Overview About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber-physical solutions for the nation's most mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration. Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values-agility, expertise, and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Systems Engineer 3 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of intrusion detection, access control, biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities As part of a multidisciplinary team, you will be responsible for designing and implementing systems and technical controls and configuration settings and will work in a team environment alongside other Systems and Cybersecurity Engineers. Please note that this is not an analyst position - this is a technical hands on Systems Engineering / Systems Administration role and is not suited for traditional SCA, Validator, and Auditor roles. Support System Engineering efforts and help with making design choices and product selections Perform system builds that include a variety of technologies including, but not limited to, Microsoft Windows Server (all versions); implementing Group Policies for small to medium sized enterprise environments; building and supporting WSUS deployments; configuring RHEL servers as part of performing ACAS scans; developing Ansible Playbooks for system deployment; configuring Cisco and Juniper network switches; configuring SQL servers including Always On configurations; configuring Hyper-V; VMWare virtual environments; and multiple other enterprise applications Working closely and supporting team members, vendors, and government customers Implementing and maintaining DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Develop detailed system diagrams and information flow diagrams Conducting vulnerability scanning and document system vulnerabilities using Evaluate-STIG, SCAP compliance checker, STIG Viewer, eMASSter, and other applications Participating in continuous improvement of organizational and client cybersecurity posture Coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other Systems and Cybersecurity Engineers. Qualifications Clearance/Citizen Type: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; ACTIVE SECRET Clearance with the ability to obtain a TS/SCI is REQUIRED Position / Candidate Requirements Education: Computer Science, Electrical Engineering, or a Related Engineering Discipline. Bachelor's Degree and 5+ years of experience as stated below or Masters' Degree and 3+ years of experience as stated below Completing designs for security, network, and CCTV systems Support the installation activity Interface with customers for requirements gathering, surveys, design reviews Managing project budgets Work in a team environment Mentor lower-level engineers Required Certifications: None Strong Oral, Written and Presentation Skills with the ability and experience communicating directly with executive leadership. Demonstrated experience with developing cost estimates and work breakdown structures for the design and implementation of complex projects. Demonstrated experience performing technical cross-training/coaching of junior colleagues Demonstrated background working with Strong Oral and Written Communications Skills. Demonstrated background working with multidisciplinary teams. Demonstrated time management and organization skills to meet deadlines and quality objectives. Strong MS Excel, Word, PowerPoint, and Visio Skills is a plus. Ability to travel domestically and internationally up to 25% of the time. Desired Qualifications (the following are not required, but advantageous) Lenel Core Certification Genetec CCTV Certification Experience with AutoCad or similar What we offer: A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for the better. We are driven by our core values of agility, expertise, and trust. An opportunity to lead and build a business with the support of an industry-leading firm that has been in business for 75 years. Investment in your skills and expertise through a combination of professional and technical training programs, including leadership training and tuition reimbursement. Open and transparent communication with senior leadership as well as local office management. We offer an excellent benefits package including: A competitive salary Medical, dental, vision, life, and disability insurance Paid time off Tuition reimbursement 401k Retirement Plan Military Reserve pay offset Paid maternity leave Abilities: Exposure to computer screens for an extended period of time. Sitting for extended periods of time. Reach by extending hands or arms in any direction. Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard. Listen to and understand information and ideas presented through spoken words and sentences. Communicate information and ideas in speaking so others will understand. Read and understand information and ideas presented in writing. Apply general rules to specific problems to produce answers that make sense. Identify and understand the speech of another person.
09/08/2025
Full time
Overview About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber-physical solutions for the nation's most mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration. Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values-agility, expertise, and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Systems Engineer 3 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of intrusion detection, access control, biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities As part of a multidisciplinary team, you will be responsible for designing and implementing systems and technical controls and configuration settings and will work in a team environment alongside other Systems and Cybersecurity Engineers. Please note that this is not an analyst position - this is a technical hands on Systems Engineering / Systems Administration role and is not suited for traditional SCA, Validator, and Auditor roles. Support System Engineering efforts and help with making design choices and product selections Perform system builds that include a variety of technologies including, but not limited to, Microsoft Windows Server (all versions); implementing Group Policies for small to medium sized enterprise environments; building and supporting WSUS deployments; configuring RHEL servers as part of performing ACAS scans; developing Ansible Playbooks for system deployment; configuring Cisco and Juniper network switches; configuring SQL servers including Always On configurations; configuring Hyper-V; VMWare virtual environments; and multiple other enterprise applications Working closely and supporting team members, vendors, and government customers Implementing and maintaining DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Develop detailed system diagrams and information flow diagrams Conducting vulnerability scanning and document system vulnerabilities using Evaluate-STIG, SCAP compliance checker, STIG Viewer, eMASSter, and other applications Participating in continuous improvement of organizational and client cybersecurity posture Coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other Systems and Cybersecurity Engineers. Qualifications Clearance/Citizen Type: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; ACTIVE SECRET Clearance with the ability to obtain a TS/SCI is REQUIRED Position / Candidate Requirements Education: Computer Science, Electrical Engineering, or a Related Engineering Discipline. Bachelor's Degree and 5+ years of experience as stated below or Masters' Degree and 3+ years of experience as stated below Completing designs for security, network, and CCTV systems Support the installation activity Interface with customers for requirements gathering, surveys, design reviews Managing project budgets Work in a team environment Mentor lower-level engineers Required Certifications: None Strong Oral, Written and Presentation Skills with the ability and experience communicating directly with executive leadership. Demonstrated experience with developing cost estimates and work breakdown structures for the design and implementation of complex projects. Demonstrated experience performing technical cross-training/coaching of junior colleagues Demonstrated background working with Strong Oral and Written Communications Skills. Demonstrated background working with multidisciplinary teams. Demonstrated time management and organization skills to meet deadlines and quality objectives. Strong MS Excel, Word, PowerPoint, and Visio Skills is a plus. Ability to travel domestically and internationally up to 25% of the time. Desired Qualifications (the following are not required, but advantageous) Lenel Core Certification Genetec CCTV Certification Experience with AutoCad or similar What we offer: A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for the better. We are driven by our core values of agility, expertise, and trust. An opportunity to lead and build a business with the support of an industry-leading firm that has been in business for 75 years. Investment in your skills and expertise through a combination of professional and technical training programs, including leadership training and tuition reimbursement. Open and transparent communication with senior leadership as well as local office management. We offer an excellent benefits package including: A competitive salary Medical, dental, vision, life, and disability insurance Paid time off Tuition reimbursement 401k Retirement Plan Military Reserve pay offset Paid maternity leave Abilities: Exposure to computer screens for an extended period of time. Sitting for extended periods of time. Reach by extending hands or arms in any direction. Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard. Listen to and understand information and ideas presented through spoken words and sentences. Communicate information and ideas in speaking so others will understand. Read and understand information and ideas presented in writing. Apply general rules to specific problems to produce answers that make sense. Identify and understand the speech of another person.
KASTELLUM is seeking highly qualified Intelligence Exploitation Analyst Expert to join our team in North Carolina supporting USSOCOM. Responsibilities: Intelligence Exploitation Analysts shall provide analytical and planning support to Interrogation, Exploitation and Detainee operations and other HUMINT missions. Intelligence Exploitation Analysts shall perform analysis, provide intelligence products and perform intelligence research to support HUMINT/Detainee interviews. Intelligence Exploitation Analysts shall provide intelligence summaries as a result of each supported HUMINT/Detainee interview in accordance with USSOCOM procedures. Analysts are responsible for researching, developing, and presenting intelligence products at the operational level for senior leaders including: CT and regional analysis, GEOINT, HUMINT, SIGINT, OSINT/PAI, political/military analysis and support to targeting. Analysts shall interface with other intelligence organizations to fully prepare teams for exploitation of enemy personnel, as well as prepare post screening analytical products and assessments supporting targeting efforts, and threat analysis. Analysts must have advanced targeting skills and firsthand experience targeting networks, individuals within networks, and identifying vulnerabilities for exploitation. Intelligence analysts shall have a deep understanding of the F3EAD targeting cycle as well as the current data, tools, and techniques used for each phase of targeting. Employees must maintain global readiness and be available to deploy on a no-notice basis to hazardous duty/combat zones. Deployments may be to a theater of operations with permissive, uncertain, or hostile environments while living in austere conditions for extended periods. Will deploy 120 days every 12-18 months. Job Qualifications: • Minimum of ten (10) years intelligence/intelligence operations experience within DoD or equivalent Government agencies required, with five (5) years at the operational level. • Current Top Secret clearance and SCI eligible. • Must possess a valid US passport • Shall be highly proficient in utilizing current intelligence related automation, applications, tools, and databases to support analytical efforts and product development. • Shall possess strong briefing skills. • Shall possess advance working knowledge of interrogation, exploitation & detainee operations & other HUMINT missions, methodologies and systems. • In-depth knowledge of SOF and/or CT intelligence experience. • Strong background and firsthand experience is required in the following analytical areas: Regional Analysis, Geo-Political Analysis, HUMINT/SIGINT Analysis and Collection management. • Must have experience in managing, controlling, and communicating with multiple ISR platforms simultaneously is beneficial. High stress position when deployed and requires someone with a level head who can handle large amounts of stress for short deployments. • Intelligence analysts shall have a deep understanding of the F3EAD targeting cycle as well as the current data, tools, and techniques used for each phase of targeting. • Must be able to pass all pre-deployment requirements including medical, dental, psychological, background, credit, and security screens as deemed necessary to be considered deployable. • Must obtain all required immunizations deemed necessary by the contract. • Shall have a demonstrated ability to research and provide technical details for technical intelligence data program or initiative. • Advanced Microsoft Office skills and proficiency using current analytic tools, databases and intelligence and operational systems is required. The KASTELLUM Group is a veteran owned small business specializing in delivering Strategic Planning, Operations & Analysis, and SME Consulting to the Defense, Cyber, Intelligence, Special Programs & Information Operations Sectors. We're an equal opportunity employer who empowers our people to drive solutions for our nation's toughest problems.
08/31/2025
Full time
KASTELLUM is seeking highly qualified Intelligence Exploitation Analyst Expert to join our team in North Carolina supporting USSOCOM. Responsibilities: Intelligence Exploitation Analysts shall provide analytical and planning support to Interrogation, Exploitation and Detainee operations and other HUMINT missions. Intelligence Exploitation Analysts shall perform analysis, provide intelligence products and perform intelligence research to support HUMINT/Detainee interviews. Intelligence Exploitation Analysts shall provide intelligence summaries as a result of each supported HUMINT/Detainee interview in accordance with USSOCOM procedures. Analysts are responsible for researching, developing, and presenting intelligence products at the operational level for senior leaders including: CT and regional analysis, GEOINT, HUMINT, SIGINT, OSINT/PAI, political/military analysis and support to targeting. Analysts shall interface with other intelligence organizations to fully prepare teams for exploitation of enemy personnel, as well as prepare post screening analytical products and assessments supporting targeting efforts, and threat analysis. Analysts must have advanced targeting skills and firsthand experience targeting networks, individuals within networks, and identifying vulnerabilities for exploitation. Intelligence analysts shall have a deep understanding of the F3EAD targeting cycle as well as the current data, tools, and techniques used for each phase of targeting. Employees must maintain global readiness and be available to deploy on a no-notice basis to hazardous duty/combat zones. Deployments may be to a theater of operations with permissive, uncertain, or hostile environments while living in austere conditions for extended periods. Will deploy 120 days every 12-18 months. Job Qualifications: • Minimum of ten (10) years intelligence/intelligence operations experience within DoD or equivalent Government agencies required, with five (5) years at the operational level. • Current Top Secret clearance and SCI eligible. • Must possess a valid US passport • Shall be highly proficient in utilizing current intelligence related automation, applications, tools, and databases to support analytical efforts and product development. • Shall possess strong briefing skills. • Shall possess advance working knowledge of interrogation, exploitation & detainee operations & other HUMINT missions, methodologies and systems. • In-depth knowledge of SOF and/or CT intelligence experience. • Strong background and firsthand experience is required in the following analytical areas: Regional Analysis, Geo-Political Analysis, HUMINT/SIGINT Analysis and Collection management. • Must have experience in managing, controlling, and communicating with multiple ISR platforms simultaneously is beneficial. High stress position when deployed and requires someone with a level head who can handle large amounts of stress for short deployments. • Intelligence analysts shall have a deep understanding of the F3EAD targeting cycle as well as the current data, tools, and techniques used for each phase of targeting. • Must be able to pass all pre-deployment requirements including medical, dental, psychological, background, credit, and security screens as deemed necessary to be considered deployable. • Must obtain all required immunizations deemed necessary by the contract. • Shall have a demonstrated ability to research and provide technical details for technical intelligence data program or initiative. • Advanced Microsoft Office skills and proficiency using current analytic tools, databases and intelligence and operational systems is required. The KASTELLUM Group is a veteran owned small business specializing in delivering Strategic Planning, Operations & Analysis, and SME Consulting to the Defense, Cyber, Intelligence, Special Programs & Information Operations Sectors. We're an equal opportunity employer who empowers our people to drive solutions for our nation's toughest problems.
