Chenega Agile Real-Time Solutions (CARS) provides enterprise IT support to Federal clients, employing experienced Subject Matter Experts in the Federal marketplace.. We are seeking a Cybersecurity Compliance Manager to oversee security governance and risk management efforts for the FCC under the FETS program.. Oversee vulnerability management, incident response, and threat intelligence integration.. Familiarity with tools like Tenable, Splunk, and endpoint detection platforms.. For more details, visit our website or contact our Talent Acquisition Team. We encourage you to explore our social media pages and learn more about our community impact.
Join to apply for the Associate Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice) role at Charles River Associates. Leading security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing theft of trade secret investigations, cyber breach detection, threat analysis, incident response and malware analysis;. Performing forensic analysis of digital information using standard computer forensics and evidence handling techniques and computer forensics tools;. 7-10+ years experience in cyber intrusion investigation, digital forensics or incident response analysis;. Experience in a hands-on technical role functioning as a testifying expert, digital forensic examiner, incident responder, network forensic analyst or malware analyst;
US Government Top Secret/Sensitive Compartmentalized Information security clearance with polygraph. Experience with mobile device management for Android and iOS platforms. Develop roadmaps and recommendations to drive client enhancements of their cloud security architecture, governance, and standards. Identify, incorporate, and articulate cloud security best practices such as DevSecOps strategy, Zero Trust design, and cloud incident response. Identify and assess potential threats to organizational systems and data by gathering and analyzing threat intelligence from various sources.
As a systems security and network security engineer, you can identify the security architecture and tools needed to assess vulnerabilities and recommend the best solution and security strategy.. Experience supporting cyber risk management, security operations, incident response, or cybersecurity remediation efforts. Experience with Infrastructure as Code ( IaC) , CI/ CD pipelines, and DevSecOps practices. CISSP, CISM, CEH, GIAC, Security+, or CySA+ Certification. As part of the application process, you are expected to be on camera during interviews and assessments.
BDR is seeking a Network Security Engineer to join our growing team!. This position will be performed as a hybrid role with three (3) days on-site in Washington, D.C. This position requires US Citizenship with an Active Top Secret Clearance and SCI Eligibility.. The Network Security Engineer will be responsible for maintaining computer networks and systems including LAN/WAN, Remote Access, VPN, routers, switches, and other hardware.. Use of Fortinet suite (Fortigate, FortiAnalyzer, FortiManager) as well as managing and maintaining F5 load balancers.. 15+ years of using Fortinet suite (Fortigate, FortiAnalyzer, FortiManager) as well as managing and maintaining F5 load balancers.
T-Rex is seeking a Cloud Security Engineer to support the migration of on-premise servers and infrastructure to Azure for the IRS. All work is performed on-site in Washington, DC.. Utilize extensive system administration experience to ensure seamless operations and high availability of cloud, O365 and Azure VDI services.. CAP, CASP, CISM, CISSP), or be able to obtain one within 30 days. T-Rex offers both IT and professional services to numerous Federal agencies and is a leader in providing high quality and innovative solutions in the areas of Cloud and Infrastructure Services, Cyber Security, and Big Data Engineering.. T-Rex has made a commitment to maintain the status of an industry leader in compensation packages and benefits which includes competitive salaries, performance bonuses, training and educational reimbursement, Transamerica 401(k) and Cigna healthcare benefits.
Department Overview Motorola's Access Control Division's (previously OpenPath, now Avigilon Alta) mission is to improve your workday with smart office technology at your front door.. Interface with legal, data governance, and engineering teams on policy enforcement and control mapping.. Strong understanding of technical concepts: SAST, DAST, SCM, IdP, Kernel, Firmware, WAF, firewalls, IDS/IPS, SIEM, cloud security, etc.. Certifications such as CISM, CISSP, CISA, CRISC, or CIPM are strongly preferred.. High emotional intelligence and team leadership experience across cultures/time zones.
The Government Publishing Office (GPO) SecDevOps program provides advanced security, development, and operations support to safeguard federal information systems and infrastructure.. Reporting to the ZTA SME, this role ensures timely implementation of Sentinel rule sets, threat intelligence sharing, and continuous feedback loops to maintain a proactive and adaptive cybersecurity defense aligned with Zero Trust principles.. Configure and maintain Microsoft Sentinel environments across GPO systems.. Integrate threat intel feeds into Sentinel and support adaptive tuning of detection content based on real-time insights.. Strong understanding of threat intelligence frameworks and cyber kill chains.
Chenega Services & Federal Solutions, LLC, a Chenega Professional Services company, is looking for a Cyber Security Engineer to join our team of IT experts supporting a federal client.. You will also lead incident response efforts, analyze threat intelligence, perform forensic cyber analysis, and oversee the implementation and management of security monitoring tools.. Stay Current with Advancements in Cybersecurity: Stay current with advancements in cybersecurity technologies, including AI, Zero Trust and Quantum Computing.. Minimum 10 years of experience in cybersecurity, with a focus on threat assessment, incident response, and security architecture design.. Certifications: CISSP, CISM, CEH, or other relevant certifications in cybersecurity.
