10,374 Cybersecurity Experts jobs in the United States

Cyber Defense - Cybersecurity Engineer (REMOTE)

20022 Washington, District Of Columbia Koniag Government Services

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Defense - Cybersecurity Engineer (REMOTE)

Washington, DC, USA

Req #624

Wednesday, July 2, 2025

Koniag Data Solutions , a Koniag Government Services company, is seeking a Cyber Defense - Cybersecurity Engineer to support KDS and our government customer in Alexandria, VA. This is a Remote opportunity.

We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more.

Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions.

Essential Functions, Responsibilities & Duties may include but are not limited to:

The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include:

  • Design and implement security solutions and architectures

  • Configure and maintain security tools and technologies

  • Support incident response and security operations

  • Perform security monitoring and analysis

  • Implement security controls and countermeasures

  • Conduct vulnerability assessments and penetration testing

  • Deploy and maintain security information and event management (SIEM) systems

  • Develop and implement security automation solutions

  • Support threat hunting activities

  • Perform security tool integration and optimization

  • Document security procedures and configurations

  • Participate in incident response activities

  • Support continuous monitoring programs

  • Assist in security architecture reviews

  • Implement security hardening measures

Education and Experience:

Required:

  • Bachelor's degree in Cybersecurity, Computer Science, or related field

  • 5+ years of experience in cybersecurity engineering

  • Current security certifications (Security+, CISSP, or equivalent)

  • Experience with security tools and technologies

  • Experience in government cybersecurity operations

Required Skills and Competencies:

  • Strong knowledge of security engineering principles

  • Experience with SIEM platforms and security tools (e.g., Splunk)

  • Proficiency in network security and protocols

  • Knowledge of system hardening techniques

  • Experience with security automation tools

  • Understanding of threat detection methodologies

  • Proficiency in scripting languages (Python, PowerShell)

  • Knowledge of cloud security technologies

  • Experience with vulnerability management tools

  • Understanding of incident response procedures

  • Knowledge of security frameworks and controls

  • Strong analytical and problem-solving skills

  • Excellent technical documentation abilities

  • Good communication skills

Desired Skills and Competencies:

  • Advanced security certifications (OSCP, GCIH)

  • Experience with classified systems

  • Knowledge of DevSecOps practices

  • Expertise in cloud security platforms

  • Experience with threat hunting tools

  • Knowledge of malware analysis

  • Familiarity with digital forensics

  • Experience with security orchestration

  • Knowledge of zero trust architectures

  • Experience with container security

  • Understanding of AI/ML in security

  • Knowledge of reverse engineering

  • Experience with red team tools

  • Familiarity with threat intelligence platforms

  • Knowledge of compliance frameworks

Our Equal Employment Opportunity Policy

The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment.

The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (email protected) or by calling to request accommodations.

Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit .

Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352

Other details

  • Job Family IT, Cyber Security, Network Systems

  • Job Function Cyber Security Architect/Engineer

  • Pay Type Salary

  • Washington, DC, USA

<

View Now

Cyber Defense - Cybersecurity Engineer (REMOTE)

20022 Washington, District Of Columbia Koniag

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Koniag Data Solutions , a Koniag Government Services company, is seeking a Cyber Defense - Cybersecurity Engineer to support KDS and our government customer in Alexandria, VA. This is a Remote opportunity.

We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more.

Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions.