Ready to be a leader with the company that is committed to pushing the limits of truly advanced technologies? We create the products and services that help our service members, intelligence analysts and first responders keep our nation safe. The work we do is so advanced, it's often classified. If you want to put your talent in the spotlight, it's waiting for you right now, right here. We apply advanced technologies such as Artificial Intelligence, Blockchain, AR/VR, Cloud Native and Quantum Physics to solve our customers' missions in cyber, RF, undersea, interstellar and everything in between. Utilizing your strong knowledge of Integrated Logistics Support (ILS) Elements, you'll assist in defining, reviewing and analyzing system requirements for enhancements/modifications for supportability by providing input to project/program plans and deliverables. Additionally, the Advanced Integrated Logistics Support (ILS) Specialist will lead the review, development and modification of procedures and products for one or more ILS functions, while mentoring team members. It's your chance to put your talent to the ultimate test. Are you ready? We are looking for a senior-level Integrated Logistic Support Engineer with 9-12 years of experience to help develop and deliver support products for the US Navy. Ideal candidates should have strong communication skills and a background in creating test procedures, training, and technical manuals. Experience with submarine fleet logistics and combat systems like AN/BYG-1 or AN/BQQ-10 is a must. What you'll experience: • Review and provide feedback on draft and preliminary maintenance documents and technical manuals • Validate test procedures during testing events both in the lab and on submarines, sometimes requiring shift work • Create operations and maintenance procedures for technical manuals and training documents • Travel to support Navy customers on naval vessels in port and at sea • Technologies that aren't just top-notch, they're often top-secret • A team of bold thinkers committed to exploring what's next • Opportunities to gain new knowledge - as it's discovered What you bring to the table: • Experience using S1000D and publishing IETMs using the SIDD viewer • Ability to prepare documentation for delivery in a variety of formats (e.g. .doc, .PDF, HTML and XML/SGML-tagged online and IETM). • Familiarity with military documentation using current DoD specifications and standards including, but not limited to, MIL-STD-3001, MIL-STD-38784, MIL-STD-24784, and MIL-STD 40051-2C • Proficiency in Microsoft Office products (Word and Excel a must), XMLSpy, MS Visio, PowerPoint • Strong organizational, analytical, and problem-solving skills • Excellent verbal and written communication skills • A Bachelor's degree in Logistics, Management or Engineering, a related specialized area or field (or equivalent experience) plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience • Fully proficient knowledge of Acquisition Logistics (a multi-functional technical management discipline associated with influencing design for supportability and planning the support infrastructure for a system by focusing on the integrated logistics support (ILS) elements and working with and across all IPTs) • Strong knowledge of Integrated Logistics Support (ILS) elements (supply support; maintenance planning; manpower and personnel; technical manuals; training and training equipment; support equipment; facilities; computer resources support; packaging, handling, storage and transportation (PHS&T); design interface; reliability, maintainability and availability (RM&A), how they interact and how they are applied across a program, their effect on a system, plus how a systems' design and changes affect the ILS elements) • Knowledge of military/commercial requirements/specifications What sets you apart: • Previous experience developing Navy training documents and material • Employs Instructional Design practices to design curriculum to support operations and maintenance training • Experience with Common Weapon Launcher, AN/BYG-1 • Familiarity with Linux/Unix systems • Ability to handle multiple projects and work well under pressure • Previous Navy experience is a plus • Proven conflict management skills • Strong leadership skills consistent with a team-based work environment Additional Requirements • Ability to obtain and maintain a DoD Secret Security Clearance. • Willingness to travel and perform duties onboard naval vessels. Education Requirements: Bachelor's degree in Logistics, Management or Engineering, a related specialized area or field is required (or equivalent experience) plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience. Clearance Requirements: Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Workplace Options: This position is fully on-site. While on-site, you will be a part of the Manassas VA facility.
08/31/2025
Full time
Ready to be a leader with the company that is committed to pushing the limits of truly advanced technologies? We create the products and services that help our service members, intelligence analysts and first responders keep our nation safe. The work we do is so advanced, it's often classified. If you want to put your talent in the spotlight, it's waiting for you right now, right here. We apply advanced technologies such as Artificial Intelligence, Blockchain, AR/VR, Cloud Native and Quantum Physics to solve our customers' missions in cyber, RF, undersea, interstellar and everything in between. Utilizing your strong knowledge of Integrated Logistics Support (ILS) Elements, you'll assist in defining, reviewing and analyzing system requirements for enhancements/modifications for supportability by providing input to project/program plans and deliverables. Additionally, the Advanced Integrated Logistics Support (ILS) Specialist will lead the review, development and modification of procedures and products for one or more ILS functions, while mentoring team members. It's your chance to put your talent to the ultimate test. Are you ready? We are looking for a senior-level Integrated Logistic Support Engineer with 9-12 years of experience to help develop and deliver support products for the US Navy. Ideal candidates should have strong communication skills and a background in creating test procedures, training, and technical manuals. Experience with submarine fleet logistics and combat systems like AN/BYG-1 or AN/BQQ-10 is a must. What you'll experience: • Review and provide feedback on draft and preliminary maintenance documents and technical manuals • Validate test procedures during testing events both in the lab and on submarines, sometimes requiring shift work • Create operations and maintenance procedures for technical manuals and training documents • Travel to support Navy customers on naval vessels in port and at sea • Technologies that aren't just top-notch, they're often top-secret • A team of bold thinkers committed to exploring what's next • Opportunities to gain new knowledge - as it's discovered What you bring to the table: • Experience using S1000D and publishing IETMs using the SIDD viewer • Ability to prepare documentation for delivery in a variety of formats (e.g. .doc, .PDF, HTML and XML/SGML-tagged online and IETM). • Familiarity with military documentation using current DoD specifications and standards including, but not limited to, MIL-STD-3001, MIL-STD-38784, MIL-STD-24784, and MIL-STD 40051-2C • Proficiency in Microsoft Office products (Word and Excel a must), XMLSpy, MS Visio, PowerPoint • Strong organizational, analytical, and problem-solving skills • Excellent verbal and written communication skills • A Bachelor's degree in Logistics, Management or Engineering, a related specialized area or field (or equivalent experience) plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience • Fully proficient knowledge of Acquisition Logistics (a multi-functional technical management discipline associated with influencing design for supportability and planning the support infrastructure for a system by focusing on the integrated logistics support (ILS) elements and working with and across all IPTs) • Strong knowledge of Integrated Logistics Support (ILS) elements (supply support; maintenance planning; manpower and personnel; technical manuals; training and training equipment; support equipment; facilities; computer resources support; packaging, handling, storage and transportation (PHS&T); design interface; reliability, maintainability and availability (RM&A), how they interact and how they are applied across a program, their effect on a system, plus how a systems' design and changes affect the ILS elements) • Knowledge of military/commercial requirements/specifications What sets you apart: • Previous experience developing Navy training documents and material • Employs Instructional Design practices to design curriculum to support operations and maintenance training • Experience with Common Weapon Launcher, AN/BYG-1 • Familiarity with Linux/Unix systems • Ability to handle multiple projects and work well under pressure • Previous Navy experience is a plus • Proven conflict management skills • Strong leadership skills consistent with a team-based work environment Additional Requirements • Ability to obtain and maintain a DoD Secret Security Clearance. • Willingness to travel and perform duties onboard naval vessels. Education Requirements: Bachelor's degree in Logistics, Management or Engineering, a related specialized area or field is required (or equivalent experience) plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience. Clearance Requirements: Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Workplace Options: This position is fully on-site. While on-site, you will be a part of the Manassas VA facility.
CYBERSECURITY INCIDENT RESPONSE & THREAT DETECTION ANALYST Location: Columbus, Ohio or Ft. Belvoir, Virginia or Battle Creek, MI. DOD Top Secret Clearance Certification: Baseline Certification for IAT-II and CNDSP/CSSP-IR Participates in 24x7x365 monitoring of SIEM and other cybersecurity monitoring tools to detect and respond to cybersecurity threats within the Enterprise Network Environment. Performs actions to protect, monitor, detect, analyze, and respond to unauthorized activity. Employs Cybersecurity capabilities and deliberate actions to respond to specific alerts or emerging threats. Reviews logged events for trends that are indicative of attack or compromise within the environment. Actively monitors logs and traffic for Advanced Persistent Threats (APT) and "low and slow" attacks within the environment. Maintains awareness of possible threats with the use of intelligence resources which include Open Source Intelligence (OSINT). Provides technical analysis and sustainment support for the enterprise for Cybersecurity tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats. Minimum Requirements: • Five (5) years relevant experience • Two (2) years performing root cause analysis of cybersecurity events and incidents. • Working knowledge of at least two types of security tools: Firewall, IDS/IPS, Host based antivirus, Data loss prevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL, Python, PowerShell) • Must possess IT-I Critical Sensitive security clearance or Tier 5 (T5) at time of proposal submission. • Must have Baseline Certification for IAT-II and CNDSP/CSSP-IR when on boarding and must have one of the "Computer Network Defense" CE Certifications within six (6) months of onboarding.
08/31/2025
Full time
CYBERSECURITY INCIDENT RESPONSE & THREAT DETECTION ANALYST Location: Columbus, Ohio or Ft. Belvoir, Virginia or Battle Creek, MI. DOD Top Secret Clearance Certification: Baseline Certification for IAT-II and CNDSP/CSSP-IR Participates in 24x7x365 monitoring of SIEM and other cybersecurity monitoring tools to detect and respond to cybersecurity threats within the Enterprise Network Environment. Performs actions to protect, monitor, detect, analyze, and respond to unauthorized activity. Employs Cybersecurity capabilities and deliberate actions to respond to specific alerts or emerging threats. Reviews logged events for trends that are indicative of attack or compromise within the environment. Actively monitors logs and traffic for Advanced Persistent Threats (APT) and "low and slow" attacks within the environment. Maintains awareness of possible threats with the use of intelligence resources which include Open Source Intelligence (OSINT). Provides technical analysis and sustainment support for the enterprise for Cybersecurity tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats. Minimum Requirements: • Five (5) years relevant experience • Two (2) years performing root cause analysis of cybersecurity events and incidents. • Working knowledge of at least two types of security tools: Firewall, IDS/IPS, Host based antivirus, Data loss prevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL, Python, PowerShell) • Must possess IT-I Critical Sensitive security clearance or Tier 5 (T5) at time of proposal submission. • Must have Baseline Certification for IAT-II and CNDSP/CSSP-IR when on boarding and must have one of the "Computer Network Defense" CE Certifications within six (6) months of onboarding.
.Net Software & Radar Support Engineer Department: Engineering / Software Development Location: Colorado Springs, CO (On-Site) Role Type: Full-Time Contract Active TS/SCI clearance (required) About Our Client Our client is a leading defense and technology solutions provider supporting mission-critical radar and defense systems for the U.S. military and allied forces. With a commitment to innovation, cybersecurity, and national security, they design, integrate, and maintain advanced systems that protect U.S. interests worldwide. Their teams collaborate with top-tier engineers, scientists, and defense professionals to deliver solutions that meet the highest industry and security standards. Job Description We are seeking a .NET Software Engineer to support radar system software development, integration, and sustainment in Colorado Springs, CO. This role involves creating, enhancing, and maintaining mission-critical applications that interface with radar systems, ensuring accuracy, security, and performance in high-demand environments. The engineer will work closely with systems engineers, radar specialists, and program managers to translate operational needs into technical solutions, troubleshoot issues, and develop innovative approaches for system improvement. The ideal candidate has strong .NET development expertise, experience with real-time systems, and a deep understanding of defense technology environments. Duties and Responsibilities Design, develop, and maintain .NET applications that support radar system operations and data processing. Integrate software with radar hardware and communication systems. Perform troubleshooting, debugging, and optimization of software for performance and reliability. Collaborate with radar engineers and analysts to implement operational requirements. Ensure compliance with DoD security requirements and software development standards. Participate in code reviews and provide technical guidance to junior developers. Document software designs, interfaces, and system configurations. Required Experience/Skills Active TS/SCI clearance (required). 5+ years of experience in software engineering using .NET (C#), C/C++. Experience with radar system software integration or similar defense systems. Strong knowledge of object-oriented programming and design patterns. Experience with SQL Server or other relational databases. Familiarity with real-time data processing and high-availability systems. Understanding of DoD software development lifecycle and security protocols. Nice-to-Haves Experience with radar signal processing or sensor systems. Familiarity with Agile development methodology. Knowledge of secure coding practices in a classified environment. Education Bachelor's degree in Computer Science, Software Engineering, Electrical Engineering, or a related field. Pay & Benefits Summary Competitive hourly or salary compensation. Paid time off and federal holiday observance. Opportunities for career growth in high-impact defense programs. Ready to take your quality engineering career to the next level? Connect with your Catapult Recruiter: Kailyn Hartley, directly at Software Engineer .NET (C#) Radar Systems Radar Signal Sensor Processing TS/SCI Clearance Defense Real-time Systems
08/30/2025
Full time
.Net Software & Radar Support Engineer Department: Engineering / Software Development Location: Colorado Springs, CO (On-Site) Role Type: Full-Time Contract Active TS/SCI clearance (required) About Our Client Our client is a leading defense and technology solutions provider supporting mission-critical radar and defense systems for the U.S. military and allied forces. With a commitment to innovation, cybersecurity, and national security, they design, integrate, and maintain advanced systems that protect U.S. interests worldwide. Their teams collaborate with top-tier engineers, scientists, and defense professionals to deliver solutions that meet the highest industry and security standards. Job Description We are seeking a .NET Software Engineer to support radar system software development, integration, and sustainment in Colorado Springs, CO. This role involves creating, enhancing, and maintaining mission-critical applications that interface with radar systems, ensuring accuracy, security, and performance in high-demand environments. The engineer will work closely with systems engineers, radar specialists, and program managers to translate operational needs into technical solutions, troubleshoot issues, and develop innovative approaches for system improvement. The ideal candidate has strong .NET development expertise, experience with real-time systems, and a deep understanding of defense technology environments. Duties and Responsibilities Design, develop, and maintain .NET applications that support radar system operations and data processing. Integrate software with radar hardware and communication systems. Perform troubleshooting, debugging, and optimization of software for performance and reliability. Collaborate with radar engineers and analysts to implement operational requirements. Ensure compliance with DoD security requirements and software development standards. Participate in code reviews and provide technical guidance to junior developers. Document software designs, interfaces, and system configurations. Required Experience/Skills Active TS/SCI clearance (required). 5+ years of experience in software engineering using .NET (C#), C/C++. Experience with radar system software integration or similar defense systems. Strong knowledge of object-oriented programming and design patterns. Experience with SQL Server or other relational databases. Familiarity with real-time data processing and high-availability systems. Understanding of DoD software development lifecycle and security protocols. Nice-to-Haves Experience with radar signal processing or sensor systems. Familiarity with Agile development methodology. Knowledge of secure coding practices in a classified environment. Education Bachelor's degree in Computer Science, Software Engineering, Electrical Engineering, or a related field. Pay & Benefits Summary Competitive hourly or salary compensation. Paid time off and federal holiday observance. Opportunities for career growth in high-impact defense programs. Ready to take your quality engineering career to the next level? Connect with your Catapult Recruiter: Kailyn Hartley, directly at Software Engineer .NET (C#) Radar Systems Radar Signal Sensor Processing TS/SCI Clearance Defense Real-time Systems
Labor Category: Software Engineer Position Title: Software Developer Position Level: Level 1 - Subject Matter Expert Salary: Up to $245,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. Introduction: The Customer's business environment is fast-paced and dynamic. The Customer maintains a network, records system, and other analytical applications to collect and analyze data on the Customer's business operations. The Customer's goal is to improve the integrity and usability of its data collected during its day to day operation. It performs this duty through the development of software systems. The Customer requires support specializing in development and maintenance of software that extracts, transforms, and loads data from various data formats into data models. The Customer also requires expertise that will appropriately secure those capabilities. Work Requirement: Software Development The Candidate shall work within a data engineering team. This team works closely with operations officers, analysts, and external engineers to gather requirements and refine systems. The Candidate shall assess and validate development requirements across Customer organization. The Candidate will develop software to extract, transform, and load data. The Candidate shall help architect and implement a framework for extraction, transformation, and loading data. The Candidate shall assess and validate system integration requirements across Customer organization. The Candidate shall provide Operations and Maintenance (O&M) for Customer's data related software systems. The Candidate shall finesse cyber data models. Details: Labor Category: Software Engineer Position Title: Software Developer Position Level: Level 1 - Subject Matter Expert Salary: Up to $245,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Mandatory Requirements: • Developmental (0-2 years' experience) • Full Performance (3-5 years' experience) • Senior (6-10 years' experience) • Expert (11-15 years' experience) • SME (16+ years' experience) 1. 3 years of experience designing or implementing Extract, Transform, and Load (ETL) pipelines. 2. 5 years of experience as a senior software/systems architect. 3. 5 years of experience working w/cross functional teams. 4. 5 years of experience designing or implementing interfaces between disparate systems. 5. 8 years of experience designing or implementing web applications and Rest API. 6. 10 years of experience building software using Object Oriented Programming (OOP) principles. Preferred experience with Java and/or Python 7. 5 years of experience designing and developing cloud architecture in the Customer environment. Optional Requirements: 1. 3 years of DevOps experience leveraging infrastructure-as-code such as CloudFormation, AWS, CDK, Terraform, and/or Ansible. 2. 10 years of experience building software using OOP principles: preferred experience with Java and/or Python 3. 3 years of experience with Linux systems administration and monitoring 4. 3 years of experience with NoSQL databases, especially MongoDB and Elasticsearch. 5. 3 years of experience with modern JavaScript/Typescript UI frameworks such as Angular, React, or Vue. 6. 3 years of experience supporting requirements gathering with this customer. 7. 3 years of experience implementing and building systems with this customer. B4CORP Company Information B4Corp is a small defense contracting company that focuses on providing an optimum environment for mission-focused, highly skilled consultants to support the United States of America's intelligence community and other defense organizations. B4Corp provides a low overhead, highly efficient, high salary environment that allows employees to excel at meeting the client's needs. B4Corp is looking for information technology professionals that have a high sense of personal responsibility, self-motivation, and mission drive. B4Corp's dedication and care for its employees is reflected in our outstanding compensation and benefits package. B4Corp's benefits reflect the company's policy of putting the employees first. B4Corp's maximum flexibility comp / makeup time policy, along with the company's cafeteria-style benefit plan that allows employees to maximize their Benefit Dollars, reflects B4Corp's commitment to its employees. Compensation: Outstanding Salaries Retirement: Full Vanguard 401k Plan - Featuring a full scope of investment options - 100% employer matched contribution up to 6% of employee's salary - Ability to max out 401k savings $57k ($63.5k if over 50) Employees receive B4Corp phantom stock each year (2-year vesting period) Insurance: Medical - United Health Care (UHC) (multiple plan options) Dental - United Concordia (UC) Flex Plan Vision - Vision Service Plan Insurance Co (VSP) Signature Plans Mutual of Omaha short-term disability (60% of salary up to $2,000.00/week) Mutual of Omaha long-term disability (60% of salary up to $10,000.00/month) Mutual of Omaha life insurance ($200,000.00) Employee Referral Bonus: Refer a friend or a coworker and receive $3,000 per year for every year the person works for B4CORP Paid Time Off (PTO): Seven weeks of leave per year (including ten federal holidays) Flexible work schedule with comp time (with customer approval) Tuition and Training: Free CBTNuggets Online Training Account - More than 200 online IT courses on a large variety of topics, including networking, security, virtualization, and the cloud - Cisco, Microsoft, and Google - Virtual Labs Free L inux Academy Online Training Account Internal Tracking -SV-1954-5 If you would like to complete a detailed B4Corp Employment Application, please do so using this form (You only need to fill out this application once for B4Corp or if you have updates to the information.): . This form will help us find you the best position quicker. B4Corp is an EEO and e-Verify employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation or national origin. Please take the time to review and complete these three voluntary identification forms if you choose to do so and email them to .
