security designs and architectures for complex, large-scale systems.

  • Lead security risk assessment and mitigation throughout the system development lifecycle.

  • Conduct system security planning, vulnerability testing, and compliance verification.

  • Analyze and implement secure communication protocols, encryption tools, and secure OS configurations.

  • Collaborate with engineers across integration, testing, and development teams to ensure compliance with classified information handling.

  • Use tools such as Nessus, NMAP, Wireshark for threat identification and remediation.

  • Support RMF, risk management activities, and IA (Information Assurance) processes.

Preferred Experience:

  • Bachelor’s or Master’s in Cybersecurity, Information Assurance, or related field.

  • Experience with Defense-in-Depth principles, secure software architecture, and penetration testing tools.

  • Proficient in scripting languages and secure configuration management.

2. Information Systems Security Officer (ISSO)

Role ID: 643
Seniority Level: Mid to Senior
Clearance: TS/SCI w/ FS Poly (mandatory)
Certifications Required:

  • IAT Level II or IAM Level II certification (Required)

    • Examples: Security+ CE, CASP+, CISSP, CISM, or similar

Key Responsibilities:

  • Act as ISSO for a large-scale software development and IT operations program.

  • Enforce security policies and maintain operational security posture of systems.

  • Manage documentation for system Certification & Accreditation (C&A) and Security Plans (SSPs).

  • Conduct vulnerability remediation, IAVA compliance, and configuration management for system security.

  • Support day-to-day information system operations, network security, and audit readiness.

  • Coordinate with ISSM and other security stakeholders to ensure secure system integration and lifecycle support.

Preferred Experience:

  • 10+ years as an ISSO in complex, standalone, or connected environments.

  • Experience maintaining SSPs, performing incident response, and managing vulnerability scans.

  • Familiarity with tools supporting IAVA management, CM, and system auditing.

  • Bachelor’s degree in a related field and 12+ years of overall security experience preferred.

Ideal Candidate Profile (Both Roles):

  • Must hold a current FS Poly with the Maryland Intelligence Customer (within the past 5 years).

  • No prior CCAs (Counterintelligence Concerns).

  • Excellent verbal/written communication skills and team collaboration.

  • Strong commitment to best practices and high-integrity security operations.

Additional Notes:

  • Both roles are 100% onsite in Annapolis Junction, MD.

  • Do not repost these positions.

  • Candidates must be U.S. Citizens with an active TS/SCI with Full Scope Polygraph.

 

Senior Manager, Industrial Security (FSO) | $153K–$175K | Defense & Aerospace | Greenville, TX

Job Title: Sr. Manager, Industrial Security (Facility Security Officer - FSO)
Location: Greenville, TX (Onsite)
Industry: Aerospace / Aviation / Defense
Category: Security / Industrial Security
Seniority Level: Mid-Senior
Employment Type: Full-Time
Work Schedule: 9/80 Regular
Remote/Onsite: Onsite (classified work required)
Travel: Occasional
Visa Candidates Considered: No
Security Clearance Required: Yes (Top Secret/SCI, adjudicated and in-scope T5)
Relocation Assistance: Yes
Compensation:

  • Base Salary: $153,000 – $175,000

  • Bonus Eligible: No

  • Commission: No

  • Overtime Eligible: No

  • Benefits: Full benefits package included

  • Interview Travel Reimbursed: No

Role Overview:

A leading defense and aerospace organization is seeking a Senior Manager, Industrial Security (FSO) to oversee and manage all aspects of classified security operations supporting Department of Defense (DoD) and Intelligence Community (IC) programs. This leadership role is critical in ensuring compliance with national security regulations, managing the security program lifecycle, and protecting sensitive assets, personnel, and facilities.

Key Responsibilities:

  • Manage, implement, and enforce security compliance per the National Industrial Security Program (NISP) and 32 CFR Part 117 (NISPOM Rule).

  • Serve as the designated Facility Security Officer (FSO) and lead a multidisciplinary security team covering industrial, personnel (PERSEC), physical, and information security.

  • Develop and maintain SOPs, Operational Security Programs, and ensure compliance with all federal and company security policies.

  • Lead and support government security investigations, audits, and assessments.

  • Oversee COMSEC program management, asset tracking, and accountability.

  • Conduct security training, briefings, and education for staff with access to classified material.

  • Engage with stakeholders to interpret security directives, mitigate insider threats, and respond to compliance challenges.

  • Utilize tools and systems such as SIMS, NISS, DISS/NBIS, and maintain familiarity with ICD 705 standards.

  • Maintain up-to-date knowledge on evolving federal security regulations and interdisciplinary compliance across IT, cybersecurity, and configuration management.

  • Act as a security advisor to site leadership and corporate teams to ensure effective protection of personnel, facilities, and information.

Minimum Qualifications:

  • Bachelor’s degree with at least 12 years of relevant experience, or

  • Graduate degree with at least 10 years of related experience, or

  • 16+ years of experience in lieu of a degree.

  • FSO Certification as defined by Defense Counterintelligence and Security Agency (DCSA).

  • Minimum 5 years of direct hands-on FSO experience.

  • Current DoD Top Secret/SCI clearance with adjudicated, in-scope T5 investigation.

  • U.S. Citizenship required.

Preferred Qualifications:

  • Counterintelligence or full-scope polygraph.

  • Degree(s) in Security Management, Criminal Justice, Homeland Security, or related fields.

  • Proficiency in SIMS, NISS, DISS/NBIS; familiarity with ICD 705.

  • Experience with Insider Threat Program management.

  • Knowledge of COMSEC handling and procedures.

  • Professional certifications such as ISP, CPP, or other security designations.

  • Familiarity with DCS, FMS programs, or international travel processes.

Ideal Candidate Profile:

  • Brings 5+ years of direct FSO experience in a classified defense or intelligence setting.

  • Holds a valid FSO certificate and an active Top Secret/SCI clearance.

  • Demonstrates deep understanding of DoD and IC regulatory frameworks.

  • Highly organized, self-motivated, and capable of operating independently in a fast-paced environment.

  • Strong leadership, compliance, and stakeholder engagement skills.