Essential Functions, Responsibilities & Duties may include but are not limited to:
The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include:
  • Design and implement security solutions and architectures
  • Configure and maintain security tools and technologies
  • Support incident response and security operations
  • Perform security monitoring and analysis
  • Implement security controls and countermeasures
  • Conduct vulnerability assessments and penetration testing
  • Deploy and maintain security information and event management (SIEM) systems
  • Develop and implement security automation solutions
  • Support threat hunting activities
  • Perform security tool integration and optimization
  • Document security procedures and configurations
  • Participate in incident response activities
  • Support continuous monitoring programs
  • Assist in security architecture reviews
  • Implement security hardening measures
Education and Experience:
Required:
  • Bachelor's degree in Cybersecurity, Computer Science, or related field
  • 5+ years of experience in cybersecurity engineering
  • Current security certifications (Security+, CISSP, or equivalent)
  • Experience with security tools and technologies
  • Experience in government cybersecurity operations
Required Skills and Competencies:
  • Strong knowledge of security engineering principles
  • Experience with SIEM platforms and security tools (e.g., Splunk)
  • Proficiency in network security and protocols
  • Knowledge of system hardening techniques
  • Experience with security automation tools
  • Understanding of threat detection methodologies
  • Proficiency in scripting languages (Python, PowerShell)
  • Knowledge of cloud security technologies
  • Experience with vulnerability management tools
  • Understanding of incident response procedures
  • Knowledge of security frameworks and controls
  • Strong analytical and problem-solving skills
  • Excellent technical documentation abilities
  • Good communication skills
Desired Skills and Competencies:
  • Advanced security certifications (OSCP, GCIH)
  • Experience with classified systems
  • Knowledge of DevSecOps practices
  • Expertise in cloud security platforms
  • Experience with threat hunting tools
  • Knowledge of malware analysis
  • Familiarity with digital forensics
  • Experience with security orchestration
  • Knowledge of zero trust architectures
  • Experience with container security
  • Understanding of AI/ML in security
  • Knowledge of reverse engineering
  • Experience with red team tools
  • Familiarity with threat intelligence platforms
  • Knowledge of compliance frameworks
Our Equal Employment Opportunity Policy
The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment.

The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (email protected) or by calling to request accommodations.

Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit
Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352

Other details
  • Job Family IT, Cyber Security, Network Systems
  • Job Function Cyber Security Architect/Engineer
  • Pay Type Salary


Apply Now
View Now

Cyber Defense - Cybersecurity Engineer (REMOTE)

20022 Washington, District Of Columbia Koniag Information Security Services, LLC

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Cyber Defense – Cybersecurity Engineer (REMOTE) Washington, DC, USA Req #624 Wednesday, July 2, 2025 Koniag Data Solutions , a Koniag Government Services company, is seeking a Cyber Defense – Cybersecurity Engineer to support KDS and our government customer in Alexandria, VA. This is a Remote opportunity. We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more. Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions. Essential Functions, Responsibilities & Duties may include but are not limited to: The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include: Design and implement security solutions and architectures Configure and maintain security tools and technologies Support incident response and security operations Perform security monitoring and analysis Implement security controls and countermeasures Conduct vulnerability assessments and penetration testing Deploy and maintain security information and event management (SIEM) systems Develop and implement security automation solutions Support threat hunting activities Perform security tool integration and optimization Document security procedures and configurations Participate in incident response activities Assist in security architecture reviews Implement security hardening measures Education and Experience: Required: Bachelor's degree in Cybersecurity, Computer Science, or related field 5+ years of experience in cybersecurity engineering Current security certifications (Security+, CISSP, or equivalent) Experience with security tools and technologies Experience in government cybersecurity operations Required Skills and Competencies: Strong knowledge of security engineering principles Experience with SIEM platforms and security tools (e.g., Splunk) Proficiency in network security and protocols Knowledge of system hardening techniques Experience with security automation tools Understanding of threat detection methodologies Proficiency in scripting languages (Python, PowerShell) Knowledge of cloud security technologies Experience with vulnerability management tools Understanding of incident response procedures Knowledge of security frameworks and controls Strong analytical and problem-solving skills Excellent technical documentation abilities Desired Skills and Competencies: Advanced security certifications (OSCP, GCIH) Experience with classified systems Knowledge of DevSecOps practices Expertise in cloud security platforms Experience with threat hunting tools Knowledge of malware analysis Familiarity with digital forensics Experience with security orchestration Knowledge of zero trust architectures Experience with container security Understanding of AI/ML in security Knowledge of reverse engineering Experience with red team tools Familiarity with threat intelligence platforms Knowledge of compliance frameworks Our Equal Employment Opportunity Policy The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment. The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (emailprotected) or by calling to request accommodations. Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit . Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352 Job Family IT, Cyber Security, Network Systems Job Function Cyber Security Architect/Engineer #J-18808-Ljbffr

View Now

Cyber Defense - Cybersecurity Engineer (REMOTE)