08/29/2025
Full time
Labor Category: Software Engineer Position Title: Software Developer Position Level: Level 1 - Subject Matter Expert Salary: Up to $245,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. Introduction: The Customer's business environment is fast-paced and dynamic. The Customer maintains a network, records system, and other analytical applications to collect and analyze data on the Customer's business operations. The Customer's goal is to improve the integrity and usability of its data collected during its day to day operation. It performs this duty through the development of software systems. The Customer requires support specializing in development and maintenance of software that extracts, transforms, and loads data from various data formats into data models. The Customer also requires expertise that will appropriately secure those capabilities. Work Requirement: Software Development The Candidate shall work within a data engineering team. This team works closely with operations officers, analysts, and external engineers to gather requirements and refine systems. The Candidate shall assess and validate development requirements across Customer organization. The Candidate will develop software to extract, transform, and load data. The Candidate shall help architect and implement a framework for extraction, transformation, and loading data. The Candidate shall assess and validate system integration requirements across Customer organization. The Candidate shall provide Operations and Maintenance (O&M) for Customer's data related software systems. The Candidate shall finesse cyber data models. Details: Labor Category: Software Engineer Position Title: Software Developer Position Level: Level 1 - Subject Matter Expert Salary: Up to $245,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Mandatory Requirements: • Developmental (0-2 years' experience) • Full Performance (3-5 years' experience) • Senior (6-10 years' experience) • Expert (11-15 years' experience) • SME (16+ years' experience) 1. 3 years of experience designing or implementing Extract, Transform, and Load (ETL) pipelines. 2. 5 years of experience as a senior software/systems architect. 3. 5 years of experience working w/cross functional teams. 4. 5 years of experience designing or implementing interfaces between disparate systems. 5. 8 years of experience designing or implementing web applications and Rest API. 6. 10 years of experience building software using Object Oriented Programming (OOP) principles. Preferred experience with Java and/or Python 7. 5 years of experience designing and developing cloud architecture in the Customer environment. Optional Requirements: 1. 3 years of DevOps experience leveraging infrastructure-as-code such as CloudFormation, AWS, CDK, Terraform, and/or Ansible. 2. 10 years of experience building software using OOP principles: preferred experience with Java and/or Python 3. 3 years of experience with Linux systems administration and monitoring 4. 3 years of experience with NoSQL databases, especially MongoDB and Elasticsearch. 5. 3 years of experience with modern JavaScript/Typescript UI frameworks such as Angular, React, or Vue. 6. 3 years of experience supporting requirements gathering with this customer. 7. 3 years of experience implementing and building systems with this customer. B4CORP Company Information B4Corp is a small defense contracting company that focuses on providing an optimum environment for mission-focused, highly skilled consultants to support the United States of America's intelligence community and other defense organizations. B4Corp provides a low overhead, highly efficient, high salary environment that allows employees to excel at meeting the client's needs. B4Corp is looking for information technology professionals that have a high sense of personal responsibility, self-motivation, and mission drive. B4Corp's dedication and care for its employees is reflected in our outstanding compensation and benefits package. B4Corp's benefits reflect the company's policy of putting the employees first. B4Corp's maximum flexibility comp / makeup time policy, along with the company's cafeteria-style benefit plan that allows employees to maximize their Benefit Dollars, reflects B4Corp's commitment to its employees. Compensation: Outstanding Salaries Retirement: Full Vanguard 401k Plan - Featuring a full scope of investment options - 100% employer matched contribution up to 6% of employee's salary - Ability to max out 401k savings $57k ($63.5k if over 50) Employees receive B4Corp phantom stock each year (2-year vesting period) Insurance: Medical - United Health Care (UHC) (multiple plan options) Dental - United Concordia (UC) Flex Plan Vision - Vision Service Plan Insurance Co (VSP) Signature Plans Mutual of Omaha short-term disability (60% of salary up to $2,000.00/week) Mutual of Omaha long-term disability (60% of salary up to $10,000.00/month) Mutual of Omaha life insurance ($200,000.00) Employee Referral Bonus: Refer a friend or a coworker and receive $3,000 per year for every year the person works for B4CORP Paid Time Off (PTO): Seven weeks of leave per year (including ten federal holidays) Flexible work schedule with comp time (with customer approval) Tuition and Training: Free CBTNuggets Online Training Account - More than 200 online IT courses on a large variety of topics, including networking, security, virtualization, and the cloud - Cisco, Microsoft, and Google - Virtual Labs Free L inux Academy Online Training Account Internal Tracking -SV-1954-5 If you would like to complete a detailed B4Corp Employment Application, please do so using this form (You only need to fill out this application once for B4Corp or if you have updates to the information.): . This form will help us find you the best position quicker. B4Corp is an EEO and e-Verify employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation or national origin. Please take the time to review and complete these three voluntary identification forms if you choose to do so and email them to .
ICF International seeks an experienced Senior Cyber Security Analyst to support the research and development of new cyber analytic capabilities that will help the US protect and defend its networks and critical information systems. The successful cleared candidate will act as a Senior Cyber Security Analyst to support a large federal cyber security analytic program. Your work will contribute to the knowledge of how cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Senior Cyber Security Analyst, you will work with our customers, developers, and researchers to evolve, automate, and enhance cybersecurity capabilities in defense or federal agencies. This is an opportunity to contribute to an important project from its beginning, work with the latest and emerging technologies, and all while building a great career at ICF! This role is hybrid-remote with the expectation of 2-3 days per week supporting the program based in Arlington, VA and the remainder of the week teleworking. A great way to have work-life balance. What You Will Be Doing: Leading a team of 3-4 Cyber Security Analysts in their day-to-day duties to include mentoring and professional development of team members Augment operational cyber analysts and act as a consultant for detection and/or threat hunting Advise on data preparation, implementation of techniques, visualizations, and employment of analytics developed by ICF and customer partners Assess current use of cyber tools by analysts and assess whether efficiencies can be made via alternate use of current, or adoption of alternate tools Problem-solve by identifying potential tools/processes to support needs, capturing areas of improvement that can be translated into functional requirements for future planning Provide ad-hoc training to cyber analyst teams on tools that support or enhance current processes Identify areas of technical training gaps and proposed approaches to methods (hands on, online modules, etc.) to improve the use of tools and data in support of the cybersecurity mission. Participate in post-engagement review Effectively communicate with leadership to ensure awareness of progress, challenges What You Must Have: Active high-level US Government issued security clearance required as part of client contract requirement Due to the nature of the work and contract requirements, US Citizenship is required Bachelor's degree with 12+ years of experience or Master's degree with 10+ years of experience in IT, Cyber, or related field Position requires a minimum of 5 years of Cyber Security experience (e.g., Threat Hunt, Incident Response, Investigations, Technical Reporting, etc.) 5 years of experience using network security analysis/IDS tools 5 or more years of experience analyzing packet capture and NetFlow data with an understanding of current cyber threats and trend derived from multiple sources (e.g., open-source, intelligence products, etc.) 5 or more years of experience with different types of Malware including detection methods, attack vectors, and vulnerabilities used Experience with query languages (e.g., SQL, KQL, etc.) Experience developing advanced dashboards (e.g., Kibana, Splunk, etc.) Experience with different cybersecurity frameworks and knowledge bases to identify tactics, techniques, and procedures of known actors Preferred Qualifications: 5 +years of experience in Leadership Interpersonal skills and the ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience CompTIA Security+ or higher certification level preferred
08/29/2025
Full time
ICF International seeks an experienced Senior Cyber Security Analyst to support the research and development of new cyber analytic capabilities that will help the US protect and defend its networks and critical information systems. The successful cleared candidate will act as a Senior Cyber Security Analyst to support a large federal cyber security analytic program. Your work will contribute to the knowledge of how cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Senior Cyber Security Analyst, you will work with our customers, developers, and researchers to evolve, automate, and enhance cybersecurity capabilities in defense or federal agencies. This is an opportunity to contribute to an important project from its beginning, work with the latest and emerging technologies, and all while building a great career at ICF! This role is hybrid-remote with the expectation of 2-3 days per week supporting the program based in Arlington, VA and the remainder of the week teleworking. A great way to have work-life balance. What You Will Be Doing: Leading a team of 3-4 Cyber Security Analysts in their day-to-day duties to include mentoring and professional development of team members Augment operational cyber analysts and act as a consultant for detection and/or threat hunting Advise on data preparation, implementation of techniques, visualizations, and employment of analytics developed by ICF and customer partners Assess current use of cyber tools by analysts and assess whether efficiencies can be made via alternate use of current, or adoption of alternate tools Problem-solve by identifying potential tools/processes to support needs, capturing areas of improvement that can be translated into functional requirements for future planning Provide ad-hoc training to cyber analyst teams on tools that support or enhance current processes Identify areas of technical training gaps and proposed approaches to methods (hands on, online modules, etc.) to improve the use of tools and data in support of the cybersecurity mission. Participate in post-engagement review Effectively communicate with leadership to ensure awareness of progress, challenges What You Must Have: Active high-level US Government issued security clearance required as part of client contract requirement Due to the nature of the work and contract requirements, US Citizenship is required Bachelor's degree with 12+ years of experience or Master's degree with 10+ years of experience in IT, Cyber, or related field Position requires a minimum of 5 years of Cyber Security experience (e.g., Threat Hunt, Incident Response, Investigations, Technical Reporting, etc.) 5 years of experience using network security analysis/IDS tools 5 or more years of experience analyzing packet capture and NetFlow data with an understanding of current cyber threats and trend derived from multiple sources (e.g., open-source, intelligence products, etc.) 5 or more years of experience with different types of Malware including detection methods, attack vectors, and vulnerabilities used Experience with query languages (e.g., SQL, KQL, etc.) Experience developing advanced dashboards (e.g., Kibana, Splunk, etc.) Experience with different cybersecurity frameworks and knowledge bases to identify tactics, techniques, and procedures of known actors Preferred Qualifications: 5 +years of experience in Leadership Interpersonal skills and the ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience CompTIA Security+ or higher certification level preferred
It's time to join a team that is dedicated to providing solutions that bring lasting positive change, supporting the growth, esteem, and self-actualization of its individual team members, and, focusing on improving the local communities it works in. LEAD Endeavors is seeking proactive professionals who are searching for increased job satisfaction and career advancement opportunities with a small but dynamic company. What We Offer: • unrelenting focus on total quality of life; • career advancement, growth opportunities, and promotion from within; • tuition and skill advancement reimbursement with no red tape; • individual, goal-oriented career plans; • competitive annual compensation; • multiple weeks of paid leave plus 11 paid holidays per year; • automatic retirement contribution; and • affordable and quality health, dental, and vision insurance options. What You Bring: • motivation and drive to excel; • desire for continual learning and strong problem-solving, analytic, and interpersonal skills; and • TS/SCI clearance with CI or FS poly and willingness to take and maintain FS poly. • at least 6 years of experience (less years required if you possess a college degree) running basic DNR/DNI queries, performing basic SIGINT target development, and tasking targetable information across all authorities; • understanding of Internet protocols, Internet routing, and SIGINT collection; and • ability to monitor and develop targets across several communication technologies. LEAD Endeavors is a defense intelligence and cyber security analysis and solutions company that provides intelligence collection, analysis, and dissemination support. Our solutions aid the nation's defense industry in creating offensive and defensive strategic planning in response to dynamic global events. We are a results-oriented company, and we focus on leveraging the expertise and creativity of our team members to provide meaningful answers to and solutions for the industry's most complex problems. In doing so, we strive to create positive and enduring change for all clients and company stakeholders. We create unique, flexible solutions that provide lasting benefits for years to come. Visit us at for more information!