 

Information Systems Security Engineer (ISSE) & Information Systems Security Officer (ISSO) | TS/SCI FS Poly | $220K–$260K | Annapolis Junction, MD

Job Title: Information Systems Security Engineer (ISSE) & Information Systems Security Officer (ISSO)
Location: Annapolis Junction, Maryland (100% Onsite)
Clearance Required: TS/SCI with Full Scope Polygraph (FS Poly)
Compensation: $220,000 – $260,000 base salary
Employment Type: Full-time
Relocation Assistance: Possible for ideal candidate
Benefits: Full benefits offered
Visa Candidates: Not considered

Overview:

We are hiring two experienced cybersecurity professionals for an exciting and mission-critical government program based in Annapolis Junction, MD. Both roles require active TS/SCI with Full Scope Poly (poly must be within the past 5 years and from a Maryland Intelligence Customer). While both positions are integral to the security posture of the program, each requires a different focus, background, and certification path.

1. Information Systems Security Engineer (ISSE)

Role ID: 727
Seniority Level: Mid to Senior
Clearance: TS/SCI w/ FS Poly (mandatory)
Certifications Required:

  • CISSP (Required)

  • ISSEP (Preferred or willing to obtain during crossover if CISSP has been held for 2+ years)

Key Responsibilities:

  • Develop and implement system security designs and architectures for complex, large-scale systems.

  • Lead security risk assessment and mitigation throughout the system development lifecycle.

  • Conduct system security planning, vulnerability testing, and compliance verification.

  • Analyze and implement secure communication protocols, encryption tools, and secure OS configurations.

  • Collaborate with engineers across integration, testing, and development teams to ensure compliance with classified information handling.

  • Use tools such as Nessus, NMAP, Wireshark for threat identification and remediation.

  • Support RMF, risk management activities, and IA (Information Assurance) processes.

Preferred Experience:

  • Bachelor’s or Master’s in Cybersecurity, Information Assurance, or related field.

  • Experience with Defense-in-Depth principles, secure software architecture, and penetration testing tools.

  • Proficient in scripting languages and secure configuration management.

2. Information Systems Security Officer (ISSO)

Role ID: 643
Seniority Level: Mid to Senior
Clearance: TS/SCI w/ FS Poly (mandatory)
Certifications Required:

  • IAT Level II or IAM Level II certification (Required)

    • Examples: Security+ CE, CASP+, CISSP, CISM, or similar

Key Responsibilities:

  • Act as ISSO for a large-scale software development and IT operations program.

  • Enforce security policies and maintain operational security posture of systems.

  • Manage documentation for system Certification & Accreditation (C&A) and Security Plans (SSPs).

  • Conduct vulnerability remediation, IAVA compliance, and configuration management for system security.

  • Support day-to-day information system operations, network security, and audit readiness.

  • Coordinate with ISSM and other security stakeholders to ensure secure system integration and lifecycle support.

Preferred Experience:

  • 10+ years as an ISSO in complex, standalone, or connected environments.

  • Experience maintaining SSPs, performing incident response, and managing vulnerability scans.

  • Familiarity with tools supporting IAVA management, CM, and system auditing.

  • Bachelor’s degree in a related field and 12+ years of overall security experience preferred.

Ideal Candidate Profile (Both Roles):

  • Must hold a current FS Poly with the Maryland Intelligence Customer (within the past 5 years).

  • No prior CCAs (Counterintelligence Concerns).

  • Excellent verbal/written communication skills and team collaboration.

  • Strong commitment to best practices and high-integrity security operations.

Additional Notes:

  • Both roles are 100% onsite in Annapolis Junction, MD.

  • Do not repost these positions.

  • Candidates must be U.S. Citizens with an active TS/SCI with Full Scope Polygraph.

 

Cyber Security Engineering & Support Manager | Vulnerability Management | Pittsburgh, PA | $120K–$140K + Bonus

Cyber Security Engineering & Support Manager

📍 Location: Pittsburgh, PA (Onsite – no remote options)
💼 Employment Type: Full-time
💵 Salary: $120,000 – $140,000 annually + bonus eligibility
🎯 Experience Level: Mid-Senior (7–10 years)

About the Role

This role leads a dedicated cybersecurity engineering and support team focused on protecting enterprise technologies and infrastructure across IT and manufacturing environments. You’ll oversee the deployment and lifecycle management of enterprise security tools, direct the vulnerability management program, and provide critical cybersecurity risk analytics to support strategic decision-making.

Reporting directly to the Chief Information Security Officer, you’ll be responsible for ensuring secure, scalable solutions across global operations while managing a skilled technical team.

Key Responsibilities

  • Lead and manage the Security Engineering & Support team, including staff development and budget oversight.

  • Deploy, support, and optimize enterprise security technologies across IT, end-user, and cybersecurity environments.

  • Own and execute the organization’s vulnerability management strategy, reducing attack surfaces and strengthening resilience.

  • Develop and deliver cybersecurity risk dashboards with actionable KPIs and KRIs.

  • Oversee operational security functions such as privileged access provisioning and IT compliance support.

  • Partner with business units and OT teams (e.g., PLCs, SCADA, HMIs) to align secure solutions with plant-level and enterprise objectives.

  • Collaborate across the business to integrate security with enterprise architecture, applications, and eCommerce platforms.

Required Qualifications

  • Bachelor’s degree in Computer Science, Information Systems, Engineering, or a related field.

  • 7+ years of experience in IT, infrastructure, or cybersecurity.

  • Proven experience leading vulnerability management programs.

  • Must be a U.S. citizen, lawful permanent resident, or otherwise eligible to access controlled technology under ITAR/EAR regulations.

Preferred Qualifications

  • 2+ years of management experience leading IT or cybersecurity professionals.

  • Experience managing departmental budgets.

  • Background in manufacturing or production environments.

  • Expertise in systems engineering, application security, and security operations.

  • Active security certifications such as CISSP, CISM, CISA, or Security+.

  • Master’s degree in cybersecurity, engineering, or related field.

Ideal Candidate Profile

  • Strong leadership skills with a proven ability to guide cross-functional teams.

  • Skilled in budget management and process optimization.

  • Excellent interpersonal and communication skills for engaging both technical and non-technical stakeholders.

  • Hands-on experience in manufacturing or production IT environments is highly desirable.

Compensation & Benefits

  • Base Salary: $120,000 – $140,000 per year

  • Bonus Eligible

  • Comprehensive benefits package (medical, dental, vision, retirement, life insurance, etc.)