20080 Washington, District Of Columbia Koniag Government Services

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Defense - Cybersecurity Engineer (REMOTE) Washington, DC, USA Req #624 Wednesday, July 2, 2025 **Koniag Data Solutions** , a Koniag Government Services company, is seeking a Cyber Defense - Cybersecurity Engineer to support **KDS** and our government customer in Alexandria, VA. **This is a Remote opportunity.** We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more. Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions. **Essential Functions, Responsibilities & Duties may include but are not limited to:** The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include: + Design and implement security solutions and architectures + Configure and maintain security tools and technologies + Support incident response and security operations + Perform security monitoring and analysis + Implement security controls and countermeasures + Conduct vulnerability assessments and penetration testing + Deploy and maintain security information and event management (SIEM) systems + Develop and implement security automation solutions + Support threat hunting activities + Perform security tool integration and optimization + Document security procedures and configurations + Participate in incident response activities + Support continuous monitoring programs + Assist in security architecture reviews + Implement security hardening measures **Education and Experience:** **Required:** + Bachelor's degree in Cybersecurity, Computer Science, or related field + 5+ years of experience in cybersecurity engineering + Current security certifications (Security+, CISSP, or equivalent) + Experience with security tools and technologies + Experience in government cybersecurity operations **Required Skills and Competencies:** + Strong knowledge of security engineering principles + Experience with SIEM platforms and security tools (e.g., Splunk) + Proficiency in network security and protocols + Knowledge of system hardening techniques + Experience with security automation tools + Understanding of threat detection methodologies + Proficiency in scripting languages (Python, PowerShell) + Knowledge of cloud security technologies + Experience with vulnerability management tools + Understanding of incident response procedures + Knowledge of security frameworks and controls + Strong analytical and problem-solving skills + Excellent technical documentation abilities + Good communication skills **Desired Skills and Competencies:** + Advanced security certifications (OSCP, GCIH) + Experience with classified systems + Knowledge of DevSecOps practices + Expertise in cloud security platforms + Experience with threat hunting tools + Knowledge of malware analysis + Familiarity with digital forensics + Experience with security orchestration + Knowledge of zero trust architectures + Experience with container security + Understanding of AI/ML in security + Knowledge of reverse engineering + Experience with red team tools + Familiarity with threat intelligence platforms + Knowledge of compliance frameworks **Our Equal Employment Opportunity Policy** The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment. The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (email protected) or by calling to request accommodations. _Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit_ _ _._ **_Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352_** **Other details** + Job Family IT, Cyber Security, Network Systems + Job Function Cyber Security Architect/Engineer + Pay Type Salary + Washington, DC, USA <
View Now

CI Cyber Threat Analysis

22161 Springfield, Virginia Parsons Company

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

In a world of possibilities, pursue one with endless opportunities. Imagine Next!

When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.

Job Description:

Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team!

Overall Assignment Description: To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.

Duties may include:

  • Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:

  • Threat data collected and reported by NGA Cyber CI team and network security personnel.

  • Intelligence reported by the Intelligence Community.

  • Fusion of all source threat analysis derived from multiple intelligence sources (INTS).

  • Imagery when available.

  • Information that can be used to inform cyber security decisions.

  • Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:

  • Compilation of data collected and reported in weekly products.

  • Intelligence reported by the Intelligence Community.

  • Fused All Source threat analysis derived from multiple INT's.

  • Imagery when available.

  • Depiction of cyber threat (s) to NGA to inform cyber security decision makers.

  • Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:

  • Compilation of data collected and reported in weekly and monthly products.

  • Intelligence reported by the Intelligence Community.

  • Fused all source threat analysis derived from multiple INT's.

  • Include imagery when available.

  • Depiction of cyber threat (s) to NGA to inform cyber security decisions.

  • Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:

  • Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.

  • Raw and finished Intelligence reported by the Intelligence Community.

  • Fused all source threat analysis derived from multiple INT's.

  • Include imagery when available.

  • Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.

  • Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:

  • Coordination with teammates and NGA cyber security to ensure accuracy of reported information.

  • Cross referencing local information reporting with Intelligence Community reporting.

  • Clear and concise writing to briefly convey threat.

  • Responsiveness to Intelligence Community priority collections requirements.

  • Timeliness.

  • Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).

  • Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.

  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.

  • Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.

  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.

  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.

  • Demonstrate current subject matter expertise on cyber issues, threats and trends.

  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.

  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.

  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.

Skills and Experience:

Required:

  • Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.

  • 5+ years of related CI cyber analytic or CI cyber investigations experience.

  • Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).

Desired:

  • Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.

Security Clearance Requirement:

An active Top Secret security clearance is required for this position?

This position is part of our Federal Solutions team.

The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.

We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!

Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.

We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!

Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .

About Us

Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.

Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.

For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.

View Now

CI Cyber Threat Analysis

22161 Springfield, Virginia ClearanceJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

CI Cyber Threat Analysis

In a world of possibilities, pursue one with endless opportunities. Imagine Next! When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for. Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team! To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.