08/18/2025
Full time
It's time to join a team that is dedicated to providing solutions that bring lasting positive change, supporting the growth, esteem, and self-actualization of its individual team members, and, focusing on improving the local communities it works in. LEAD Endeavors is seeking proactive professionals who are searching for increased job satisfaction and career advancement opportunities with a small but dynamic company. What We Offer: • unrelenting focus on total quality of life; • career advancement, growth opportunities, and promotion from within; • tuition and skill advancement reimbursement with no red tape; • individual, goal-oriented career plans; • competitive annual compensation; • multiple weeks of paid leave plus 11 paid holidays per year; • automatic retirement contribution; and • affordable and quality health, dental, and vision insurance options. What You Bring: • motivation and drive to excel; • desire for continual learning and strong problem-solving, analytic, and interpersonal skills; and • TS/SCI clearance with CI or FS poly and willingness to take and maintain FS poly. • at least 6 years of experience (less years required if you possess a college degree) running basic DNR/DNI queries, performing basic SIGINT target development, and tasking targetable information across all authorities; • understanding of Internet protocols, Internet routing, and SIGINT collection; and • ability to monitor and develop targets across several communication technologies. LEAD Endeavors is a defense intelligence and cyber security analysis and solutions company that provides intelligence collection, analysis, and dissemination support. Our solutions aid the nation's defense industry in creating offensive and defensive strategic planning in response to dynamic global events. We are a results-oriented company, and we focus on leveraging the expertise and creativity of our team members to provide meaningful answers to and solutions for the industry's most complex problems. In doing so, we strive to create positive and enduring change for all clients and company stakeholders. We create unique, flexible solutions that provide lasting benefits for years to come. Visit us at for more information!
Job ID: Location: ARLINGTON , VA , US Date Posted: 2021-08-30 Category: Defense/Intel Subcategory: Policy Analyst Schedule: Full-time Shift: Day Job Travel: Yes, 25 % of the Time Minimum Clearance Required: Secret Clearance Level Must Be Able to Obtain: TS/SCI Potential for Remote Work: No Description SAIC is seeking a Security Cooperation (SC) Program Coordinator will work onsite at the Defense Security Cooperation Agency (DSCA) headquarters and coordinate with the DSCA staff and the assessment teams at Geographic Combatant Commands (GCCs) to plan, schedule, arrange logistics for, and perform assessment, monitoring, and evaluation (AME) activities for DoD (Title 10) security cooperation programs on a global basis. The SC Program Coordinator will work as a member of a team of SC Program Coordinators at DSCA to assist GCC AME teams in developing and using approved metrics to judge operational capacity and capability improvements in foreign security forces. Qualifications Education & Experience: Bachelor's degree and ten (10) years of related experience; Masters degree and eight (8) years of experience. 9+ years of xperience as an U.S. Armed Forces Officer. Minimum five years of project management experience, including requirement gathering, design, implementation, and ongoing program management. Experience as a staff officer or action officer at a major DoD headquarters, e.g., OSD, Joint Staff, Combatant Command staff, Defense agency, or Service headquarters. Ability to work with US State Department, DoD, and foreign military senior officers and officials in a respectful, professional, and direct manner. Professional in conduct and appearance. Excellent oral and written communications skills. Able to write high quality formal reports that will be provided to senior U.S. military and civilian officials. Excellent analytical skills. Capable of organizing and completing all planning, support, scheduling, and execution activities for overseas travel. Able to work independently with minimal direction and exhibit a high level of initiative, attention to detail, and accuracy in all work, while tracking multiple tasks. Able and willing to travel in locally provided aircraft, vehicles, and boats for trips to remote bases. Able and willing to work in high threat areas. Physically fit, specifically able and willing to walk up to two miles over rough terrain, carry 40-pound bags, hike up hills, climb towers, go into confined spaces, examine vessels, vehicles, aircraft, and military facilities in a field environment, and work in extreme hot or cold weather with conditions such as high winds, rain, snow, and high altitude (over 10,000 feet). Clearance: Active DoD Secret security clearance is required. Must be able to obtain TS/SCI Desired Qualifications: Army, Air Force, Marine, or Navy foreign area officer (FAO) or equivalent, with experience working in a US Office of Security Cooperation (OSC) or equivalent, coordinating security assistance and security cooperation programs for partner nations. Master's degree and/or diploma from a US military or partner nation Command and Staff College or equivalent. Five years' experience and knowledge of public policy and operations. Five years' experience planning, designing, and implementing assessment, monitoring, and evaluation programs in the security sector. Background as a military officer with combat experience and one or more of the following specific qualifications: Army or Marine Infantry Officer Navy Surface Warfare Officer Military Communications / Cyber Officer Army Special Forces / Marine Raider Officer Army or Marine Air Defense Officer COVID Policy: Prospective and/or new employees will be required to adhere with SAIC's vaccination policy. All SAIC employees must be fully vaccinated and they must submit proof of vaccination on their first day of employment. Prospective or new employees may seek an exemption to the vaccination requirement at Contact Us and must have an approved exemption prior to the start of their employment. Customer site vaccination requirements, if more strict, will take precedence over SAIC's vaccination policy. SAIC® is a premier Fortune 500® technology integrator driving our nation's technology transformation. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes secure high-end solutions in engineering, digital, artificial intelligence, and mission solutions. Using our expertise and understanding of existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective, and efficient solutions that are critical to achieving our customers' missions. We are more than 26,500 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer, fostering a respectful work culture based on diversity, equity, and inclusion that values all contributors. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.1 billion. For more information, visit saic.com . My SAIC Benefits . - provided by Dice
11/07/2021
Full time
Job ID: Location: ARLINGTON , VA , US Date Posted: 2021-08-30 Category: Defense/Intel Subcategory: Policy Analyst Schedule: Full-time Shift: Day Job Travel: Yes, 25 % of the Time Minimum Clearance Required: Secret Clearance Level Must Be Able to Obtain: TS/SCI Potential for Remote Work: No Description SAIC is seeking a Security Cooperation (SC) Program Coordinator will work onsite at the Defense Security Cooperation Agency (DSCA) headquarters and coordinate with the DSCA staff and the assessment teams at Geographic Combatant Commands (GCCs) to plan, schedule, arrange logistics for, and perform assessment, monitoring, and evaluation (AME) activities for DoD (Title 10) security cooperation programs on a global basis. The SC Program Coordinator will work as a member of a team of SC Program Coordinators at DSCA to assist GCC AME teams in developing and using approved metrics to judge operational capacity and capability improvements in foreign security forces. Qualifications Education & Experience: Bachelor's degree and ten (10) years of related experience; Masters degree and eight (8) years of experience. 9+ years of xperience as an U.S. Armed Forces Officer. Minimum five years of project management experience, including requirement gathering, design, implementation, and ongoing program management. Experience as a staff officer or action officer at a major DoD headquarters, e.g., OSD, Joint Staff, Combatant Command staff, Defense agency, or Service headquarters. Ability to work with US State Department, DoD, and foreign military senior officers and officials in a respectful, professional, and direct manner. Professional in conduct and appearance. Excellent oral and written communications skills. Able to write high quality formal reports that will be provided to senior U.S. military and civilian officials. Excellent analytical skills. Capable of organizing and completing all planning, support, scheduling, and execution activities for overseas travel. Able to work independently with minimal direction and exhibit a high level of initiative, attention to detail, and accuracy in all work, while tracking multiple tasks. Able and willing to travel in locally provided aircraft, vehicles, and boats for trips to remote bases. Able and willing to work in high threat areas. Physically fit, specifically able and willing to walk up to two miles over rough terrain, carry 40-pound bags, hike up hills, climb towers, go into confined spaces, examine vessels, vehicles, aircraft, and military facilities in a field environment, and work in extreme hot or cold weather with conditions such as high winds, rain, snow, and high altitude (over 10,000 feet). Clearance: Active DoD Secret security clearance is required. Must be able to obtain TS/SCI Desired Qualifications: Army, Air Force, Marine, or Navy foreign area officer (FAO) or equivalent, with experience working in a US Office of Security Cooperation (OSC) or equivalent, coordinating security assistance and security cooperation programs for partner nations. Master's degree and/or diploma from a US military or partner nation Command and Staff College or equivalent. Five years' experience and knowledge of public policy and operations. Five years' experience planning, designing, and implementing assessment, monitoring, and evaluation programs in the security sector. Background as a military officer with combat experience and one or more of the following specific qualifications: Army or Marine Infantry Officer Navy Surface Warfare Officer Military Communications / Cyber Officer Army Special Forces / Marine Raider Officer Army or Marine Air Defense Officer COVID Policy: Prospective and/or new employees will be required to adhere with SAIC's vaccination policy. All SAIC employees must be fully vaccinated and they must submit proof of vaccination on their first day of employment. Prospective or new employees may seek an exemption to the vaccination requirement at Contact Us and must have an approved exemption prior to the start of their employment. Customer site vaccination requirements, if more strict, will take precedence over SAIC's vaccination policy. SAIC® is a premier Fortune 500® technology integrator driving our nation's technology transformation. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes secure high-end solutions in engineering, digital, artificial intelligence, and mission solutions. Using our expertise and understanding of existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective, and efficient solutions that are critical to achieving our customers' missions. We are more than 26,500 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer, fostering a respectful work culture based on diversity, equity, and inclusion that values all contributors. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.1 billion. For more information, visit saic.com . My SAIC Benefits . - provided by Dice
Supporting the Most Exciting and Meaningful Missions in the World Intelligence/Counterintelligence Analyst- Senior PAE provides a range of Department of Defense, Intelligence Community, and Commercial analytic and operational support, risk analysis, analytic outreach, red teaming, and event support services. We pride ourselves in developing creative, customized, and flexible approaches that meet our clients' evolving and dynamic needs. PAE company is seeking an exceptionally qualified Intelligence/Counterintelligence Analyst. He/she is responsible for strategic operational planning, centralized de-confliction, and coordination for CI activities conducted by the U. S. Government in direct response to Presidential Directives, National Strategy, and National needs and priorities. Responsibilities and Duties: Provide assistance to the Sponsor in conducting an annual assessment of the effectiveness of the Offensive CI Operations (OFCO) program. Provide assistance to the Sponsor in overseeing the U.S. Government's CI enabling programs and capabilities to support sensitive CI activities. Shall support with the development, oversight, and continuous refinement of technical and cyber-CI programs across the U.S. Government. Shall support the development and management of the U.S. Government's centralized knowledge base of foreign intelligence threat actors. Provide assistance to the Sponsor in conducting activities related to security of financial management processes and systems. Requirements and Qualifications: Applicable degree(s): Computer Science, Economics, History, International Affairs, Intelligence, International Relations, International Business, Linguistics (focus/concentration in Russian, Korean, Hebrew, Chinese, Arabic, etc.) 10 years of d emonstrated relevant experience/expertise supporting U.S. Federal Government in Central Asia, Korea, or Middle East analysis, and experience with Data Analytics, Operations Research, Biochemistry, Biotechnology, Counterintelligence, Insider Threat, Security, Cyber security, Engineering, English, Forensic Accounting, Telecommunications, or Physics. Ability to recognize all relevant information and produce objective assessments, free of any bias and be pertinent to client needs. Extensive skills in both written and oral communications. Must be able to pass all pre-deployment requirements including a medical, dental, psychological, background, credit, and security screens as deemed necessary to be considered deployable. Must be able to obtain all required immunizations deemed necessary by the contract. Must possess a valid US passport. Ability to obtain and maintain a US Government issued security clearance. #APP21 PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
09/24/2021
Full time
Supporting the Most Exciting and Meaningful Missions in the World Intelligence/Counterintelligence Analyst- Senior PAE provides a range of Department of Defense, Intelligence Community, and Commercial analytic and operational support, risk analysis, analytic outreach, red teaming, and event support services. We pride ourselves in developing creative, customized, and flexible approaches that meet our clients' evolving and dynamic needs. PAE company is seeking an exceptionally qualified Intelligence/Counterintelligence Analyst. He/she is responsible for strategic operational planning, centralized de-confliction, and coordination for CI activities conducted by the U. S. Government in direct response to Presidential Directives, National Strategy, and National needs and priorities. Responsibilities and Duties: Provide assistance to the Sponsor in conducting an annual assessment of the effectiveness of the Offensive CI Operations (OFCO) program. Provide assistance to the Sponsor in overseeing the U.S. Government's CI enabling programs and capabilities to support sensitive CI activities. Shall support with the development, oversight, and continuous refinement of technical and cyber-CI programs across the U.S. Government. Shall support the development and management of the U.S. Government's centralized knowledge base of foreign intelligence threat actors. Provide assistance to the Sponsor in conducting activities related to security of financial management processes and systems. Requirements and Qualifications: Applicable degree(s): Computer Science, Economics, History, International Affairs, Intelligence, International Relations, International Business, Linguistics (focus/concentration in Russian, Korean, Hebrew, Chinese, Arabic, etc.) 10 years of d emonstrated relevant experience/expertise supporting U.S. Federal Government in Central Asia, Korea, or Middle East analysis, and experience with Data Analytics, Operations Research, Biochemistry, Biotechnology, Counterintelligence, Insider Threat, Security, Cyber security, Engineering, English, Forensic Accounting, Telecommunications, or Physics. Ability to recognize all relevant information and produce objective assessments, free of any bias and be pertinent to client needs. Extensive skills in both written and oral communications. Must be able to pass all pre-deployment requirements including a medical, dental, psychological, background, credit, and security screens as deemed necessary to be considered deployable. Must be able to obtain all required immunizations deemed necessary by the contract. Must possess a valid US passport. Ability to obtain and maintain a US Government issued security clearance. #APP21 PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