  • Paid time off and holidays

  • Professional development opportunities

👉 This is a strategic cybersecurity leadership opportunity for a professional ready to drive enterprise-wide security programs while directly influencing resilience and risk management.

 

Information Security Analyst | Cybersecurity, Threat Intelligence & Incident Response | Madison, WI | $97K–$146K

Information Security Analyst

📍 Madison, Wisconsin (Hybrid – Flexible Work From Home Days)
📅 Full-time | Mid-Senior Level

💰 Salary: $97,000 – $146,000 per year
Benefits: Full package (healthcare, retirement, PTO & more)

🚀 About the Role

We are seeking a skilled Information Security Analyst to strengthen our cybersecurity defenses and protect enterprise systems from evolving threats. In this hands-on, high-impact role, you’ll be at the forefront of detecting, analyzing, and responding to incidents—keeping critical data and infrastructure safe.

This position offers a unique opportunity to work across threat intelligence, incident response, and digital forensics, while collaborating with cross-functional teams to enhance the organization’s overall security posture.

🛡️ Key Responsibilities

  • Monitor and analyze threat intelligence to assess risks and drive proactive defense strategies.

  • Investigate escalated incidents (malware, phishing, unauthorized access) through the full response lifecycle.

  • Conduct forensic investigations, advanced data collections, and eDiscovery requests.

  • Support incident response tabletop exercises to identify gaps and enhance readiness.

  • Review vulnerability scans and penetration test results, recommending improvements.

  • Develop and maintain security policies, standards, and training to strengthen organizational awareness.

  • Collaborate with IT, Legal, HR, and leadership teams on investigations and compliance.

🔧 Required Skills & Experience

  • 5+ years of information security experience (audit, assessment, engineering, or architecture).

  • Strong understanding of incident response, threat intelligence, and forensic analysis.

  • Experience with tools such as Magnet Forensics Axiom Cyber, Splunk, Microsoft Defender, and MITRE ATT&CK.

  • Ability to clearly communicate technical findings to both technical and non-technical audiences.

  • Proven expertise in developing security policies, standards, and governance practices.

  • Bachelor’s degree in Computer Science, Information Systems, or related field (or equivalent experience).

🎯 Preferred Qualifications

  • Financial Services industry background.

  • Law enforcement or forensics experience.

  • Strong consulting, negotiation, and relationship management skills.

This role is ideal for a proactive cybersecurity professional who thrives on investigating threats, improving defenses, and collaborating to protect sensitive information.

Cloud Governance Manager | Microsoft Purview, Data Governance, GRC | Remote (US) | Legal Industry

Cloud Governance Manager – Remote (Must Be Local to Specific U.S. Cities)

📍 Remote, with preference for candidates within commuting distance of Atlanta, Boston, Los Angeles, Chicago, Dallas, Houston, New York City, Orange County, Palo Alto, San Diego, San Francisco, or Washington DC
💼 Senior Level | Information Technology | Legal Industry
💰 Competitive Compensation + Benefits

Why This Role is Exciting

This is a strategic leadership opportunity for an experienced Cloud Governance Manager to shape and oversee enterprise-wide data governance initiatives at one of the nation’s most prestigious law firms. You’ll design and implement frameworks that safeguard sensitive information, drive regulatory compliance, and enable secure data sharing across a complex, high-performing environment.

If you have a passion for data security, cloud platforms, and governance frameworks, this role offers both challenge and impact at the highest level.

Key Responsibilities

  • Governance Frameworks: Develop and implement firm-wide data governance policies, procedures, and standards, leveraging tools like Microsoft Purview, Data Lifecycle Management, DLP, iManage Threat Manager, and Varonis.

  • Data Retention & Classification: Enforce policies to meet regulatory and business requirements.

  • Security & Privacy: Assess and strengthen controls to protect against unauthorized access and disclosure.

  • Training & Enablement: Provide guidance and training on governance best practices.

  • Collaboration: Partner with attorneys, IT, and business stakeholders to design secure and compliant data-sharing solutions.

  • Cross-Functional Integration: Work closely with Governance, Security, GRC, and Compliance teams to align strategy and execution.

  • Cloud Leadership: Deliver thought leadership on secure design, reporting, and alerting across Office 365 and other cloud platforms.

What We’re Looking For

7+ years of IT, information security, and risk management experience
✅ Strong project management skills with the ability to assess and manage risks
✅ High-level technical understanding of security applications, cloud platforms, and data governance architectures
✅ Expertise with governance, risk, and compliance (GRC) practices
✅ Deep knowledge of information security standards/frameworks (CSF, NIST, ISO)
✅ Strong collaboration, communication, and stakeholder management skills
Bachelor’s degree in Information Security, Information Assurance, Computer Science, or Information Systems (preferred)
✅ Professional certifications such as CISA, CISM, CISSP, CRISC, or GSEC (preferred)
✅ Advanced knowledge of Microsoft Purview and governance tools
✅ Familiarity with law firm operations and regulatory compliance

Benefits & Perks

🌟 Competitive salary & comprehensive benefits package
🌟 Remote-first role with flexibility (must be local to one of the listed metro areas)
🌟 Work with a top-tier Am Law firm on cutting-edge security and governance initiatives
🌟 Professional development, certifications, and career growth opportunities
🌟 Collaborative, inclusive, and forward-thinking environment

🚀 This is your chance to join a globally recognized legal leader in a pivotal role that blends technology, governance, and security.

 

Senior Security Specialist | HSM & Encryption Key Management | Pittsburgh, PA | $120K–$160K + Hybrid

🔐 Senior Security Specialist – HSM & Encryption Key Management

📍 Pittsburgh, PA | Hybrid (2 Days Onsite / 3 Remote)
💼 Mid–Senior Level | Full-Time | Immediate Start

💲 Base Salary: $120,000 – $160,000
🏡 Hybrid Schedule: 2 days in-office or as needed for critical operations
🚫 Visa Sponsorship: Not Supported
🚚 Relocation: Possible for the ideal candidate

🌟 The Opportunity

Join a top-tier financial organization as a Senior Security Specialist, leading enterprise-wide initiatives in encryption key management, HSM lifecycle operations, and cryptographic security.

This is a pivotal role for a hands-on technical expert passionate about cryptography, encryption algorithms, and key lifecycle management. You’ll be at the forefront of protecting critical enterprise assets by designing and managing secure encryption frameworks, performing key ceremonies, and maintaining compliance within a highly regulated industry.