Duties may include:

  • Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
    • Threat data collected and reported by NGA Cyber CI team and network security personnel.
    • Intelligence reported by the Intelligence Community.
    • Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
    • Imagery when available.
    • Information that can be used to inform cyber security decisions.
  • Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    • Compilation of data collected and reported in weekly products.
    • Intelligence reported by the Intelligence Community.
    • Fused All Source threat analysis derived from multiple INT's.
    • Imagery when available.
    • Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
  • Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    • Compilation of data collected and reported in weekly and monthly products.
    • Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INT's.
    • Include imagery when available.
    • Depiction of cyber threat (s) to NGA to inform cyber security decisions.
  • Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
    • Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
    • Raw and finished Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INT's.
    • Include imagery when available.
    • Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
  • Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
    • Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
    • Cross referencing local information reporting with Intelligence Community reporting.
    • Clear and concise writing to briefly convey threat.
    • Responsiveness to Intelligence Community priority collections requirements.
    • Timeliness.
  • Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
  • Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on cyber issues, threats and trends.
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.

Skills and Experience: Required:

  • Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
  • 5+ years of related CI cyber analytic or CI cyber investigations experience.
  • Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).

Desired:

  • Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.

Security Clearance Requirement: An active Top Secret security clearance is required for this position.

This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY! Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to

View Now

CI Cyber Threat Analysis

22161 Springfield, Virginia Parsons Company

Posted today

Job Viewed

Tap Again To Close

Job Description

CI Cyber Threat Analysis

Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team!

Overall Assignment Description: To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.

Duties may include:

  • Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
    • Threat data collected and reported by NGA Cyber CI team and network security personnel.
    • Intelligence reported by the Intelligence Community.
    • Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
    • Imagery when available.
    • Information that can be used to inform cyber security decisions.
  • Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    • Compilation of data collected and reported in weekly products.
    • Intelligence reported by the Intelligence Community.
    • Fused All Source threat analysis derived from multiple INT's.
    • Imagery when available.
    • Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
  • Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    • Compilation of data collected and reported in weekly and monthly products.
    • Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INT's.
    • Include imagery when available.
    • Depiction of cyber threat (s) to NGA to inform cyber security decisions.
  • Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
    • Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
    • Raw and finished Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INT's.
    • Include imagery when available.
    • Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
  • Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
    • Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
    • Cross referencing local information reporting with Intelligence Community reporting.
    • Clear and concise writing to briefly convey threat.
    • Responsiveness to Intelligence Community priority collections requirements.
    • Timeliness.
  • Perform inquiries of anomalous activity using cyber or related automated investigative tools.
  • Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on cyber issues, threats and trends.
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.

Skills and Experience:

Required:

  • Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
  • 5+ years of related CI cyber analytic or CI cyber investigations experience.
  • Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).

Desired:

  • Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.

Security Clearance Requirement: An active Top Secret security clearance is required for this position.

This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons questAPPLY TODAY!

View Now
Be The First To Know

About the latest Cybersecurity experts Jobs in United States !

CI Cyber Threat Analysis

22151 Springfield, Virginia Parsons Corporation

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

In a world of possibilities, pursue one with endless opportunities. Imagine Next!
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
**Job Description:**
Parsons is looking for an amazingly talented **CI Cyber Threat Analysis** to join our team!
**Overall Assignment Description:** To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
**Duties may include:**
+ Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
+ Threat data collected and reported by NGA Cyber CI team and network security personnel.
+ Intelligence reported by the Intelligence Community.
+ Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
+ Imagery when available.
+ Information that can be used to inform cyber security decisions.
+ Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly products.
+ Intelligence reported by the Intelligence Community.
+ Fused All Source threat analysis derived from multiple INT's.
+ Imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
+ Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly and monthly products.
+ Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decisions.
+ Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
+ Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
+ Raw and finished Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
+ Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
+ Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
+ Cross referencing local information reporting with Intelligence Community reporting.
+ Clear and concise writing to briefly convey threat.
+ Responsiveness to Intelligence Community priority collections requirements.
+ Timeliness.
+ Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
+ Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
+ Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
+ Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
+ Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
+ Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
+ Demonstrate current subject matter expertise on cyber issues, threats and trends.
+ Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
+ Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
+ Display an ability to collaborate with internal NGA and external IC/Cyber community members.
**Skills and Experience:**
**Required:**
+ Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
+ 5+ years of related CI cyber analytic or CI cyber investigations experience.
+ Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
**Desired:**
+ Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
**Security Clearance Requirement:**
An active Top Secret security clearance is required for this position?
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
View Now

Principal Cybersecurity Engineer - Cyber Defense (US Federal)

22107 McLean, Virginia Workday

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Your work days are brighter here.