Supporting the Most Exciting and Meaningful Missions in the World Research Analyst PAE provides a range of Department of Defense, Intelligence Community, and Commercial analytic and operational support, risk analysis, analytic outreach, red teaming, and event support services. We pride ourselves in developing creative, customized, and flexible approaches that meet our clients' evolving and dynamic needs. PAE is seeking a Research Analyst. He/she shall provide support to NCSC security missions, with emphasis on personnel security, assist in policy research to support national policies and decision-making, and directly coordinate with colleagues and senior level government personnel on the status of various tasks/initiatives. Responsibilities and duties listed below are not mutually exclusive. Responsibilities and Duties: Broad experience with the legislation, history, policy issues, and practical challenges facing security clearance reform initiatives in the nation security environment. Extensive experience in collaboration and consensus building across government organizations and industry. Assist with research, analysis, review, revision, and coordination of ICD's (personnel security, information security, including cyber security, physical/technical security and industrial security). He/she shall report daily issues and strategic topics impacted by ODNI security policies and specific areas of security interests. He/she shall attend working groups to record issues recommend solutions relative to research topics and implementation issues. "Assist with the development of ICD's and the appropriateness of "equivalent" security measures and assist with establishing an IC-wide security outreach program for both government and industry to include personnel security. Required Skills and Abilities: Applicable degree(s): Counterintelligence, Insider Threat, Government, Logistics, Politics, Political Science, or Security (any field). Minimum seven (7) years of experience supporting IC elements. These seven (7) years of experience may be concurrent with requisite years of experience. Minimum of three (3) years of experience supporting IC Security elements, supporting security policy and program development. These three (3) years of experience may be concurrent with requisite years of experience. Familiarity with the IC and its components, as well as its missions, disciplines, capabilities, and interrelationships. Demonstrated familiarity with appropriate Security Regulations and Policies. Excellent interpersonal skills to work effectively with senior leaders from inside and outside the USG, and to coordinate, network, and communicate across the IC. Ability to obtain and maintain a US government security clearance. #APP21 PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
09/23/2021
Full time
Supporting the Most Exciting and Meaningful Missions in the World Research Analyst PAE provides a range of Department of Defense, Intelligence Community, and Commercial analytic and operational support, risk analysis, analytic outreach, red teaming, and event support services. We pride ourselves in developing creative, customized, and flexible approaches that meet our clients' evolving and dynamic needs. PAE is seeking a Research Analyst. He/she shall provide support to NCSC security missions, with emphasis on personnel security, assist in policy research to support national policies and decision-making, and directly coordinate with colleagues and senior level government personnel on the status of various tasks/initiatives. Responsibilities and duties listed below are not mutually exclusive. Responsibilities and Duties: Broad experience with the legislation, history, policy issues, and practical challenges facing security clearance reform initiatives in the nation security environment. Extensive experience in collaboration and consensus building across government organizations and industry. Assist with research, analysis, review, revision, and coordination of ICD's (personnel security, information security, including cyber security, physical/technical security and industrial security). He/she shall report daily issues and strategic topics impacted by ODNI security policies and specific areas of security interests. He/she shall attend working groups to record issues recommend solutions relative to research topics and implementation issues. "Assist with the development of ICD's and the appropriateness of "equivalent" security measures and assist with establishing an IC-wide security outreach program for both government and industry to include personnel security. Required Skills and Abilities: Applicable degree(s): Counterintelligence, Insider Threat, Government, Logistics, Politics, Political Science, or Security (any field). Minimum seven (7) years of experience supporting IC elements. These seven (7) years of experience may be concurrent with requisite years of experience. Minimum of three (3) years of experience supporting IC Security elements, supporting security policy and program development. These three (3) years of experience may be concurrent with requisite years of experience. Familiarity with the IC and its components, as well as its missions, disciplines, capabilities, and interrelationships. Demonstrated familiarity with appropriate Security Regulations and Policies. Excellent interpersonal skills to work effectively with senior leaders from inside and outside the USG, and to coordinate, network, and communicate across the IC. Ability to obtain and maintain a US government security clearance. #APP21 PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
Metro Systems is seeking a cleared Host Based Systems Analyst for our Fortune 100 client located in Arlington, VA. Overview: Acquiring/collecting computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements. Assessing evidentiary value by triaging electronic devices. Correlating forensic findings with network events to further develop an intrusion narrative. When available, collecting and documenting system state information (running processes, network connections, etc.) prior to imaging. Performing incident triage from a forensic perspective to include determining scope, urgency and potential impact. Tracking and documenting forensic analysis from initial involvement through final resolution. Collecting, processing, preserving, analyzing and presenting computer related evidence. Coordinating with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings. Conducting analysis of forensic images and other available evidence and drafting forensic write-ups for inclusion in reports and other written products. Assisting in documenting and publishing Computer Network Defense guidance and reports on incident findings to appropriate constituencies. Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report. Assisting team members in imaging digital media. Assisting in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems. Using hashing algorithms to validate forensic images. Under direct guidance and coaching if needed, locating critical items in various file systems to aid more senior personnel in their analysis. Performing analysis of log files from a variety of sources to identify possible threats to computer security. Using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions. Determining programs that have been executed, finding files that have been changed on disk and in memory. Qualifications: U.S. Citizenship. Must have an active Top Secret clearance Must be able to obtain DHS Suitability. 2+ years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools. Ability to create forensically sound duplicates of evidence (forensic images). Able to write cyber investigative reports documenting digital forensics findings. Experience with the analysis and characterization of cyber attacks. Experience with proper evidence handing procedures and chain of custody protocols. Skilled in identifying different classes of attacks and attack stages. Knowledge of system and application security threats and vulnerabilities. Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources. Must be able to work collaboratively across physical locations. BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree. High School Diploma and 4-6 years of host investigations experience may be substituted for the BS & 2-4 years of experience] Desired: Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP Experience with two or more of the following tools: EnCase FTK SIFT X-Ways Volatility WireShark Sleuth Kit/Autopsy GRR Experience with conducting all-source research. - provided by Dice
01/30/2021
Full time
Metro Systems is seeking a cleared Host Based Systems Analyst for our Fortune 100 client located in Arlington, VA. Overview: Acquiring/collecting computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements. Assessing evidentiary value by triaging electronic devices. Correlating forensic findings with network events to further develop an intrusion narrative. When available, collecting and documenting system state information (running processes, network connections, etc.) prior to imaging. Performing incident triage from a forensic perspective to include determining scope, urgency and potential impact. Tracking and documenting forensic analysis from initial involvement through final resolution. Collecting, processing, preserving, analyzing and presenting computer related evidence. Coordinating with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings. Conducting analysis of forensic images and other available evidence and drafting forensic write-ups for inclusion in reports and other written products. Assisting in documenting and publishing Computer Network Defense guidance and reports on incident findings to appropriate constituencies. Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report. Assisting team members in imaging digital media. Assisting in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems. Using hashing algorithms to validate forensic images. Under direct guidance and coaching if needed, locating critical items in various file systems to aid more senior personnel in their analysis. Performing analysis of log files from a variety of sources to identify possible threats to computer security. Using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions. Determining programs that have been executed, finding files that have been changed on disk and in memory. Qualifications: U.S. Citizenship. Must have an active Top Secret clearance Must be able to obtain DHS Suitability. 2+ years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools. Ability to create forensically sound duplicates of evidence (forensic images). Able to write cyber investigative reports documenting digital forensics findings. Experience with the analysis and characterization of cyber attacks. Experience with proper evidence handing procedures and chain of custody protocols. Skilled in identifying different classes of attacks and attack stages. Knowledge of system and application security threats and vulnerabilities. Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources. Must be able to work collaboratively across physical locations. BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree. High School Diploma and 4-6 years of host investigations experience may be substituted for the BS & 2-4 years of experience] Desired: Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP Experience with two or more of the following tools: EnCase FTK SIFT X-Ways Volatility WireShark Sleuth Kit/Autopsy GRR Experience with conducting all-source research. - provided by Dice
Description SAIC is hiring a Mid-Level All-Source Intelligence Analyst to be immersed into a dynamic environment composed of a diverse team of analysts, linguists, cultural experts, and operations officers. The analyst will focus on creating and recognizing targeting opportunities and strategies in the cyber-realm. The position requires superb critical thinking skills, writing, and briefing abilities. Along with strong analytic skills/research skills, the candidate should demonstrate strong operational sense and personal initiative. This position will require interaction with a wide variety of Government leadership and contractor personnel. The ability to operate in a diverse, evolving, and high profile environment is key. Utilizes all-sources of intelligence, including IMINT, SIGINT, HUMINT, MASINT, OSINT, and SMINT (social media) to provide recommendations and courses of actions to government leads. Provides targeting to strategic and/or counterintelligence platforms, highlighting relationships within target networks Conducts Social Media and Open Source Research for investigative and/or operational activities Identifies, monitors, and assesses the efforts of foreign intelligence entities who attempt to collect sensitive national security information on US persons, activities, and interests; including technologies and the threats posed by emerging technologies to US operations and interests. Develops investigative leads and creates associated incident, threat, and information reports/products Can be counted on to exceed goals successfully, very bottom-line oriented; steadfastly pushes self and others for results Qualifications REQUIRED EDUCATION AND EXPERIENCE Minimum of five (5) years of experience within the US military or US intelligence community with a Bachelor's Degree in Intelligence Studies, International Studies, or a related field (in-field experience may be substituted for education). Additional years of experience or military training may be considered in lieu of a degree. Experience with one or more of the following databases: HOTR, Harmony, TAC, M3, Open Source Center Demonstrated experience utilizing data visualization tools (e.g., i2 Analyst Notebook, Visio, Palantir, Tableau, Qlix, Power BI) Experience with assessment of sources and their reporting through the corroboration of source reporting and providing analytical feedback Working knowledge of popular, legacy, and new social media, blog sites, and mobile applications. Proficiency in Microsoft Office products (specifically OneNote) Strong knowledge of military operations, terminology, and structure Preparing Information Reports with excellent writing and briefing skills DESIRED EDUCATION AND EXPERIENCE: Former Military Intelligence experience (35 Series, 14N, 1N0, 0210, 0211, or equivalent) Formal coursework or instruction in OSINT techniques, technologies, tools, and trends. Experience utilizing commercial Social Media and Open Source Tools/Databases (e.g. BabelStreet, Maltego, FiveCast, Harvester, DataMinr) Experience with Military or Law Enforcement Community Counterintelligence Investigations Experience in the production and dissemination of Intelligence Information Reports (IIRs) REQUIRED CLEARANCE: Active Top Secret Clearance with ability of obtain SCI and pass a polygraph (PR within 6 years) Overview SAIC is a premier technology integrator solving our nation's modernization and readiness challenges. Our offerings across defense, space, civilian, and intelligence markets include high-end solutions in engineering, IT, and mission outcomes. We integrate the best components from our portfolio with our partner's ecosystem to deliver innovative and effective solutions. We are 25,500 strong; driven by mission, united by purpose, and inspired by opportunities. Headquartered in Reston, VA, SAIC has annual revenues of nearly $7.1 billion. For information, visit saic.com or Working at SAIC for benefits details. SAIC is an Equal Opportunity Employer empowering people no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status. We strive to create a diverse, inclusive and respectful work culture that values all.
01/27/2021
Full time
Description SAIC is hiring a Mid-Level All-Source Intelligence Analyst to be immersed into a dynamic environment composed of a diverse team of analysts, linguists, cultural experts, and operations officers. The analyst will focus on creating and recognizing targeting opportunities and strategies in the cyber-realm. The position requires superb critical thinking skills, writing, and briefing abilities. Along with strong analytic skills/research skills, the candidate should demonstrate strong operational sense and personal initiative. This position will require interaction with a wide variety of Government leadership and contractor personnel. The ability to operate in a diverse, evolving, and high profile environment is key. Utilizes all-sources of intelligence, including IMINT, SIGINT, HUMINT, MASINT, OSINT, and SMINT (social media) to provide recommendations and courses of actions to government leads. Provides targeting to strategic and/or counterintelligence platforms, highlighting relationships within target networks Conducts Social Media and Open Source Research for investigative and/or operational activities Identifies, monitors, and assesses the efforts of foreign intelligence entities who attempt to collect sensitive national security information on US persons, activities, and interests; including technologies and the threats posed by emerging technologies to US operations and interests. Develops investigative leads and creates associated incident, threat, and information reports/products Can be counted on to exceed goals successfully, very bottom-line oriented; steadfastly pushes self and others for results Qualifications REQUIRED EDUCATION AND EXPERIENCE Minimum of five (5) years of experience within the US military or US intelligence community with a Bachelor's Degree in Intelligence Studies, International Studies, or a related field (in-field experience may be substituted for education). Additional years of experience or military training may be considered in lieu of a degree. Experience with one or more of the following databases: HOTR, Harmony, TAC, M3, Open Source Center Demonstrated experience utilizing data visualization tools (e.g., i2 Analyst Notebook, Visio, Palantir, Tableau, Qlix, Power BI) Experience with assessment of sources and their reporting through the corroboration of source reporting and providing analytical feedback Working knowledge of popular, legacy, and new social media, blog sites, and mobile applications. Proficiency in Microsoft Office products (specifically OneNote) Strong knowledge of military operations, terminology, and structure Preparing Information Reports with excellent writing and briefing skills DESIRED EDUCATION AND EXPERIENCE: Former Military Intelligence experience (35 Series, 14N, 1N0, 0210, 0211, or equivalent) Formal coursework or instruction in OSINT techniques, technologies, tools, and trends. Experience utilizing commercial Social Media and Open Source Tools/Databases (e.g. BabelStreet, Maltego, FiveCast, Harvester, DataMinr) Experience with Military or Law Enforcement Community Counterintelligence Investigations Experience in the production and dissemination of Intelligence Information Reports (IIRs) REQUIRED CLEARANCE: Active Top Secret Clearance with ability of obtain SCI and pass a polygraph (PR within 6 years) Overview SAIC is a premier technology integrator solving our nation's modernization and readiness challenges. Our offerings across defense, space, civilian, and intelligence markets include high-end solutions in engineering, IT, and mission outcomes. We integrate the best components from our portfolio with our partner's ecosystem to deliver innovative and effective solutions. We are 25,500 strong; driven by mission, united by purpose, and inspired by opportunities. Headquartered in Reston, VA, SAIC has annual revenues of nearly $7.1 billion. For information, visit saic.com or Working at SAIC for benefits details. SAIC is an Equal Opportunity Employer empowering people no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status. We strive to create a diverse, inclusive and respectful work culture that values all.