If you’re seeking a challenging role where you’ll directly influence enterprise security architecture and cryptographic strategy — this is it.

🧭 What You’ll Do

🧩 Encryption & Key Management

  • Design, develop, and implement enterprise encryption solutions and HSM frameworks.

  • Lead HSM lifecycle activities, including initialization, configuration, upgrades, and decommissioning.

  • Manage encryption key lifecycle processes — including generation, rotation, backup, and destruction.

  • Oversee key ceremonies, dual control, and chain-of-custody procedures to ensure compliance and audit readiness.

🔒 Security Operations & Risk Mitigation

  • Provide subject matter expertise on encryption technologies and cryptographic controls.

  • Develop and maintain secure room operations, documentation, and procedural guidelines.

  • Evaluate risks, identify vulnerabilities, and recommend solutions aligned with enterprise security frameworks.

  • Support compliance with internal and external regulatory standards.

🧠 Technical Leadership

  • Collaborate with cross-functional teams to integrate cryptographic solutions into enterprise systems.

  • Advise on the impact of new standards, policies, and technologies on existing security solutions.

  • Mentor junior security professionals, sharing expertise in cryptography and secure key management.

  • Stay ahead of industry trends and emerging technologies to proactively strengthen security posture.

⚙️ What You’ll Bring

  • Bachelor’s degree (Master’s or relevant certifications preferred).

  • 8+ years of experience in security engineering or cryptographic key management, ideally within a highly regulated or banking environment.

  • Deep experience with Hardware Security Modules (HSMs) such as Thales Network HSM, nShield, and Cloud HSM solutions.

  • Strong understanding of encryption algorithms, cryptographic principles, and key management lifecycle.

  • Familiarity with Aruba, Aravo, Thales CipherTrust Manager, or Oracle Key Vault a plus.

  • Knowledge of BYOK / HYOK integrations across Azure, AWS, or GCP preferred.

  • Hands-on experience with scripting, automation, and analytics tools such as PowerBI, Dynatrace, Jira, Confluence, and SharePoint.

  • Excellent problem-solving, documentation, and communication skills.

🧩 Ideal Candidate

  • Brings physical HSM management experience (PED-based operations).

  • Comfortable leading key ceremonies and secure chain-of-custody processes.

  • Excels in both technical execution and process oversight.

  • Demonstrates composure and attention to detail in high-stakes, compliance-driven environments.

🎁 Benefits & Perks

  • Comprehensive Medical, Dental, and Vision coverage

  • 401(k) with company match

  • Paid Time Off and Holidays

  • Employee Assistance Programs

  • Ongoing professional development and certification support

  • Hybrid flexibility with occasional on-site collaboration

🧭 Interview Process

1️⃣ Introductory call with Talent Partner
2️⃣ Technical Interview with Security Leadership
3️⃣ Final round with Enterprise Security Team

🌍 Why Join

Step into a mission-critical security role that directly safeguards enterprise data and digital infrastructure. You’ll collaborate with top cybersecurity experts, leverage leading-edge cryptographic technologies, and help shape the organization’s encryption strategy for years to come.

This is your opportunity to own the encryption key lifecycle, drive innovation in HSM management, and make a tangible impact in a world-class enterprise security environment.

 

 

Cyber Security Engineer III – $95K–$115K | On-Site | Infrastructure & IT | Elkhart, IN

Position: Cyber Security Engineer III

📍 Location: Elkhart, IN (On-Site)
📅 Type: Full-Time | All Experience Levels Considered
🎓 Education: Bachelor’s degree in Computer Science or equivalent experience
🛂 Visa Sponsorship: Not available
🚗 Relocation Assistance: Available
💼 Industry: Infrastructure / Technology / Construction
💰 Compensation: $95,000 - $115,000

About the Role

We are looking for a Cyber Security Engineer III to strengthen and safeguard enterprise IT operations within a mission-critical infrastructure environment. You’ll respond to cybersecurity incidents, manage security tools and platforms, lead vulnerability programs, and play a key role in shaping and executing security policy.

This is a high-impact, hands-on role ideal for someone with a broad technical security background, who thrives in a collaborative environment and understands how to balance robust security with operational needs.

Key Responsibilities

  • Monitor for security anomalies, policy violations, and suspicious activities across networks and endpoints

  • Respond to incidents with clear documentation, root cause analysis, and effective resolution

  • Lead vulnerability management efforts—guiding remediation and patching with IT teams

  • Oversee security toolsets: firewalls, SIEM, antivirus, proxies, email protection, asset discovery tools, etc.

  • Conduct regular security control testing and provide clear reporting

  • Ensure systems align with internal security policies, frameworks, and compliance requirements

  • Collaborate with auditors, regulatory bodies, and external vendors as needed

  • Contribute to secure network/system architecture design discussions

  • Participate in cybersecurity on-call rotation and cross-functional team efforts

  • Remain current on emerging threats, vulnerabilities, and best practices

Must-Have Qualifications

Bachelor’s degree in Computer Science or equivalent practical experience
5+ years of hands-on information security experience
✅ Demonstrated experience with penetration testing, vulnerability remediation, and policy enforcement
✅ Proficiency in security technologies:

  • Firewalls & Proxies

  • SIEM platforms (e.g., Splunk, QRadar, etc.)

  • Antivirus and endpoint protection

  • Identity Providers (IdPs)
    ✅ Deep understanding of network security concepts
    ✅ Ability to independently identify and fix vulnerabilities across on-premise and remote networks
    ✅ Must hold a valid driver’s license

What Success Looks Like

  • You bring a security-first mindset without slowing business operations

  • You’re a self-starter with solid judgment and clear documentation skills

  • You provide security recommendations that are realistic, effective, and forward-looking

  • You’re ready to become a trusted security voice across IT and business teams

  • You actively participate in on-call duties, staying calm under pressure

If you're a cybersecurity professional who’s passionate about protecting critical infrastructure, enjoys hands-on tooling, and thrives in a role that combines operations with strategy—this position could be a great fit.

 

Learn more

Application Offensive Security Consultant – PenTesting | Financial Services | $65/hr | Jersey City, NJ (Hybrid)

Application Offensive Security Consultant
Location: Jersey City, NJ (Hybrid)
Industry: Financial Services
Experience Level: Associate
Employment Type: Initial 6-Month Contract (Contract-to-Hire)
Work Hours: Full-Time
Pay Rate: $65 per hour
Relocation Assistance: No
Visa Sponsorship: Not Available

Exciting Opportunity for an Application Offensive Security Consultant!

