238 Cybersecurity Experts jobs in Jacksonville
IT - Cybersecurity - Assoc. Cybersecurity Analyst
Posted 5 days ago
Job Viewed
Job Description
JOB SUMMARY
- The Associate Cybersecurity Risk Analyst aids in the development and implementation of a comprehensive information security program including defining security policies, processes, and standards.
- The Associate Cybersecurity Analyst performs risk assessments and define processes and standards to ensure that risk is managed efficiently and effectively.
• The essential functions listed represent the major duties of this role, additional duties may be assigned.
• Aids in the management of the Cyber Risk Management Lifecycle which includes the processing, analysis, and documentation of risks, findings, exceptions, and corrective action plans.
• Serves as a liaison with IT and business area partners to identify, understand, document, and advise on security requirements, impacts and risks.
• Analyzes, proposes, and implements solutions concerning residual risk, vulnerabilities, and other security exposures.
• Participates on IT/Security projects to ensure security issues are addressed through the project life cycle.
• Participates in initiatives to identify, select, and implement technical and security controls.
• Develop risk management policies, standards, and procedures. Advises on service level agreements and works to ensure that security controls are managed and maintained.
• Researches, evaluates, and recommends cybersecurity risk solutions including development of business cases for security investments.
• Serves as a liaison on audit-related initiatives managing relationships, collection of data, progression tracking, assessment, and remedial activities.
• Supports security architecture in the identification and analysis of project risk.
Required Work Experience:
• 3+ years related work experience
Required Education:
• High school diploma or GED
Additional Required Qualifications:
• Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response and identity and access management
• Knowledge of operating systems and security applications, as well as a working knowledge of basic network protocols and tools.
• Abilities including knowledge share, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.
• Ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.
• Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
• Ability to manage tasks independently and take ownership of responsibilities.
• Ability to learn from mistakes and apply constructive feedback to improve performance.
• Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.
• Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
• Ability to adapt to a rapidly changing environment.
• High critical thinking skills to evaluate alternatives and present solutions that are consistent with business objectives and strategy
Preferred Education:
Bachelor's degree
Additional Preferred Qualifications:
Security+ or GSEC certification or ability to obtain certifications within 180 days of hire date
Self Essential Competencies:
• Collaboratates
• Communicates Effectively
• Manages Complexity
• Pursues Self Development
• Solves Problems
IT - Cybersecurity - Assoc. Cybersecurity Analyst
Posted 1 day ago
Job Viewed
Job Description
Employer Industry: Cybersecurity Why consider this job opportunity: - Opportunity for career advancement and growth within the organization - Supportive and collaborative work environment - Chance to work on diverse IT/Security projects impacting the organization's security posture - Strong emphasis on professional development and learning - Engage with cutting-edge cybersecurity technologies and methodologies What to Expect (Job Responsibilities): - Aid in the management of the Cyber Risk Management Lifecycle, including processing and documenting risks and corrective actions - Serve as a liaison with IT and business partners to identify and advise on security requirements and risks - Analyze and implement solutions for residual risk, vulnerabilities, and security exposures - Develop risk management policies, standards, and procedures, ensuring compliance with security controls - Support security architecture by identifying and analyzing project risks What is Required (Qualifications): - Minimum of 3 years of related work experience - High school diploma or GED - Knowledge of information security principles, including risk assessment, threat management, and incident response - Strong communication skills to convey complex technical information clearly - Ability to manage tasks independently and build long-term relationships with stakeholders How to Stand Out (Preferred Qualifications): - Bachelor's degree in a related field - Security+ or GSEC certification or the ability to obtain certifications within 180 days of hire date #Cybersecurity #RiskManagement #ITSecurity #CareerOpportunity #ProfessionalDevelopment We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately. We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer. #J-18808-Ljbffr
Cybersecurity Engineer
Posted 3 days ago
Job Viewed
Job Description
Imagine One is currently seeking multiple candidates for "contingent" positions supporting the U.S. Navy. We are looking for Senior Cybersecurity Engineer III to provide research and engineering services for the U.S. Navy. Apply now and meet new goals as you pursue your passion in cybersecurity!
Experience Requirements:
-
Shall have a minimum of five (5) years of Cybersecurity experience in performing system hardening
-
Shall have demonstrated experience with performing STIG implementation
-
Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
-
Shall have demonstrated experience remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Educational Requirements:
Must possess one of the following:
-
Bachelor's degree
-
Certified Ethical Hacker (CEH) certification
-
CompTIA Security+ certification
-
One of the following training courses:
-
CYBR2100 Certified Ethical Hacker
-
CYBR1100 Network Traffic Analysis
-
CYBR2100 Certified Ethical Hacker
-
CYBR2400 Cyber Operator Training Course
-
CYBR4005 Comp Forensics Invest and Response
-
Intermediate Cyber Core (ICC)
-
NEC 742A Network Security Vulnerability Technician
-
NEC H08A Advanced Network Analyst
-
NEC H10A Basic Cyber Analyst/Operator
-
NETW 4001 Security Plus
Security Requirements:
-
U.S. Citizenship required
-
ACTIVE DoD Secret Clearance
-
Security investigation with an IT level-1 designation in Joint Personnel Adjudication System (JPAS) and/or Defense Information System for Security (DISS)
Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group medical, vision, and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing master's degree); employee training, development, and education programs; profit sharing; advancement opportunities; and much more!