Those who join Emergent BioSolutions feel a sense of ownership about their future. You will excel in an environment characterized by respect, innovation and growth opportunities. Here, you will join passionate professionals who advance their scientific, technical and professional skills to develop products designed-to protect life. I. JOB SUMMARY The Lead Cyber Security Operations Analyst works both independently and collaboratively with EBSI Managed Security Service Provider, Incident Response Team, Information Security Engineers, IT systems engineers, and software engineers. The primary responsibility for this individual will be operate as the tier three security operations analyst, subject matter expert, e-discovery/Digital forensics and cyber threat intelligence fusion cell on the cybersecurity operations team. II. ESSENTIAL FUNCTIONS Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Lead cyber security operations analysts have the responsibility of being the highest technical escalation point of a cyber incident investigating and determining, based on analysis, if an Incident is to be decleared and board reportable. Manage internal/external interactions and communications with stakeholders in a professional manner, referring problems to and communicating with the appropriate department manager/director. Follow legal evidentiary chain of custody during compromise investigations by documenting and communicating findings in the system of record for case management solution and after-action reporting Perform and validate network and host level digital forensic investigations to determine root cause of the compromise, intrusion, or breach Develop and implement cyber security playbooks and process flows in line with industry best pracitces and standards Developing, implementing, and documenting signatures and behavioral detection/prevention strategies that keep pace with emerging cyber threats Identify, drive, track, and document compromise remediaton efforts Declare EBSI official Incidents and be the transition point to the Incident Response team Process cyber threat intelligence in accordance with the "intelligence cycle": direction, collection, processing, analysis, dissemination, and feedback from open source, paid subscriptions, and government sources. The above statements are intended to describe the nature of work performed by those in this job and are not an exhaustive list of all duties. Nothing in this job description restricts managements right to assign or reassign duties and responsibilities to this job at any time which reflects management's assignment of essential functions. III. MINIMUM EDUCATION, EXPERIENCE, SKILLS 3+ years of relevant commercial security operations experience or equivalent USCYBERCOM National Defense Team, MSSP, CERT, CNDSP work experience Must have at least one of the following cyber security technical certifications: SEC+/GSEC/CCSP/CYSA+ In addition to one of the following: GCIH/GCFA/GNFA/GREM Familiarity with Linux, Windows, and cyber forensic evidence concepts Knowledge of malware families and network attack vectors. Knowledge about exploits, vulnerabilities, and cyber attacks Familiarity with performing host and network level analysis to determine if compromise occured. Familiarity with the Lockheed Cyber Kill Chain and MITRE AT&CK frameworks Must have the ability to attain at least a Secret US government clearance Possess planning, interpersonal, and motivational skills, able to write clearly and succinctly in technical and non-technical formats. Ability to speak both extemporaneously and in formal business settings. Have the ability to apply logic and reason to solve complex problems. Ability to establish and maintain multi-functional and positive working relationships. Advanced computer skills and proficiency. Strong interpersonal and networking skills with a solid ability to work in a team environment. Ability to work under stressful and tight deadlines as well as the ability to lead in a fast-paced environment. Above average computer hardware and software knowledge. Ability to multi-task, discerns patterns in detail. Think through problems for logical solutions and remain calm and professional under stress. Strong decision-making ability during both crisis and non-crisis situations. Able to work with highly confidential information. There are physical/mental demands and work environment characteristics that must be met by an individual to successfully perform the essential functions of the job. This information is available upon request from the candidate. Reasonable accommodations may be made to enable individuals with disabilities to perform all essential functions. Emergent BioSolutions is an Equal Opportunity/Affirmative Action Employer and values the diversity of our workforce. Emergent does not discriminate on the basis of race, color, creed, religion, sex or gender (including pregnancy, childbirth, and related medical conditions), gender identity or gender expression (including transgender status), sexual orientation, age, national origin, ancestry, citizenship status, marital status, physical or mental disability, military service or veteran status, genetic information or any other characteristics protected by applicable federal, state or local law. Information submitted will be used by Emergent BioSolutions for activities related to your prospective employment. Emergent BioSolutions respects your privacy and any use of the information submitted will be subject to the terms of our Privacy Policy . Emergent BioSolutions does not accept non-solicited resumes or candidate submittals from search/recruiting agencies not already on Emergent BioSolutions' approved agency list. Unsolicited resumes or candidate information submitted to Emergent BioSolutions by search/recruiting agencies not already on Emergent BioSolutions' approved agency list shall become the property of Emergent BioSolutions and if the candidate is subsequently hired by Emergent BioSolutions, Emergent BioSolutions shall not owe any fee to the submitting agency. .buttontextde38d a{ border: 1px solid transparent; } .buttontextde38d a:focus{ border: 1px dashed #c11d4b !important; outline: none !important; }
01/19/2021
Full time
Those who join Emergent BioSolutions feel a sense of ownership about their future. You will excel in an environment characterized by respect, innovation and growth opportunities. Here, you will join passionate professionals who advance their scientific, technical and professional skills to develop products designed-to protect life. I. JOB SUMMARY The Lead Cyber Security Operations Analyst works both independently and collaboratively with EBSI Managed Security Service Provider, Incident Response Team, Information Security Engineers, IT systems engineers, and software engineers. The primary responsibility for this individual will be operate as the tier three security operations analyst, subject matter expert, e-discovery/Digital forensics and cyber threat intelligence fusion cell on the cybersecurity operations team. II. ESSENTIAL FUNCTIONS Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Lead cyber security operations analysts have the responsibility of being the highest technical escalation point of a cyber incident investigating and determining, based on analysis, if an Incident is to be decleared and board reportable. Manage internal/external interactions and communications with stakeholders in a professional manner, referring problems to and communicating with the appropriate department manager/director. Follow legal evidentiary chain of custody during compromise investigations by documenting and communicating findings in the system of record for case management solution and after-action reporting Perform and validate network and host level digital forensic investigations to determine root cause of the compromise, intrusion, or breach Develop and implement cyber security playbooks and process flows in line with industry best pracitces and standards Developing, implementing, and documenting signatures and behavioral detection/prevention strategies that keep pace with emerging cyber threats Identify, drive, track, and document compromise remediaton efforts Declare EBSI official Incidents and be the transition point to the Incident Response team Process cyber threat intelligence in accordance with the "intelligence cycle": direction, collection, processing, analysis, dissemination, and feedback from open source, paid subscriptions, and government sources. The above statements are intended to describe the nature of work performed by those in this job and are not an exhaustive list of all duties. Nothing in this job description restricts managements right to assign or reassign duties and responsibilities to this job at any time which reflects management's assignment of essential functions. III. MINIMUM EDUCATION, EXPERIENCE, SKILLS 3+ years of relevant commercial security operations experience or equivalent USCYBERCOM National Defense Team, MSSP, CERT, CNDSP work experience Must have at least one of the following cyber security technical certifications: SEC+/GSEC/CCSP/CYSA+ In addition to one of the following: GCIH/GCFA/GNFA/GREM Familiarity with Linux, Windows, and cyber forensic evidence concepts Knowledge of malware families and network attack vectors. Knowledge about exploits, vulnerabilities, and cyber attacks Familiarity with performing host and network level analysis to determine if compromise occured. Familiarity with the Lockheed Cyber Kill Chain and MITRE AT&CK frameworks Must have the ability to attain at least a Secret US government clearance Possess planning, interpersonal, and motivational skills, able to write clearly and succinctly in technical and non-technical formats. Ability to speak both extemporaneously and in formal business settings. Have the ability to apply logic and reason to solve complex problems. Ability to establish and maintain multi-functional and positive working relationships. Advanced computer skills and proficiency. Strong interpersonal and networking skills with a solid ability to work in a team environment. Ability to work under stressful and tight deadlines as well as the ability to lead in a fast-paced environment. Above average computer hardware and software knowledge. Ability to multi-task, discerns patterns in detail. Think through problems for logical solutions and remain calm and professional under stress. Strong decision-making ability during both crisis and non-crisis situations. Able to work with highly confidential information. There are physical/mental demands and work environment characteristics that must be met by an individual to successfully perform the essential functions of the job. This information is available upon request from the candidate. Reasonable accommodations may be made to enable individuals with disabilities to perform all essential functions. Emergent BioSolutions is an Equal Opportunity/Affirmative Action Employer and values the diversity of our workforce. Emergent does not discriminate on the basis of race, color, creed, religion, sex or gender (including pregnancy, childbirth, and related medical conditions), gender identity or gender expression (including transgender status), sexual orientation, age, national origin, ancestry, citizenship status, marital status, physical or mental disability, military service or veteran status, genetic information or any other characteristics protected by applicable federal, state or local law. Information submitted will be used by Emergent BioSolutions for activities related to your prospective employment. Emergent BioSolutions respects your privacy and any use of the information submitted will be subject to the terms of our Privacy Policy . Emergent BioSolutions does not accept non-solicited resumes or candidate submittals from search/recruiting agencies not already on Emergent BioSolutions' approved agency list. Unsolicited resumes or candidate information submitted to Emergent BioSolutions by search/recruiting agencies not already on Emergent BioSolutions' approved agency list shall become the property of Emergent BioSolutions and if the candidate is subsequently hired by Emergent BioSolutions, Emergent BioSolutions shall not owe any fee to the submitting agency. .buttontextde38d a{ border: 1px solid transparent; } .buttontextde38d a:focus{ border: 1px dashed #c11d4b !important; outline: none !important; }
Supporting the Most Exciting and Meaningful Missions in the World Mid Level CI Specialist - Fremont Responsibilities: Process reports in various formats as described below Identify and write intelligence and associated referral reports Triage reported information and generate appropriate reports from information reported by cleared industry under the National Industrial Security Program (NISP) Review reports forwarded by DCSA CI Special Agents (CISAs) and perform detailed research to determine if the reports meet the criteria for creation of an IIR, NIP, CIR, or other type of report IAW current DCSA SOPs. If a report is warranted, shall write the report and input it into the DCSA CI Directorate's system of record, such as the DCSA CI Analytical System (DCIAS), draft the associated CIR, or similar document as required, and forward to the applicable CISA Generate and process Intelligence Information Reports (IIRs) Assist Collection Management Officers to generate IIRs from industry reports and analyze the reported information to determine if it satisfies DCSA, DoD CI or other agencies' collection requirements Determine suitability of reports for processing into IIRs Draft all IIRs in accordance with DCSA and Defense Intelligence Agency standard operating procedures, provide analytical comments in CHROME, and serialize, per requisite SOPs Submit draft IIRs to their respective Collection Management team for review and comment Triage packets, review files, and produce counterintelligence analytical reports and assessments Provide detailed written assessments and correspondence of tasked analysis Produce professional briefings and supporting documentation used to articulate and communicate operational activities and or CI threats to various internal and external audiences Use a variety of Microsoft products and other relational or analytic tools, like Palantir Produce and deliver briefings derived from threat assessments written by the contractor and/or other DCSA CI personnel to USG customers and cleared industry partners Provide CI Analytical Support within the authorities of DCSA under DoD Directive 5105.42, dated March 31, 2011, and in accordance with Intelligence Community Directives 203, 205, 206, and 208, shall provide support to mid- and senior-level personnel on a wide range of complex and sensitive information to identify and neutralize or influence the activities of the Foreign Intelligence Entities (FIE) targeting U.S. Government programs, information and technologies resident in cleared industry Conduct all-source finished intelligence research, analysis and writing in support of the Analysis, Cyber, and Operations Divisions, and brief analyses Provide analytic, operational, and planning support to DCSA CI Directorate regional leadership to assess the impacts of CI and Law Enforcement (LE) community issues, Counterespionage (CE) subjects, and Cybersecurity strategic objectives Provide advice and recommendations to regional leadership on the development and implementation of operational plans, investigations and investigations support, and collection plans and operations Participate in analytical exchanges with other intelligence entities as tasked Research, synthesize, exploit, evaluate, and analyze all-source reporting on foreign intelligence entities' targeting USG critical technologies, programs, information, and supply chains Attend and support the DCSA CI Directorate, Division, or regional office at counterintelligence working groups and analytical/operational exchanges Responsible for preparation, coordination, and presentation of government-approved briefings at the program and operational levels as required; Briefings can include CI briefings, threat presentations, CI awareness, and methods to mitigate threats Perform both analytical and operational support, providing advice on the collection and triage of reports received from cleared industry Provide consultation on management processes, efficient and productive integration of CI, and regional CI level responsibilities concerning the NISP with emphasis on the integration of the different elements of the CI mission and process improvements designed to maximize programmatic efficiencies within DCSA CI Regional Offices Identify, monitor, and assess foreign intelligencer efforts attempting collection of sensitive national security information on US persons, activities, and interests including threats posed by emerging technologies to US operations and interests Apply understanding of foreign intelligence capabilities/activities and US and foreign partner CI capabilities and TTPs for in-depth analytic research and production of all-source CI studies Contribute to developing CI strategies Conduct, develop, produce, and present programs of instruction in specified collection operations TTPs and related or supporting processes relevant to the various human intelligence and technical intelligence operations under DoD authorities Requirements: ACTIVE TS/SCI clearance is required Minimum of 6 years of experience working in the US Counterintelligence Enterprise and/or in the Intelligence Community Experience with counterintelligence research analysis and writing analytically-sound finished intelligence products Experience writing intelligence reports, to include Intelligence Information Reports (IIRs), Notices of Intelligence Potential (NIP), Contact Memorandums (CMs), Collection Emphasis Messages (CEMs), and Operational and Investigative correspondence consistent with current agency and community standards Experience using Intelligence Community message handling and retrieval systems such as Multimedia Messaging (M3), Think Analyze Connect (TAC), CHROME, CRATE, etc. Experience preparing, presenting, and defending finished intelligence products before higher-level U.S. Government officials, policy makers and other intelligence customers Demonstrated experience leveraging and integrating Intelligence Analysis into the CI Operational Cycle Experience working CI investigations, providing analytic support to CI investigations and collection and HUMINT operations Knowledgeable in CI/HUMINT targeting to direct, deter, or neutralize threats to U.S. Government (USG) personnel, programs, and technology Experience working collaboratively with intelligence analysts, CI/intelligence operations personnel, and information technology specialists to identify and assess threats to cleared contractor's computer networks, personnel, and facilities Extensive knowledge and high degree of proficiency using law enforcement and IC databases, to include Palantir, I2MS, Portico, and JPAS Possess working knowledge of and experience applying Intelligence Oversight considerations as a part of CI/intelligence analysis and collection tradecraft National level liaison experience with both the US Intelligence and LE community Experience applying CI analysis, operational and collection tradecrafts to threats associated with cleared industry and or the National Industrial Security Program (NISP) In-depth knowledge and understanding of the labor category activities required to meet mission requirements Mastery of qualitative and quantitative analytic methodologies and pursues developments in academia or other fields that affect tradecraft methodology Ability to define comprehensive, new, or unique research approaches that enable rigorous assessments to address and contribute to high-level tasks In-depth analysis of analytic operations and knowledge management issues across organizational and intra-IC boundaries and clearly articulates key findings Ability to work independently and with minimal oversight Ability to review analytic products for cogent arguments, tradecraft standards, and adequate support for conclusions; routinely tests analytic rigor of products Preferred: Bachelor's Degree in an area related to the labor category Graduate of in-residence Fundamentals of Intelligence Analysis course or Military Service equivalent PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