Are you passionate about application security, penetration testing, and offensive security strategies? This role offers the chance to work on high-impact security assessments, collaborate with top security professionals, and enhance application defenses against evolving threats. If you love testing applications, discovering vulnerabilities manually, and working in a fast-paced environment, this is the perfect opportunity for you!

What You’ll Do:

  • Conduct Offensive Security Testing against applications and APIs.

  • Perform manual security testing beyond automated vulnerability scanning.

  • Hunt for application threats and evaluate security risks.

  • Provide vulnerability findings in a structured reporting format.

  • Generate detailed security assessment reports and recommend remediation strategies.

  • Act as a subject matter expert on application security and offensive security tactics.

  • Collaborate with Security Architects, Product Managers, and Risk Managers to enhance security practices.

What You Bring to the Table:

  • 6+ years of experience in testing web applications.

  • 4+ years of hands-on experience with App PenTest tools such as Burp Suite and Owasp Zap.

  • Ability to manually discover vulnerabilities beyond standard scanning tools.

  • Strong understanding of OWASP Top 10, MITRE Framework, and adversarial methodologies.

  • Bachelor’s Degree or equivalent practical experience.

Bonus Skills:

  • Offensive security or penetration testing certifications.

  • Completion of penetration testing & red teaming courses.

  • Passion for Capture the Flags (CTFs), TryHackMe, HackTheBox, and other cybersecurity challenges.

  • Ability to perform under pressure, multitask, and adapt to evolving security landscapes.

If you’re ready to put your security expertise to the test and contribute to a team that values innovation, apply today and be part of a cutting-edge security initiative!

 

Learn more

Principal Information Security Architect – Healthcare Tech | Remote

Principal Information Security Architect - Healthcare Technology

Location: Fully Remote

Industry: Healthcare / Health Services
Job Category: Healthcare IT

Job Summary

The Principal Information Security Architect - Healthcare Technology serves as a senior security architect and technology analyst, specializing in healthcare delivery systems and IoT. This role is responsible for integrating business needs, regulatory requirements, security considerations, and emerging technologies into system architecture and design. The position requires collaboration with cross-functional teams, technical leaders, and executive stakeholders to drive innovation and enhance security frameworks.

Essential Responsibilities

  • Develop scalable, secure system architectures and APIs that align with business objectives and industry best practices.

  • Provide strategic guidance on emerging technologies, risk management, and architectural solutions to senior leadership.

  • Influence enterprise solutions by defining and maintaining platform strategies, design patterns, and security frameworks.

  • Partner with engineering teams to provide ongoing architectural mentorship and ensure successful product implementation.

  • Establish strong relationships with key technical and business stakeholders to drive standardization and best practices.

  • Analyze current and future technology landscapes, synthesizing insights to support business-driven security solutions.

  • Advocate for and implement security best practices across cloud and on-premise environments to support high scalability, reliability, and compliance.

  • Provide consultative support on architecture strategy, risk assessment, and innovation-driven initiatives.

  • Mentor and guide technical teams on security and architecture principles.

  • Promote a culture of innovation, security, and continuous improvement.

  • Other duties as assigned.

Experience Requirements

Required:

  • 10+ years of experience in Information Security.

  • 4+ years of experience as an Information Security Architect with expertise in security domains such as Zero Trust, Data Protection, Identity & Access Management, and Threat Management.

  • 3+ years of experience with data management, distributed processing, high availability systems, and machine learning applications.

Preferred:

  • 3+ years of experience in Mergers and Acquisitions, including evaluation and integration.

  • 3+ years of experience leading technical teams.

Skills & Competencies

  • Excellent communication skills, with the ability to convey complex security concepts to both technical and non-technical audiences.

  • Strong technical expertise across cloud and on-premise environments, architectures, and APIs.

  • Proven ability to drive enterprise security programs and product strategies at scale.

  • Sound judgment in analyzing cyber risks and developing risk-appropriate solutions.

Education Requirements

Required:

  • Bachelor's degree in Computer Science or a related field, or equivalent experience.

Preferred:

  • Master’s degree in Computer Science or a related field.

Certifications (Preferred but Not Required)

  • The Open Group Architecture Framework (TOGAF)

  • Certified Information Security Professional (CISSP)

  • Certified Information Security Manager (CISM)

Additional Details

  • Work Type: Remote

  • Travel Requirement: 0% - 25%

  • Compensation: $150,000 - $180,000 (Base Salary)

  • Benefits: Full-time benefits package available

  • Relocation Assistance: Not available

  • Bonus & Commission: Not applicable

Equal Employment Opportunity Statement

This company is committed to equal opportunity employment and prohibits discrimination based on race, color, age, religion, sex, national origin, sexual orientation, gender identity, veteran status, disability, or any other protected category.

Candidates must comply with data security policies, including adherence to industry regulations such as HIPAA.

Security Clearance Required: No
Visa Sponsorship Available: No

 

Learn more

Regional Security Operations Center (SOC) Lead | Phoenix, AZ | Hybrid

Position: Regional Security Operations Center (SOC) Lead
Location: Phoenix, AZ (Hybrid)
Contract Type: 12-month contract, W2 only (No sponsorship or C2C)
Pay Rate: $52 per hour
Experience Level: Junior Level (1-3 years of experience)
Industry: Government Administration

Job Summary

The Regional Security Operations Center (RSOC) Lead will oversee and support cybersecurity efforts across Regional Security Operations Centers (RSOCs) located at community colleges in Arizona. This role assists the SOC Manager in coordinating daily operations, detecting and responding to security threats, and enhancing regional security capabilities. The ideal candidate is detail-oriented, collaborative, and well-versed in cybersecurity principles.

Key Responsibilities

  1. Operational Support

    • Manage daily security operations across regional SOCs.

    • Implement cybersecurity policies, procedures, and incident response protocols.

    • Standardize and enhance security operations through resource coordination.

  2. Incident Response and Threat Monitoring

    • Monitor security events and respond to incidents in collaboration with regional SOC teams.

    • Analyze security incidents to determine root causes and resolution strategies.

    • Coordinate with regional IT and security staff for cohesive threat response.

  3. Training and Mentorship

    • Mentor and train community college students involved in SOC operations.