ISO 9001:2015, ISO 2000-1:2018, ISO 27001:2013
CMMI Development and Services - Maturity Level 3
An Employee-Owned Business
EEO/Veterans/Disabled
Imagine One "Contingent" offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance).
Cybersecurity Analyst
Posted 4 days ago
Job Viewed
Job Description
Location: Remote
Duration: 6 Months with the possibility of extension
Job Summary
- The Cybersecurity Analyst develops and implements a comprehensive information security program including acting as product owner for security tools, assisting with definition of stories, prioritizing activities, verifying and approving final implementations, and working with partners and service providers to maintain momentum on projects.
- Working with partners and team members to ensure prioritization is understood and momentum continues.
- Lead prioritization calls.
- Define and document stories.
- Validate and approve final implementations.
- Research, evaluate and present Identity and Access improvements.
- Represent and ensure prioritization of Identity and Access concepts in processes and products with internal and external parties.
- Develop and maintain presentation material for stakeholders.
- Assists and supports the development of security architecture.
- Other duties as assigned.
- 5+ years related work experience
- Bachelor's degree in an IT related field or equivalent IT, IT Infrastructure and/or Cybersecurity work experience
- Identity and Access management toolset experience.
- Experience using Agile methodology
- Past experience provisioning access
- Ideal candidate will be forward thinker, able to decipher key details from meetings with various business groups and relay to appropriate teams.
- Could come from Business Analyst background that has transitioned to Cybersecurity or from Cybersecurity background to more of a a Business Analyst .
- A Certified Information Systems Security Professional (CISSP) certification (within 180 Days if converted to FTE)
- Knowledge of information security principles, prioritizing identity and access.
- Knowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts.
- Experience developing, documenting and maintaining security presentation material.
- In-depth knowledge of operating systems and security applications, as well as a working knowledge of basic network protocols and tools.
- Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.
- Ability to lead conversations in Identity and Access management processes and concepts.
- Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.
- Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
- Ability to manage tasks independently and take ownership of responsibilities
- Ability to learn from mistakes and apply constructive feedback to improve performance
- Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.
- Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
- Ability to adapt to a rapidly changing environment
- High critical thinking skills to evaluate alternatives and present solutions that are consistent with business objectives and strategy
- Identity and Access management toolset experience.
- Experience using Agile methodology
- Past experience provisioning access.
- Relevant security certifications.
Position is offered by a no fee agency.
Cybersecurity Engineer
Posted 4 days ago
Job Viewed
Job Description
- The Cybersecurity team develops and manages next generation solutions, systems and assets that support the business and its subsidiaries.
- Working in a collaborative, creative and fun environment, we offer technology professionals a wide range of opportunities to utilize and further develop their skills while helping people live healthier lives. Candidates will need to have fundamental hands-on experience with core infrastructure operating systems, host compliance, file integrity monitoring solutions, and advanced malware defensive technologies. Base knowledge of running IBM AIX, Red Hat Enterprise, MAC OSX and Windows Enterprise operating systems.
- Candidate will have experience with fast paced, incentivized business operations that need to be agile while adhering to diverse regulatory and security framework expectations.
- The essential functions listed represent the major duties of this role, additional duties may be assigned.
- Research, evaluation, validation and recommendation of technical security solutions while assisting with Build, Test, and Implementing for the enterprise and its subsidiaries
- Coordinates with product vendors and service providers supporting technical security capabilities and processes
- Manage system/application environment, configuration, policy and required operational activities on assigned technical security solutions
- Monitors, reports on, and enhances performance of assigned technical security solutions
- Provides security technology incident response and problem management. Troubleshoots software and/or hardware issues/failures on assigned technical security solutions. Resolves alerts and performs remediation activities as required for return-to-operation.
- Accountable for follow-up of all security work requests including collaborating with other IT areas to ensure timely completion/resolution and obtainment of appropriate approval levels.
- Supports escalations, known issues and out of cycle requests on multiple security solutions for the enterprise and its subsidiaries
- Supports the development and maintenance of operational documentation for technical security solutions (e.g. procedures, engineering diagrams, knowledgebase, etc.).
- Collects, analyzes, synthesizes and presents data on technical security solutions and processes to peers, leadership and business stakeholders
- Assists the migration, upgrade and disposal of complex security capabilities and evaluates risks and impacts
- Collaborates with other business areas to deliver on work group initiatives for the enterprise and its subsidiaries
- Assists with developing continuous testing and validation of product performance and gap analysis for continuous security hardening processes
- Assists execution and alignment to security reference architecture standards and published blueprints.