At Workday, it all began with a conversation over breakfast. When our founders met at a sunny California diner, they came up with an idea to revolutionize the enterprise software market. And when we began to rise, one thing that really set us apart was our culture. A culture which was driven by our value of putting our people first. And ever since, the happiness, development, and contribution of every Workmate is central to who we are. Our Workmates believe a healthy employee-centric, collaborative culture is the essential mix of ingredients for success in business. That's why we look after our people, communities and the planet while still being profitable. Feel encouraged to shine, however that manifests: you don't need to hide who you are. You can feel the energy and the passion, it's what makes us unique. Inspired to make a brighter work day for all and transform with us to the next stage of our growth journey? Bring your brightest version of you and have a brighter work day here.

At Workday, we value our candidates' privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers.

Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not.

In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday.

About the Team
At Workday, we help the world's largest organizations adapt to what's next by bringing finance, HR, and planning into a single enterprise cloud. We work hard, and we're serious about what we do. But we like to have fun, too. We put people first, celebrate diversity, drive innovation, and do good in the communities where we live and work.

Workday's Cyber Defense team helps protect an ever-growing technology, global footprint. We are responsible for monitoring, detecting, and responding to threats to the company and keeping the trust of our customers. Functions like Security Response, Threat Intelligence, Detection Engineering, Secure Code Development and many others make up the fabric of who we are and what we do daily around the world. The National Security Group leads all cyber defense, personnel security, and security compliance functions for Defense and Intelligence Community Workday customer environments.

About the Role

This role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native).

Workday is expanding into the US Government air-gapped classified cloud environment. We are looking for a Principal Cybersecurity Engineer to help build out the team, technology, and processes to support cybersecurity in this new environment. You will be our Cyber Defense presence in the air-gapped network and will be part of a team responsible for all cybersecurity functions such as vulnerability management, incident response, threat hunting, and threat detection. You will work closely with the customers and with our Cyber Defense teams to ensure consistency across environments and develop best practices in this exciting environment.

About You

Basic Qualifications
  • This position requires a TS/SCI with CI polygraph security clearance. Applicants must already possess a valid and active TS/SCI with CI polygraph security clearance.
  • 10+ years of experience in Software Development or Devops within Cyber Security or Software Engineering or Public Cloud Platform Engineering.
  • 2+ years of hands-on technical leadership experience.
  • Experience deploying, monitoring, and managing systems in the AWS or Microsoft Top Secret clouds.
  • BS or MS degree in Computer Science, Engineering, or equivalent job experience.
Other Qualifications
  • Strong understanding of platform, application, and cloud security fundamentals.
  • Familiarity with containerized applications and their security considerations
  • Demonstrated knowledge of adversary TTPs (Tactics, Techniques and Procedures).
  • Deep understanding of network and application security threats, attack techniques, and mitigation options.
  • Experience managing vulnerability scans and effectively prioritizing actions for system owners.
  • Experience building and maintaining investigation and/or response tools.
  • Experience with SIEM and SOAR security technologies and solutions.
  • Experience with hunting techniques.
  • Able to work independently and coordinate activities across multiple teams.
  • Ability to drive multiple projects and priorities while managing operational responsibilities.
  • Excellent written and verbal communication skills, building positive relationships with partner organizations.


Workday Pay Transparency Statement

The annualized base salary ranges for the primary location and any additional locations are listed below. Workday pay ranges vary based on work location. As a part of the total compensation package, this role may be eligible for the Workday Bonus Plan or a role-specific commission/bonus, as well as annual refresh stock grants. Recruiters can share more detail during the hiring process. Each candidate's compensation offer will be based on multiple factors including, but not limited to, geography, experience, skills, job duties, and business need, among other things. For more information regarding Workday's comprehensive benefits, please click here.

Primary Location: USA.VA.McLean (Tyson's Corner)

Primary Location Base Pay Range: $182,300 USD - $73,400 USD

Additional US Location(s) Base Pay Range: 164,900 USD - 288,000 USD

Our Approach to Flexible Work

With Flex Work, we're combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter.

Pursuant to applicable Fair Chance law, Workday will consider for employment qualified applicants with arrest and conviction records.