    • Conduct hands-on training sessions and workshops to develop cybersecurity skills.

  4. Documentation and Reporting

    • Maintain records of incidents, resolutions, and operational metrics.

    • Prepare incident response logs, weekly updates, and monthly reports to drive continuous improvement.

  5. Collaboration and Relationship Management

    • Act as a liaison between the SOC Manager, community college stakeholders, and regional IT/security staff.

    • Participate in SOC meetings and regional cybersecurity initiatives to maintain alignment.

Qualifications

  • Experience: 1-3 years in a SOC, cybersecurity, or IT operations role.

  • Preferred Education: Bachelor’s degree in Cybersecurity, IT, Computer Science, or a related field.

  • Certifications: CompTIA Security+, CISSP, or CISM (preferred).

  • Skills:

    • Strong knowledge of cybersecurity principles, threat analysis, and incident response.

    • Familiarity with SIEM tools, firewalls, and security technologies.

    • Excellent communication, problem-solving, and organizational skills.

Additional Information

  • Must reside in Arizona (hybrid role).

  • Limited travel (10%) required to regional SOCs.

 

 

Learn more

Senior Technical Architect – IT | Identity Services | Sailpoint IQ | NYC | Remote

Job Title: Senior Technical Architect – Information Technology

Location: New York City, NY (Remote with occasional on-site presence required; candidates must live within a commutable distance)
Employment Type: Full-Time
Industry: Healthcare / IT / Cybersecurity
Experience Level: Mid-Senior
Compensation: $161,000 - $245,000 annually
Benefits: Full package (details below)
Relocation Assistance: Not available
Visa Sponsorship: Not available

Position Summary

The Senior Technical Architect will play a key role in designing, operating, and maintaining the Identity Services portfolio of products. This includes application integration, access control systems, data analytics, report generation, and incident investigation. The role requires extensive collaboration across departments, engagement with senior management, and the ability to evaluate systems and vendors to address organizational needs effectively.

Key Responsibilities

  • Analyze, design, and implement integrations between SailPoint IdentityIQ and application system data feeds.

  • Maintain and manage a catalog of roles (automatic and manual) in SailPoint IdentityIQ.

  • Develop and maintain custom workflows and integrations for credentialing and physician information systems.

  • Conduct access certification campaigns in collaboration with application teams and internal audit.

  • Provide subject matter expertise and technical guidance across Identity Services applications.

  • Design and deliver reports, resolve reporting issues, and manage report generation.

  • Support multifaceted test plans, including conducting unit and system tests for software solutions.

  • Install and manage updates in alignment with change control standards.

  • Serve as a consultant for projects, offering expertise on Identity Services systems.

  • Mentor team members, provide training resources, and foster a collaborative work environment.

  • Evaluate and address issues related to performance, scalability, and stability of Identity Services applications.

Preferred Qualifications

  • Experience in a healthcare setting with information security systems.

  • Familiarity with SSO integrations and metrics dashboarding.

  • Expertise in firewall and database management.

  • Experience in enterprise administration and development within Azure/Office 365 environments.

Required Qualifications

  • 7–10 years of experience as a SailPoint IdentityIQ product owner.

  • Knowledge of healthcare industry operations.

  • Proficiency in Python and Java development.

  • Strong experience managing Unix and Windows server environments.

  • Command of directory services and mastery of API integrations.

  • DevOps-based development approach with robust mentoring skills.

Work Arrangement

  • Primarily remote, with occasional on-site presence as needed.

  • Candidates must reside within commuting distance of New York City.

Why Join Us?

This organization is a leader in innovation, inclusivity, and employee well-being. Recognized for creating a supportive work environment, the company values collaboration, diversity, and professional growth. Join a team where your work will directly impact technology and operations, driving meaningful change in the healthcare industry.

Note: Relocation assistance and visa sponsorship are not available for this role.

 

SecOps - Tel Aviv, ISRAEL - 3,665 – 27,500 Shekel Per Month

SecOps - TLV, ISR
Full-Time, Permanent
3,665 – 27,500 NIS Per Month

Must-Haves

·         3 years of progressive experience leading Security operations and/or SOC teams

·         Significant demonstrated experience working with Security Information Event Management (SIEM), Continuous Monitoring, Intrusion Detection/Prevention Systems (ID/PS), Network Traffic Analysis, Incident Response, Endpoint Security Systems, Digital Forensics, WLAN Monitoring, and/or Threat Modeling.

·         Expert knowledge of information security technologies, networking, systems, and infrastructure architecture in a global capacity required.

·         Must have an in-depth knowledge of security frameworks, compliance requirements, and department planning and operations.

·         Bachelor's degree in Information Systems, Cybersecurity, or a related field and a minimum 6 years of relevant experience. Additional years of relevant experience will be considered in lieu of a degree.

 

Nice-To-Haves

·         Experience in a leadership position within a Security Operations Center preferred.

·         Strong organizational skills with the ability to manage multiple projects. Absolute ownership for delivering service and meeting business objectives.

·         Strong business acumen to quickly learn new business processes and understand how application performance requirements support the business in achieving revenue and profit goals.

·         Adaptability, flexibility, and ability to work as part of a team across functional boundaries or in an individual capacity.

·         Willingness to work outside of regular business hours as required which can include evenings, weekends, and holidays.

·         Must excel working in team-oriented roles that rely on the ability to collaborate with others.

 

Job Description

 

As a Security Operations Manager, you will be responsible for overseeing the security operations of the Real Money Gaming (RMG) production workloads. You will supervise a team of security professionals to ensure the confidentiality, integrity, and availability of the organization's production information assets. This role requires a deep understanding of security operations, incident response, threat intelligence, and risk management.

 

The Manager of security Operations will leverage their knowledge of best practices to be able to support the Security Operations policies, standards, and legal requirements while overseeing a team of Security Operations and Engineering SMEs. The Manager, Security Ops will execute Security Ops & Engineering strategy, manage and work with relevant vendors to solve security issues and problems. This role will require a keen understanding of business key assets and processes, unique business requirements, the information security program, and combining this information to address residual risk by recommending security enhancements within the area of responsibility.