01/15/2021
Full time
Supporting the Most Exciting and Meaningful Missions in the World Mid Level CI Specialist - Fremont Responsibilities: Process reports in various formats as described below Identify and write intelligence and associated referral reports Triage reported information and generate appropriate reports from information reported by cleared industry under the National Industrial Security Program (NISP) Review reports forwarded by DCSA CI Special Agents (CISAs) and perform detailed research to determine if the reports meet the criteria for creation of an IIR, NIP, CIR, or other type of report IAW current DCSA SOPs. If a report is warranted, shall write the report and input it into the DCSA CI Directorate's system of record, such as the DCSA CI Analytical System (DCIAS), draft the associated CIR, or similar document as required, and forward to the applicable CISA Generate and process Intelligence Information Reports (IIRs) Assist Collection Management Officers to generate IIRs from industry reports and analyze the reported information to determine if it satisfies DCSA, DoD CI or other agencies' collection requirements Determine suitability of reports for processing into IIRs Draft all IIRs in accordance with DCSA and Defense Intelligence Agency standard operating procedures, provide analytical comments in CHROME, and serialize, per requisite SOPs Submit draft IIRs to their respective Collection Management team for review and comment Triage packets, review files, and produce counterintelligence analytical reports and assessments Provide detailed written assessments and correspondence of tasked analysis Produce professional briefings and supporting documentation used to articulate and communicate operational activities and or CI threats to various internal and external audiences Use a variety of Microsoft products and other relational or analytic tools, like Palantir Produce and deliver briefings derived from threat assessments written by the contractor and/or other DCSA CI personnel to USG customers and cleared industry partners Provide CI Analytical Support within the authorities of DCSA under DoD Directive 5105.42, dated March 31, 2011, and in accordance with Intelligence Community Directives 203, 205, 206, and 208, shall provide support to mid- and senior-level personnel on a wide range of complex and sensitive information to identify and neutralize or influence the activities of the Foreign Intelligence Entities (FIE) targeting U.S. Government programs, information and technologies resident in cleared industry Conduct all-source finished intelligence research, analysis and writing in support of the Analysis, Cyber, and Operations Divisions, and brief analyses Provide analytic, operational, and planning support to DCSA CI Directorate regional leadership to assess the impacts of CI and Law Enforcement (LE) community issues, Counterespionage (CE) subjects, and Cybersecurity strategic objectives Provide advice and recommendations to regional leadership on the development and implementation of operational plans, investigations and investigations support, and collection plans and operations Participate in analytical exchanges with other intelligence entities as tasked Research, synthesize, exploit, evaluate, and analyze all-source reporting on foreign intelligence entities' targeting USG critical technologies, programs, information, and supply chains Attend and support the DCSA CI Directorate, Division, or regional office at counterintelligence working groups and analytical/operational exchanges Responsible for preparation, coordination, and presentation of government-approved briefings at the program and operational levels as required; Briefings can include CI briefings, threat presentations, CI awareness, and methods to mitigate threats Perform both analytical and operational support, providing advice on the collection and triage of reports received from cleared industry Provide consultation on management processes, efficient and productive integration of CI, and regional CI level responsibilities concerning the NISP with emphasis on the integration of the different elements of the CI mission and process improvements designed to maximize programmatic efficiencies within DCSA CI Regional Offices Identify, monitor, and assess foreign intelligencer efforts attempting collection of sensitive national security information on US persons, activities, and interests including threats posed by emerging technologies to US operations and interests Apply understanding of foreign intelligence capabilities/activities and US and foreign partner CI capabilities and TTPs for in-depth analytic research and production of all-source CI studies Contribute to developing CI strategies Conduct, develop, produce, and present programs of instruction in specified collection operations TTPs and related or supporting processes relevant to the various human intelligence and technical intelligence operations under DoD authorities Requirements: ACTIVE TS/SCI clearance is required Minimum of 6 years of experience working in the US Counterintelligence Enterprise and/or in the Intelligence Community Experience with counterintelligence research analysis and writing analytically-sound finished intelligence products Experience writing intelligence reports, to include Intelligence Information Reports (IIRs), Notices of Intelligence Potential (NIP), Contact Memorandums (CMs), Collection Emphasis Messages (CEMs), and Operational and Investigative correspondence consistent with current agency and community standards Experience using Intelligence Community message handling and retrieval systems such as Multimedia Messaging (M3), Think Analyze Connect (TAC), CHROME, CRATE, etc. Experience preparing, presenting, and defending finished intelligence products before higher-level U.S. Government officials, policy makers and other intelligence customers Demonstrated experience leveraging and integrating Intelligence Analysis into the CI Operational Cycle Experience working CI investigations, providing analytic support to CI investigations and collection and HUMINT operations Knowledgeable in CI/HUMINT targeting to direct, deter, or neutralize threats to U.S. Government (USG) personnel, programs, and technology Experience working collaboratively with intelligence analysts, CI/intelligence operations personnel, and information technology specialists to identify and assess threats to cleared contractor's computer networks, personnel, and facilities Extensive knowledge and high degree of proficiency using law enforcement and IC databases, to include Palantir, I2MS, Portico, and JPAS Possess working knowledge of and experience applying Intelligence Oversight considerations as a part of CI/intelligence analysis and collection tradecraft National level liaison experience with both the US Intelligence and LE community Experience applying CI analysis, operational and collection tradecrafts to threats associated with cleared industry and or the National Industrial Security Program (NISP) In-depth knowledge and understanding of the labor category activities required to meet mission requirements Mastery of qualitative and quantitative analytic methodologies and pursues developments in academia or other fields that affect tradecraft methodology Ability to define comprehensive, new, or unique research approaches that enable rigorous assessments to address and contribute to high-level tasks In-depth analysis of analytic operations and knowledge management issues across organizational and intra-IC boundaries and clearly articulates key findings Ability to work independently and with minimal oversight Ability to review analytic products for cogent arguments, tradecraft standards, and adequate support for conclusions; routinely tests analytic rigor of products Preferred: Bachelor's Degree in an area related to the labor category Graduate of in-residence Fundamentals of Intelligence Analysis course or Military Service equivalent PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. EEO is the Law Poster EEO is the Law Poster Supplement
General Dynamics Information Technology
Bossier City, Louisiana
Type of Requisition: Pipeline Clearance Level Must Currently Possess: Secret Clearance Level Must Be Able to Obtain: Secret Suitability: No Suitability Required Public Trust/Other Required: Job Family: Information Security Job Description: GDIT's Early Career Program is designed with you in mind! Our New Graduate Developmental Program is for individuals that have graduated from an accredited college or university within the last 12 months. The program allows new graduates the opportunity to be a part of a collaborative team that is helping to solve our client's most complex issues. Throughout GDIT's 12-week developmental program, you will work on innovative projects that touch areas such as software development, data infrastructure, cybersecurity, networking, and IT support, and other related areas depending on your background and interest. As a participant in the New Grad Developmental Program, you will have real responsibilities and work alongside experienced and innovative industry professionals. GDIT's New Graduate Developmental Program work assignments and training will equip you with best in class skills. GDIT is seeking a Cyber Security Analyst Associate (New Grad DP) in (Bossier City, La). Profile The Cyber Security Analyst Associate (New Grad DP) will assist in integrating relationships between business units and central corporate functions to ensure success in meeting business and corporate goals and objectives. You will be a key member of a dynamic and versatile operations team. You must work with other analysts to understand business processes and promoting data integrity. You will have the opportunity to develop consulting skills, gather and research data, develop analysis as well as contribute to the creation of deliverables. Competencies Recommend improvements to existing systems and security controls. Develop and maintain Plan of Action and Milestones (POA&M) for all assigned programs Responsible for assisting in the development of information security documentation as well as security control implementation Responsible for providing status reports to management on a regular basis on the status of assigned security programs and/or assigned role responsibilities. Maintain a solid knowledge of current information security practices through regular training and research. Participate in knowledge sharing with co-workers to advance our security awareness program. Act as a consultant on all aspects of system and data security. Ability to manage parallel tasks and accurately document any issues and/or resolutions Experience working with customers in a fast paced environment Ability to work additional hours as needed based on assigned tasks Ability to communicate and work effectively with all levels in the Company Ability to manage projects across technical and functional disciplines Ability to manage and execute assigned projects, technical and functional disciplines and/or tasks within established timelines Ability to self-educate across a variety of IT security related subjects Possesses sound analytical problem-solving and documentation skills Knowledgeable of various information security/IA products such as: Splunk, Fortigate, Puppet,PKI, VPN, firewalls, and intrusion detection systems Familiarity with vulnerability scanning such as Nessus and ACAS Understanding of information systems and architectures Strong communication skills - written and oral Qualifications Must be recent college graduate Must have a degree in computer science or similar discipline Interim or Active DoD Secret Clearance Must currently have or currently pursuing a certification in the field of Cyber Security CompTIA Security+ Information Assurance Certified Ethical Hacker #earlytalent Scheduled Weekly Hours: 40 Travel Required: Less than 10% T elecommuting Options: Some Telecommuting Allowed Work Location: USA LA Bossier City Additional Work Locations: We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
10/02/2020
Full time
Type of Requisition: Pipeline Clearance Level Must Currently Possess: Secret Clearance Level Must Be Able to Obtain: Secret Suitability: No Suitability Required Public Trust/Other Required: Job Family: Information Security Job Description: GDIT's Early Career Program is designed with you in mind! Our New Graduate Developmental Program is for individuals that have graduated from an accredited college or university within the last 12 months. The program allows new graduates the opportunity to be a part of a collaborative team that is helping to solve our client's most complex issues. Throughout GDIT's 12-week developmental program, you will work on innovative projects that touch areas such as software development, data infrastructure, cybersecurity, networking, and IT support, and other related areas depending on your background and interest. As a participant in the New Grad Developmental Program, you will have real responsibilities and work alongside experienced and innovative industry professionals. GDIT's New Graduate Developmental Program work assignments and training will equip you with best in class skills. GDIT is seeking a Cyber Security Analyst Associate (New Grad DP) in (Bossier City, La). Profile The Cyber Security Analyst Associate (New Grad DP) will assist in integrating relationships between business units and central corporate functions to ensure success in meeting business and corporate goals and objectives. You will be a key member of a dynamic and versatile operations team. You must work with other analysts to understand business processes and promoting data integrity. You will have the opportunity to develop consulting skills, gather and research data, develop analysis as well as contribute to the creation of deliverables. Competencies Recommend improvements to existing systems and security controls. Develop and maintain Plan of Action and Milestones (POA&M) for all assigned programs Responsible for assisting in the development of information security documentation as well as security control implementation Responsible for providing status reports to management on a regular basis on the status of assigned security programs and/or assigned role responsibilities. Maintain a solid knowledge of current information security practices through regular training and research. Participate in knowledge sharing with co-workers to advance our security awareness program. Act as a consultant on all aspects of system and data security. Ability to manage parallel tasks and accurately document any issues and/or resolutions Experience working with customers in a fast paced environment Ability to work additional hours as needed based on assigned tasks Ability to communicate and work effectively with all levels in the Company Ability to manage projects across technical and functional disciplines Ability to manage and execute assigned projects, technical and functional disciplines and/or tasks within established timelines Ability to self-educate across a variety of IT security related subjects Possesses sound analytical problem-solving and documentation skills Knowledgeable of various information security/IA products such as: Splunk, Fortigate, Puppet,PKI, VPN, firewalls, and intrusion detection systems Familiarity with vulnerability scanning such as Nessus and ACAS Understanding of information systems and architectures Strong communication skills - written and oral Qualifications Must be recent college graduate Must have a degree in computer science or similar discipline Interim or Active DoD Secret Clearance Must currently have or currently pursuing a certification in the field of Cyber Security CompTIA Security+ Information Assurance Certified Ethical Hacker #earlytalent Scheduled Weekly Hours: 40 Travel Required: Less than 10% T elecommuting Options: Some Telecommuting Allowed Work Location: USA LA Bossier City Additional Work Locations: We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
General Dynamics Information Technology
Bossier City, Louisiana
Type of Requisition: Regular Clearance Level Must Currently Possess: None Clearance Level Must Be Able to Obtain: None Suitability: No Suitability Required Public Trust/Other Required: Other Job Family: Cyber Security Job Description: •Works with System Administrators using Remote Access Software to deploy software based security solutions in a variety of Enterprise Environments (Endpoint Antivirus/Firewall). •Trains System Administrators on security solutions and provides security focused best practice recommendations. •Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration and testing issues. •Ensures system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis. •May interface with external entities including law enforcement, intelligence and other government organizations and agencies. •Collaborate with stakeholders on current and new projects to address operational scalability, redundancy, efficiency, and time to market. Required: Bachelors plus 5 years or more or relative experience in progressive Information Technology (IT) experience, including at least 3 yrs experience working across the Windows enterprise platforms from concept to implementation, such as Windows Servers, Windows 7 desktops, AD, etc. Microsoft Active Directory Group Policy Enterprise Software Deployment Projects (COTS products) Endpoint Antivirus and Firewall Experience System Documentation (SOP documents, COOP documents, System Diagrams, Work Instructions, SSP documentation, etc.) #MoveToTheOtherLA Scheduled Weekly Hours: 40 Travel Required: None T elecommuting Options: Some Telecommuting Allowed Work Location: USA LA Bossier City Additional Work Locations: We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
10/02/2020
Full time