The company offers a collaborative, high-impact environment where engineers can directly influence strategic security outcomes.. Lead cyber incident response efforts, including triage, containment, root cause analysis, and remediation. Conduct vulnerability scanning and support penetration testing to uncover and resolve security gaps. Experience in vulnerability management, exploit mitigation, and remediation practices. Industry certifications such as CISSP, CISM, CEH, GCIH, or Security+ are preferred
This is a full-time position with Tecknomic supporting the Office of the Chief Financial Officer (OCFO).. Candidates must be local to the DMV area for this hybrid (3 days onsite) role.. Senior Network Security Engineer II is responsible for designing, implementing, operating, and securing the OCFO network and security infrastructure.. Ensure adherence to network policies and manage production and disaster recovery networks.. Experience with Cisco Firepower (NGFW) or Cisco ASA Firewalls.
Design and implement systems including CCTV, access control, intrusion detection, and biometrics.. Lead zoning layouts, mantrap flows, visitor access, and badging protocols.. Ensure high resiliency with dual-path communications, UPS backups, and penetration testing programs.. Security ecosystems like Genetec, LenelS2, Honeywell, or Avigilon. Remote-first culture with access to WeWork spaces
Description Tyto Athene is searching for a Digital Forensics and Incident Response Team Lead.. Utilize advanced tools, such as digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact. Collaborate with cyber threat hunting and cyber threat intelligence teams. Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS). GCFA - GIAC Certified Forensic Analyst
The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. Principal Product Manager, AI Security Remote Location: Seattle, WA; San Francisco Bay Area; Austin, TX; or Washington, DC Position Summary HackerOne is seeking an exceptional Product Manager to spearhead the development of our cutting-edge AI Security product portfolio. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.
As a Sr. SOC Analyst , you’ll be responsible for monitoring, detecting, and responding to cybersecurity threats within an organization's IT environment.. Monitor security alerts and events using SIEM (Security Information and Event Management) tools.. Serve as a technical authority, offering in-depth expertise in areas such as threat detection, incident response, vulnerability management, and risk assessment.. Conduct threat intelligence analysis to identify and mitigate emerging cyber threats.. Experience in identifying, analyzing, and responding to security incidents using SIEM tools and threat intelligence platforms.
The ideal candidate will have a minimum of three years of working knowledge of Government Community Cloud High (GCC-H)/GCC environments and a strong background in Zero Trust principles, architecture, and engineering.. Conduct assessment planning for Identity, Devices, Segmenting & Network Security, Application Workload, and Data Protection, ensuring adherence to Federal Zero Trust tenants.. Minimum of three (3) years of hands-on experience in Government Community Cloud High (GCC-H)/GCC environments.. Proven experience in Zero Trust Architecture design, implementation, and management.. Knowledge, skills, and abilities to operate, maintain, and upgrade tools such as Microsoft Sentinel, Microsoft Azure, Microsoft DfE, Xacta 360/IO, Zscaler, FedRamp, Cloudflare, NetWitness, Tenable IO, Nexpose, Armis, Trellix HX/CM, and ServiceNow.
The ideal candidate will have a strong technical background in classified and unclassified systems, insider threat tools, user activity monitoring (UAM), and cyber threat intelligence.. Assist non-IT professionals in understanding Department of Defense network standards for effective insider threat tool deployment.. Support counterintelligence, insider threat, and law enforcement investigations through cybersecurity expertise.. Experience advising non-IT professionals on DoD network standards for insider threat tools.. Strong background in counterintelligence and insider threat investigations.
The ideal candidate will have a minimum of three years of working knowledge of Government Community Cloud High (GCC-H) / GCC environments and a strong background in Zero Trust principles, architecture, and engineering.. Conduct assessment planning for Identity, Devices, Segmenting & Network Security, Application Workload, and Data Protection, ensuring adherence to Federal Zero Trust tenants.. Minimum of three (3) years of hands-on experience in Government Community Cloud High (GCC-H) / GCC environments.. Proven experience in Zero Trust Architecture design, implementation, and management.. Knowledge, skills, and abilities to operate, maintain, and upgrade two or more of the following tools: Microsoft Sentinel, Microsoft Azure, Microsoft DfE, Xacta 360 / IO, Zscaler, FedRamp, Cloudflare, NetWitness, Tenable IO, Nexpose, Armis, Trellix HX / CM, and ServiceNow.
The ideal candidate will have a minimum of three years of working knowledge of Government Community Cloud High GCC-H)/GCC environments and a strong background in Zero Trust principles, architecture, and engineering.. Conduct assessment planning for Identity, Devices, Segmenting & Network Security, Application Workload, and Data Protection, ensuring adherence to Federal Zero Trust tenants.. Minimum of three (3) years of hands-on experience in Government Community Cloud High (GCC-H)/GCC environments.. Proven experience in Zero Trust Architecture design, implementation, and management.. Knowledge, skills, and abilities to operate, maintain, and upgrade two or more of the following tools: Microsoft Sentinel, Microsoft Azure, Microsoft DfE, Xacta 360/IO, Zscaler, FedRamp, Cloudflare, NetWitness, Tenable IO, Nexpose, Armis, Trellix HX/CM, and ServiceNow.
Develop and lead the Cyber Threat Intelligence (CTI) team, including mission definition, process optimization, task management, and documentation.. Monitor and assess open-source and classified cyber threat intelligence (CTI) sources at tactical, operational, and strategic levels, including social media, code-sharing platforms, and the darknet.. Review and synthesize Open-Source Intelligence (OSINT) and Closed-Source Intelligence to evaluate exposure, historical threats, and potential attack vectors.. Certified Information Systems Security Professional (CISSP), GIAC Cyber Threat Intelligence (GCTI), Certified Ethical Hacker (CEH), or other relevant certifications is required.. Experience with intelligence collection techniques, including open-source intelligence (OSINT), and all-source intelligence analysis.