Software Engineer - Lexington Park, MD - $55,000 to $130,000

Software Engineer

Lexington Park, MD

$55,000 to $130,000

The Opportunity:

As a full-stack developer, you can resolve a problem with a complete end-to-end solution in a fast, agile environment. If you’re looking for the chance to not just develop software but to help create a system that will make a difference, we need you on our team. We’re looking for a developer like you with the skills needed to develop software and systems from vision to production-ready.

This role is more than just coding. As a full-stack developer at Booz Allen, you’ll use your passion to learn new tools and techniques and identify needed system improvements. You’ll help clients overcome their most difficult challenges using the latest architectural approaches, tools, and technologies. You’ll help make sure the solution developed by the team considers the current architecture and operating environment, as well as future functionality and enhancements.

Work with us as we shape systems for the better.

Join us. The world can’t wait.

You Have:

  • 5+ years of experience with object-oriented programming (OOP) development

  • 5+ years of experience with programming with C#, Java, or C++

  • 3+ years of experience as a team lead

  • 3+ years of experience in Model-Based Engineering (MBE)

  • Experience with the Software Development Life Cycle (SDLC)

  • Knowledge of software standards and conventions

  • Ability to obtain a security clearance

  • Bachelor's degree in CS, Computer Information Systems, MIS, Computer Engineering, or Engineering

Nice If You Have:

  • Experience with Plans of Action and Milestones (POA&M)

  • Experience with Navy software processes and documentation

  • Experience with networked systems

  • Security+ Certification

  • Project Management Professional Certification

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

 

To Apply Please Complete the Form Below

Software Developer - Beavercreek, OH - $50,000.00 to $115,000

Software Developer

Beavercreek, OH

$50,000.00 to $115,000

The Opportunity:

At a certain point, software design evolves into a form of clairvoyance. As a seasoned software developer with expertise in modeling, simulation, and RF signals, you possess the ability to not only orchestrate optimal solutions for technical challenges but also anticipate future concerns. Join Booz Allen, where you can leverage your skills to enhance the software technology supporting the development of the next generation of Electronic Warfare (EW) technologies and solutions. Design and develop modeling and analysis tools to provide the U.S. warfighter with dominance in the RF spectrum.

In this role, you'll translate customer software needs into a comprehensive plan by creating computationally efficient models for analyzing radars, wireless communications, RF propagation, receiver processing, and EW technique effectiveness. Utilize leading software control systems like C++, Python, GIT, and Agile practices to craft effective software architecture. Your technical expertise will be crucial as you develop RF models and communicate results and ideas to various Department of Defense (DoD) decision-makers. Directly impact the Air Force by contributing to the creation of tools evaluating the next generation of EW technology.

Join us. The world can't wait.

Key Qualifications:

  • Experience with C/C++, Python, Windows, or Linux.

  • Proficiency in agile, scrum development, and research and development.

  • Ability to obtain a security clearance.

  • Bachelor's degree in a Science, Technology, Engineering, or Mathematics (STEM) field.

Nice-to-Have:

  • Experience in modeling, simulation, and system analysis.

  • Familiarity with CUDA or MATLAB.

  • Knowledge of EW methods and analysis, mission analysis, electronic support, electronic attack, electronic protection, or Radars.

  • Independent learning ability, self-motivation, and strong teamwork skills.

  • Top-secret clearance.

  • Master's degree in Computer Science or Computer Engineering.

Clearance: Applicants selected will undergo a security investigation and must meet eligibility requirements for access to classified information.

 

To Apply Please Complete the Form Below

Senior Windows Systems Engineer – Secret Clearance - San Diego, CA - Full-Time, Permanent/W2 - Compensation – Market Rate

Senior Windows Systems Engineer – Secret Clearance
San Diego, CA
Full-Time, Permanent/W2
Compensation – Market Rate

Opportunity Overview:

 

Are you seeking a chance to utilize your technical expertise while contributing to critical missions without compromising anonymity? We are seeking individuals who comprehend the intricacies of customer environments and possess the prowess to craft tailored solutions. Your adeptness at translating practical requirements into technical blueprints will be instrumental in delivering client-centric engineering resolutions.

 

As a Systems Engineer specializing in Windows, you will play a pivotal role in shaping solutions within the network of our esteemed U.S. Navy partner. Your responsibilities will encompass spearheading engineering endeavors and conceptualizing designs. The client relies on your proficiency not only to create and refine systems but also to propel them forward with innovative technological interventions. By joining our team, you will have the opportunity to diversify your expertise, delving into realms such as cloud computing and IT infrastructure.

 

Come aboard. The world awaits your contribution.

 

Requirements:

 

- Minimum of 5 years of hands-on experience in implementing and overseeing Windows Server-based solutions within enterprise-level network environments.

- Proficiency in engineering support for Active Directory, DNS, and various Microsoft and VMware products.

- Expertise in the design and configuration of Microsoft Windows server and end-user technologies, encompassing antivirus software, patch management, and system administration tools.

- Ability to formulate comprehensive Windows Administrative standards, alongside crafting detailed design and implementation documentation. Familiarity with capacity planning, performance monitoring, and maintenance planning to ensure optimal uptime.

- Proficiency in at least one scripting language such as PowerShell, VBScript, or Python.

- Experience collaborating with network engineering teams in the development, coordination, and troubleshooting of enterprise network security systems. Demonstrated capability in implementing appropriate rulesets and configurations for firewalls, load balancers, intrusion detection systems, routers, and switches.

- Experience liaising with change control, environment management, network, and security teams.

- Eligibility to obtain a security clearance.

- Bachelor’s degree.

- Compliance with DoD 8570 for IAT2 level certification, for instance, Security + or Microsoft Certified Systems Administrator (MCSA).

 

Preferred Qualifications:

 

- Proven track record as a technical leader, including proficiency in operating system administration.

- Experience in managing HA clustered applications or SQL environments from a server build and operations perspective.

- Hands-on experience in deploying, maintaining, and supporting high-performance Windows systems.

- Proficiency in automating server deployment, routine tasks, and procedures.

- Familiarity with VMware virtual server environments and optimizing systems for peak performance and operational flexibility.

- Knowledge of networking technologies, particularly in managing Windows systems and applications within such environments.

- Ability to maintain a positive demeanor in dynamic, fast-paced settings.

- Capability to lead the Navy’s IT Modernization Cloud initiative, including devising strategies and tactics pertinent to the organization's objectives.

- Possession of a Secret clearance.

- Bachelor’s degree in Information Technology, Computer Science, or a related field.