Type of Requisition: Regular Clearance Level Must Currently Possess: None Clearance Level Must Be Able to Obtain: None Suitability: No Suitability Required Public Trust/Other Required: Other Job Family: Cyber Security Job Description: •Works with System Administrators using Remote Access Software to deploy software based security solutions in a variety of Enterprise Environments (Endpoint Antivirus/Firewall). •Trains System Administrators on security solutions and provides security focused best practice recommendations. •Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration and testing issues. •Ensures system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis. •May interface with external entities including law enforcement, intelligence and other government organizations and agencies. •Collaborate with stakeholders on current and new projects to address operational scalability, redundancy, efficiency, and time to market. Required: Bachelors plus 5 years or more or relative experience in progressive Information Technology (IT) experience, including at least 3 yrs experience working across the Windows enterprise platforms from concept to implementation, such as Windows Servers, Windows 7 desktops, AD, etc. Microsoft Active Directory Group Policy Enterprise Software Deployment Projects (COTS products) Endpoint Antivirus and Firewall Experience System Documentation (SOP documents, COOP documents, System Diagrams, Work Instructions, SSP documentation, etc.) #MoveToTheOtherLA Scheduled Weekly Hours: 40 Travel Required: None T elecommuting Options: Some Telecommuting Allowed Work Location: USA LA Bossier City Additional Work Locations: We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
DSA recognizes that the global spread of COVID-19 is a challenging time for everyone. Our #1 priority is the health and safety of our workforce, guests and candidates, and we provide the necessary supplies to maintain safety in the work place. Due to the current situation surrounding COVID-19, our response time and scheduling of interviews may increase. DSA islooking to fill various positions despite the COVID-19 and are managing our workforce within the compliance of all state requirements. Data Systems Analysts, Inc. is searching for a n Integrated Logistics Support Specialist. The successful candidate will be part of a global team procuring and installing leading-edge technologies including Command, Control, Communications, Computers and Intelligence (C4I) systems; computer and communication networks; network convergence; cloud computing; cyber security compliance; visual displays; product tools; product architecture; modeling; electro-optics; transport; radio frequency devices; control systems; and instrumentation equipment. Duties may include: - Assisting with personnel and equipment (IT equipment, files, etc.) relocations as needed. - Coordinating and conducting turn-in of obsolete equipment with Installation Property Book Officer, as required. - Processing supply requests and maintaining accountability of supplies for regional Directorates as required. - Conducting market research for source of supplies and coordinate procurement, as required. - Prepare and process request for funding to support supplies requests, as required. - Ship organizational supplies and equipment to regional directorates, as required. - Assist with providing and maintaining logistics data for the Management Internal Controls Program checklist. - Maintain signature cards for all support activities. - Manage office space, physical security, key control, and PMO property. Requirements include: - Minimum of 4 years Army Logistics Experience. - Excellent oral and written communication skills required. - Strong client interaction skills and a demonstrated ability to work with various stakeholders across multiple tasks required. - Highly organized, systematic and proactive in managing quality and exceeding client expectations within a fast-paced environment. - Bachelor's Degree in the fields of information technology, logistics, supply chain management, transportation, operations, or systems engineering. MUST HAVE AN ACTIVE DOD CLEARANCE ; this will be verified prior to interview. Therefore, ====s can be considered for this position. Founded in 1963, Data Systems Analysts, Inc. (DSA) has been providing Defense and Federal Government customers' business-driven Information Technology and consulting solutions and services for more than 50 years. DSA's people excel in helping our customers achieve sensitive, mission-critical business goals and objectives. DSA is a 100 percent employee-owned company: every employee has a stake in the success of our company and our customers. Our culture embracestraining and development opportunities that include leadership programs, employee networks, continued education, and much more. We recognize that building expertise in your profession benefits everyone, and our leadership training programs help employees better manage their projects, inspire coworkers and customers to action, and reinforce DSA's guiding principles since 1963. We also value the unique combination of skills, abilities, aspirations, and backgrounds of every individual our diversity makes us stronger. We are 100 percent employee-owned through an Employee Stock Ownership Plan (ESOP).DSAemployees receive customizable benefits that are highly competitive in each local market that include a Vanguard 401K. DSA provides equal employment opportunity for employees and applicants without regard to an individual's protected status; race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/parental status, pregnancy/childbirth or related condition, religion, creed, age, disability, genetic information, veteran status, or any other protected status. DSA will provide necessary reasonable accommodation to ensure that an individual with a disability who is not able to fully utilize DSA's online job application system is provided with equal opportunity to apply and be considered for all jobs. If you need an accommodation to complete the application process, please email or call #dsa209 - provided by Dice
10/02/2020
Full time
DSA recognizes that the global spread of COVID-19 is a challenging time for everyone. Our #1 priority is the health and safety of our workforce, guests and candidates, and we provide the necessary supplies to maintain safety in the work place. Due to the current situation surrounding COVID-19, our response time and scheduling of interviews may increase. DSA islooking to fill various positions despite the COVID-19 and are managing our workforce within the compliance of all state requirements. Data Systems Analysts, Inc. is searching for a n Integrated Logistics Support Specialist. The successful candidate will be part of a global team procuring and installing leading-edge technologies including Command, Control, Communications, Computers and Intelligence (C4I) systems; computer and communication networks; network convergence; cloud computing; cyber security compliance; visual displays; product tools; product architecture; modeling; electro-optics; transport; radio frequency devices; control systems; and instrumentation equipment. Duties may include: - Assisting with personnel and equipment (IT equipment, files, etc.) relocations as needed. - Coordinating and conducting turn-in of obsolete equipment with Installation Property Book Officer, as required. - Processing supply requests and maintaining accountability of supplies for regional Directorates as required. - Conducting market research for source of supplies and coordinate procurement, as required. - Prepare and process request for funding to support supplies requests, as required. - Ship organizational supplies and equipment to regional directorates, as required. - Assist with providing and maintaining logistics data for the Management Internal Controls Program checklist. - Maintain signature cards for all support activities. - Manage office space, physical security, key control, and PMO property. Requirements include: - Minimum of 4 years Army Logistics Experience. - Excellent oral and written communication skills required. - Strong client interaction skills and a demonstrated ability to work with various stakeholders across multiple tasks required. - Highly organized, systematic and proactive in managing quality and exceeding client expectations within a fast-paced environment. - Bachelor's Degree in the fields of information technology, logistics, supply chain management, transportation, operations, or systems engineering. MUST HAVE AN ACTIVE DOD CLEARANCE ; this will be verified prior to interview. Therefore, ====s can be considered for this position. Founded in 1963, Data Systems Analysts, Inc. (DSA) has been providing Defense and Federal Government customers' business-driven Information Technology and consulting solutions and services for more than 50 years. DSA's people excel in helping our customers achieve sensitive, mission-critical business goals and objectives. DSA is a 100 percent employee-owned company: every employee has a stake in the success of our company and our customers. Our culture embracestraining and development opportunities that include leadership programs, employee networks, continued education, and much more. We recognize that building expertise in your profession benefits everyone, and our leadership training programs help employees better manage their projects, inspire coworkers and customers to action, and reinforce DSA's guiding principles since 1963. We also value the unique combination of skills, abilities, aspirations, and backgrounds of every individual our diversity makes us stronger. We are 100 percent employee-owned through an Employee Stock Ownership Plan (ESOP).DSAemployees receive customizable benefits that are highly competitive in each local market that include a Vanguard 401K. DSA provides equal employment opportunity for employees and applicants without regard to an individual's protected status; race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/parental status, pregnancy/childbirth or related condition, religion, creed, age, disability, genetic information, veteran status, or any other protected status. DSA will provide necessary reasonable accommodation to ensure that an individual with a disability who is not able to fully utilize DSA's online job application system is provided with equal opportunity to apply and be considered for all jobs. If you need an accommodation to complete the application process, please email or call #dsa209 - provided by Dice
Description Job Description: More About the Role: Leidos is seeking Junior Accreditation Analysts to support cybersecurity authorization efforts for the Navy-Marine Corps Intranet (NMCI) portion of the NGEN-R Service Management, Integration, and Transport (SMIT) contract. Qualified candidates will support Security Assessment and Authorization activities compliant with DoD 8500.01 and NIST SP 800-53 Rev4 guidelines. The Leidos team will support the NGEN-R SMIT portfolio, the largest IT services program for the Navy, by delivering the core backbone of the NMCI; inclusive of cybersecurity services, network operations, service desk, and data transport. Ultimately, Leidos will support the Navy in unifying its shore-based networks and data management to improve capability and service. What You'll Get to Do: Support the A&A process for systems with hardware, software, and networking technologies requiring an Authority to Operate (ATO). Conduct independent assessments of all required security controls following RMF methods including interviews, examinations, and testing and prepare the assessment findings report. -Work with system owners to resolve findings and answer questions. Perform cybersecurity review and validation services for cybersecurity authorization deliverables and record results. Assist in managing the day-to-day activities of Cybersecurity Authorization including transition from current incumbent. Support the Risk Management Framework (RMF) process for cybersecurity using applicable tools. Attend and participate in required enterprise systems cybersecurity authorization meetings or teleconferences. You'll Bring These Qualifications: BS degree or equivalent experience and less than 2 years prior relevant experience or High School Diploma or General Equivalency Diploma (GED) and a minimum of 2 years of experience. US ====and DoD Secret Clearance. Hands-on experience with a variety of cybersecurity tools. Hands-on experience in working with DoD networks, including NIPR, SIPR, and PPSN. Experience in FISMA and other information assurance assurance-related compliance reporting. Ability to multi-task in a dynamic, fast-paced environment. Strong analytical, communication and troubleshooting skills that enable proactive and effective collaboration with a virtual team, including the ability to clearly articulate status and present to both customers and program leadership. Technical knowledge and skills in one of the following areas: cybersecurity assessment, vulnerability scanning, integration and testing, data analytics or security operations. Hold an active security certification that meets DOD 8570 IAT level II/IAM level II (as required by environment) or higher, such as Security+ CE or Information Technology Infrastructure Library (ITIL). Current holds is able to obtain a Marine Corps Validator certificate. These Qualifications Would be Nice to Have: Knowledge of cybersecurity assessment and authorization (A&A) and associated processes, procedures, and activities in accordance with DoDI 8500.01, DoDI 8551.01, and other applicable NIST instructions, guidelines. Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities, and preparing System Security Plans. Hands-On experience with tools such as Remedy, Assured Compliance Assessment Solution (ACAS), RSA Archer Enterprise Risk, Governance & Compliance (eGRC) system. Exceptional communication abilities, both verbal and written, including business writing on complex topics. Proven ability to work with other managers of other service support models and supporting teams. Willing to perform shift work. Technical understanding of supporting security initiatives, conducting security monitoring, reporting and maintaining security compliance following security regulations and policies. Motivated self-starter with ability to lead and work in a matrix organization and communicate effectively with peers, subordinates and program leadership. External Referral Bonus: Ineligible Potential for Telework: Yes Clearance Level Required: Secret Travel: Yes, 10% of the time Scheduled Weekly Hours: 40 Shift: Day Requisition Category: Professional Job Family: Cyber Security Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10.19 billion for the fiscal year ended December 28, 2018. For more information, visit . Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here . Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to . All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. - provided by Dice
09/28/2020
Full time
Description Job Description: More About the Role: Leidos is seeking Junior Accreditation Analysts to support cybersecurity authorization efforts for the Navy-Marine Corps Intranet (NMCI) portion of the NGEN-R Service Management, Integration, and Transport (SMIT) contract. Qualified candidates will support Security Assessment and Authorization activities compliant with DoD 8500.01 and NIST SP 800-53 Rev4 guidelines. The Leidos team will support the NGEN-R SMIT portfolio, the largest IT services program for the Navy, by delivering the core backbone of the NMCI; inclusive of cybersecurity services, network operations, service desk, and data transport. Ultimately, Leidos will support the Navy in unifying its shore-based networks and data management to improve capability and service. What You'll Get to Do: Support the A&A process for systems with hardware, software, and networking technologies requiring an Authority to Operate (ATO). Conduct independent assessments of all required security controls following RMF methods including interviews, examinations, and testing and prepare the assessment findings report. -Work with system owners to resolve findings and answer questions. Perform cybersecurity review and validation services for cybersecurity authorization deliverables and record results. Assist in managing the day-to-day activities of Cybersecurity Authorization including transition from current incumbent. Support the Risk Management Framework (RMF) process for cybersecurity using applicable tools. Attend and participate in required enterprise systems cybersecurity authorization meetings or teleconferences. You'll Bring These Qualifications: BS degree or equivalent experience and less than 2 years prior relevant experience or High School Diploma or General Equivalency Diploma (GED) and a minimum of 2 years of experience. US ====and DoD Secret Clearance. Hands-on experience with a variety of cybersecurity tools. Hands-on experience in working with DoD networks, including NIPR, SIPR, and PPSN. Experience in FISMA and other information assurance assurance-related compliance reporting. Ability to multi-task in a dynamic, fast-paced environment. Strong analytical, communication and troubleshooting skills that enable proactive and effective collaboration with a virtual team, including the ability to clearly articulate status and present to both customers and program leadership. Technical knowledge and skills in one of the following areas: cybersecurity assessment, vulnerability scanning, integration and testing, data analytics or security operations. Hold an active security certification that meets DOD 8570 IAT level II/IAM level II (as required by environment) or higher, such as Security+ CE or Information Technology Infrastructure Library (ITIL). Current holds is able to obtain a Marine Corps Validator certificate. These Qualifications Would be Nice to Have: Knowledge of cybersecurity assessment and authorization (A&A) and associated processes, procedures, and activities in accordance with DoDI 8500.01, DoDI 8551.01, and other applicable NIST instructions, guidelines. Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities, and preparing System Security Plans. Hands-On experience with tools such as Remedy, Assured Compliance Assessment Solution (ACAS), RSA Archer Enterprise Risk, Governance & Compliance (eGRC) system. Exceptional communication abilities, both verbal and written, including business writing on complex topics. Proven ability to work with other managers of other service support models and supporting teams. Willing to perform shift work. Technical understanding of supporting security initiatives, conducting security monitoring, reporting and maintaining security compliance following security regulations and policies. Motivated self-starter with ability to lead and work in a matrix organization and communicate effectively with peers, subordinates and program leadership. External Referral Bonus: Ineligible Potential for Telework: Yes Clearance Level Required: Secret Travel: Yes, 10% of the time Scheduled Weekly Hours: 40 Shift: Day Requisition Category: Professional Job Family: Cyber Security Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10.19 billion for the fiscal year ended December 28, 2018. For more information, visit . Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here . Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to . All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. - provided by Dice