Workday is an Equal Opportunity Employer including individuals with disabilities and protected veterans.

Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!
View Now

Principal Cybersecurity Engineer Cyber Defense (US Federal)

22107 McLean, Virginia Workday

Posted today

Job Viewed

Tap Again To Close

Job Description

Your Work Days Are Brighter Here

At Workday, it all began with a conversation over breakfast. When our founders met at a sunny California diner, they came up with an idea to revolutionize the enterprise software market. And when we began to rise, one thing that really set us apart was our culture. A culture which was driven by our value of putting our people first. And ever since, the happiness, development, and contribution of every Workmate is central to who we are. Our Workmates believe a healthy employee-centric, collaborative culture is the essential mix of ingredients for success in business. That's why we look after our people, communities and the planet while still being profitable. Feel encouraged to shine, however that manifests: you don't need to hide who you are. You can feel the energy and the passion, it's what makes us unique. Inspired to make a brighter work day for all and transform with us to the next stage of our growth journey? Bring your brightest version of you and have a brighter work day here.

About The Team

At Workday, we help the world's largest organizations adapt to what's next by bringing finance, HR, and planning into a single enterprise cloud. We work hard, and we're serious about what we do. But we like to have fun, too. We put people first, celebrate diversity, drive innovation, and do good in the communities where we live and work. Workday's Cyber Defense team helps protect an ever-growing technology, global footprint. We are responsible for monitoring, detecting, and responding to threats to the company and keeping the trust of our customers. Functions like Security Response, Threat Intelligence, Detection Engineering, Secure Code Development and many others make up the fabric of who we are and what we do daily around the world. The National Security Group leads all cyber defense, personnel security, and security compliance functions for Defense and Intelligence Community Workday customer environments.

About The Role

This role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native). Workday is expanding into the US Government air-gapped classified cloud environment. We are looking for a Principal Cybersecurity Engineer to help build out the team, technology, and processes to support cybersecurity in this new environment. You will be our Cyber Defense presence in the air-gapped network and will be part of a team responsible for all cybersecurity functions such as vulnerability management, incident response, threat hunting, and threat detection. You will work closely with the customers and with our Cyber Defense teams to ensure consistency across environments and develop best practices in this exciting environment.

About You Basic Qualifications
  • This position requires a TS/SCI with CI polygraph security clearance. Applicants must already possess a valid and active TS/SCI with CI polygraph security clearance.
  • 10+ years of experience in technical security consultancy, security operations, response, vulnerability management, threat detection, or threat hunting.
  • 2+ years of hands-on technical leadership experience.
  • Experience deploying, monitoring, and managing systems in the AWS or Microsoft Top Secret clouds.
  • BS or MS degree in Computer Science, Engineering, or equivalent job experience.
Other Qualifications
  • Strong understanding of platform, application, and cloud security fundamentals.
  • Familiarity with containerized applications and their security considerations
  • Demonstrated knowledge of adversary TTPs (Tactics, Techniques and Procedures).
  • Deep understanding of network and application security threats, attack techniques, and mitigation options.
  • Experience managing vulnerability scans and effectively prioritizing actions for system owners.
  • Experience building and maintaining investigation and/or response tools.
  • Experience with SIEM and SOAR security technologies and solutions.
  • Experience with hunting techniques.
  • Able to work independently and coordinate activities across multiple teams.
  • Ability to drive multiple projects and priorities while managing operational responsibilities.
  • Excellent written and verbal communication skills, building positive relationships with partner organizations.

Workday pay ranges vary based on work location. As a part of the total compensation package, this role may be eligible for the Workday Bonus Plan or a role-specific commission/bonus, as well as annual refresh stock grants. Recruiters can share more detail during the hiring process. Each candidate's compensation offer will be based on multiple factors including, but not limited to, geography, experience, skills, job duties, and business need, among other things. For more information regarding Workday's comprehensive benefits, please click here.

Primary Location: USA.VA.McLean (Tyson's Corner) Primary Location Base Pay Range: $180,600 USD - $71,000 USD Additional US Location(s) Base Pay Range: 163,400 USD - 282,000 USD

Our Approach to Flexible Work

With Flex Work, we're combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter.

Pursuant to applicable Fair Chance law, Workday will consider for employment qualified applicants with arrest and conviction records.

Workday is an Equal Opportunity Employer including individuals with disabilities and protected veterans.

Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Experts Jobs