 

Clearance:

 

Selected candidates will undergo a thorough security investigation and must meet eligibility criteria for access to classified information.

To Apply Please Complete the Form Below

Senior Cyber Engineer – Norfolk, VA – Secret Clearance - Full-Time, Permanent/W2 - $65,000 - $145,000

Senior Cyber Engineer – Norfolk, VA – Secret Clearance
Full-Time, Permanent/W2
$65,000 - $145,000


Key Role:

 

As a Senior Cyber Engineer, you will spearhead analysis to formulate plans for operationalizing cyberspace concepts in support of capability development endeavors. Your role entails developing plans and procedures to facilitate future concept operationalization within the cyber domain. You will draft relevant architectures to underpin concept definition and solicit input from other stakeholders. Serving as a subject matter expert (SME) during requirements definition, you will support the operationalization of concepts. Additionally, you will prepare pertinent briefing materials and deliver presentations, while contributing to other warfare development activities, including feasibility studies, experimentation, and the advancement of related concepts. Your responsibilities will involve eliciting, capturing, and collecting operations and capability requirements for cyber, applying analytical expertise to process large quantities of information, and producing documented deliverables or contributions to deliverables produced by other stakeholders.

 

Basic Qualifications:

 

- Over 5 years of experience working in a cybersecurity or cyberspace operational environment.

- Over 5 years of experience with concept implementation and engineering in the area of military operations cyberspace situational awareness (CySA) concepts.

- Over 4 years of experience as a key contributor to validation or experimentation of operational, technical, or organizational concepts, preferably in a military context and on cyberspace related topics.

- Over 2 years of experience with NATO or international organizations.

- Active Secret clearance.

- Bachelor’s degree.

- CISSP or CISM Certification.

 

Additional Qualifications:

 

- Over 5 years of experience working on large-scale cyber and Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) projects.

- Over 5 years of experience working with systems engineering products, including use cases, workflow diagrams, and architecture.

- Over 3 years of experience managing organizational responsibilities and priorities as a project manager.

- Experience with architecture drafting.

- Bachelor’s degree in Engineering, Mathematics, Computer Science, or a related field preferred; Master's degree in Engineering, Mathematics, Computer Science, or a related field a plus.

- Additional certifications such as CISSP, GIAC, CISM, or other Cybersecurity Certifications.

- PMP or equivalent Certification.

 

Clearance:

 

Selected candidates will undergo a comprehensive security investigation and must meet eligibility criteria for access to classified information; Secret clearance is required.

To Apply Please Complete the Form Below

Lead Cyber Analyst – Peterson, CO - Full-Time, Permanent/W2 - $93,000 - $212,000

Lead Cyber Analyst – Peterson, CO
Full-Time, Permanent/W2
$93,000 - $212,000

 

The Opportunity:

 

In a landscape teeming with cyber threats, the ability to comprehend and mitigate these risks is paramount for government agencies and military organizations. Amidst the cacophony of cyber noise, your role as a lead information security risk specialist is pivotal. You possess the expertise to distill complex threats into actionable plans, making you indispensable.

 

As a Cyber Analyst, you'll leverage your experience in executing cyber risk assessments to fulfill duties assigned by the Security Control Assessor (SCA) for Space or systems. Your role involves providing recommendations to Mission Area Team leadership on methodologies to assess cybersecurity risk within the SCA's designated authorization boundary. Collaborating with Cyber Risk Analysts, Subject Matter Experts (SMEs), and SCA-Rs, you'll ensure timely completion of cybersecurity analysis and risk assessments, adhering to standards set by Mission Area Team leadership and Task Manager.

 

Your responsibilities encompass identifying system vulnerabilities and residual risk through analysis of technical artifacts, interviews, and evaluation of the current system state. You'll assess the efficacy of proposed mitigations, recommending technical and policy changes to alleviate cyber risk.

 

Join us as we safeguard our military's communications systems.

 

Requirements:

 

- Over 10 years of experience in cyber risk assessment of Space systems.

- Proficiency in technologies utilized in AFNET or Space systems.

- Active Secret clearance.

- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or Information Systems.

- Certification in Sec+, MCTS, CEH, CISSP, CAP, or SSCP.

 

Preferred Qualifications:

 

- Active Top Secret clearance.

- Master's degree in Cybersecurity, Computer Science, Information Technology, or Information Systems.

 

Clearance:

 

Selected candidates will undergo a comprehensive security investigation and must meet eligibility criteria for access to classified information; Secret clearance is mandatory.

To Apply Please Complete the Form Below

Cyber Security Analyst - Bremerton, WA - Full-Time, Permanent/W2 - $58,000 - $133,000

Cyber Security Analyst - Bremerton, WA
Full-Time, Permanent/W2
$58,000 - $133,000


 

Key Role:

 

In this role, you will play a crucial part in supporting the development and submission of Risk Management Framework (RMF) Assessment and Authorization (A&A) packages. Your responsibilities will encompass each step of the RMF process, implementing security controls, and system hardening on various operating systems in alignment with DoD Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs). You will collaborate closely with system administrators and network engineers to ensure systems and networks adhere to DoD cybersecurity requirements.

 

Basic Qualifications:

 

- Over 6 years of experience in Navy Information Assurance or cybersecurity.

- Minimum of 1 year of experience in RMF implementation.

- Proficiency in providing subject matter expertise in cybersecurity domains, including vulnerability assessment and scanning tools, and evaluating system compliance with security controls.

- Knowledge of Department of Defense (DoD) STIGs or SRGs and Navy cybersecurity policies and requirements.

- Ability to independently develop RMF A&A documentation and artifacts to obtain RMF Authority to Operate.

- Active Secret clearance.

- Bachelor’s degree in an IT-related field.

- DoD Information Assurance Technical (IAT) Level I or II and Information Assurance Management (IAM) Level I or II Certification.

- Certification in CompTIA Security +, CASP, CISSP, eMASS, ACAS, or Navy Qualified Validator.

 

Additional Qualifications:

 

- Experience using eMASS to populate required artifacts to support authorization decisions.

- Background as a System or Network Administrator.

- Proficiency in ACAS scan configuration and execution.

- Experience working in Windows and Linux environments.

 

Clearance:

 

Selected candidates will undergo a comprehensive security investigation and must meet eligibility criteria for access to classified information; Secret clearance is mandatory.

To Apply Please Complete the Form Below