- Assists Disaster Recovery planning, design, implementation and exercises on security technology solutions
- Assists remediation actions as a result of threat and vulnerability assessments or audits
- Provide training to others on security capabilities, processes, procedures and operational task
- Basic knowledge of TCP/IP networking preferred
- Capacity to work independently and willingness to seek advice/assistance.
- Basic understanding of security concepts and controls for network, application, and operating systems.
- Ability to troubleshoot and investigate security related issues and having experience or knowledge with vulnerability and patch management.
- Strong technical, analytical, and administrative skills.
- Strong corporate work ethics.
- Strong Documentation and Review Skills to ensure "We say what we do and do what we say"
- Have strong problem-solving skills.
- Maintain a positive attitude.
- Are professionals and possess excellent interpersonal and written communication skills.
- Are passionate about technology.
- Have the desire and ability to learn new things fast.
- Strong Solutioning Skills to help facilitate new technology gaps
- Want to be part of an efficient and effective team.
- Display an ownership attitude and drive initiatives to completion.
- Are a team player that recognizes the bigger picture and understands the value of teamwork.
- 4+ years related work experience
- 2+ years in Cybersecurity
- 2+ years Information Technology Infrastructure
- Related Bachelor's degree or additional related equivalent work experience
- Cybersecurity Engineer Defense and Threat Operations: SSCP
- Cybersecurity Engineer Enterprise Cybersecurity Services: SSCP
- Exposure to Project Management methodologies like Waterfall, Agile, Lean or SAFe methodologies
Cybersecurity Analyst
Posted 4 days ago
Job Viewed
Job Description
ARC Group has an immediate opportunity for a Cybersecurity Analyst! This position is 100% remote working eastern time zone business hours. This is starting out as a contract position running through December 2025 with strong potential to extend longer or convert to FTE. This is a fantastic opportunity to join a well-respected organization offering tremendous career growth potential.
At ARC Group, we are committed to fostering a diverse and inclusive workplace where everyone feels valued and respected. We believe that diverse perspectives lead to better innovation and problem-solving. As an organization, we embrace diversity in all its forms and encourage individuals from underrepresented groups to apply.
100% REMOTE!
Reference# 18390-1
Candidates must currently have PERMANENT US work authorization. Sorry, but we are not considering any candidates from outside companies for this position (no C2C, 3rd party / brokering).
Ideal candidate will be forward thinker, able to decipher key details from meetings with various business groups and relay to appropriate teams.
JOB SUMMARY
The Cybersecurity Analyst develops and implements a comprehensive information security program including acting as product owner for security tools, assisting with definition of stories, prioritizing activities, verifying and approving final implementations, and working with partners and service providers to maintain momentum on projects.
Essential Functions
- Working with partners and team members to ensure prioritization is understood and momentum continues.
- Lead prioritization calls.
- Define and document stories.
- Validate and approve final implementations.
- Research, evaluate and present Identity and Access improvements.
- Represent and ensure prioritization of Identity and Access concepts in processes and products with internal and external parties.
- Develop and maintain presentation material for stakeholders.
- Assists and supports the development of security architecture.
- Other duties as assigned.
Required Work Experience
- 5+ years related work experience
- Bachelor's degree in an IT related field or equivalent IT, IT Infrastructure and/or Cybersecurity work experience
Required Licenses and Certifications
Licenses/Certification Details
A Certified Information Systems Security Professional (CISSP) certification (within 180 Days if converted to FTE)
Additional Required Qualifications:
- • Knowledge of information security principles, prioritizing identity and access.
- • Knowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts.
- • Experience developing, documenting and maintaining security presentation material.
- • In-depth knowledge of operating systems and security applications, as well as a working knowledge of basic network protocols and tools.
- • Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.
- • Ability to lead conversations in Identity and Access management processes and concepts.
- • Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.
- • Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.
- • Ability to manage tasks independently and take ownership of responsibilities
- • Ability to learn from mistakes and apply constructive feedback to improve performance
- • Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.
- • Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.
- • Ability to adapt to a rapidly changing environment
- • High critical thinking skills to evaluate alternatives and present solutions that are consistent with business objectives and strategy
Additional Preferred Qualifications:
- • Identity and Access management toolset experience.
- • Experience using Agile methodology
- • Past experience provisioning access.
- • Relevant security certifications
Top 3 must haves:
- Identity and Access management toolset experience.
- Experience using Agile methodology
- Past experience provisioning access
- Ideal candidate will be forward thinker, able to decipher key details from meetings with various business groups and relay to appropriate teams.
- Could come from Business Analyst background that has transitioned to Cybersecurity or from Cybersecurity background to more of a a Business Analyst .
Would you like to know more about our new opportunity? For immediate consideration, please send your resume directly to Suresh Gaddala at or apply online while viewing all of our open positions at
ARC Group is a Forbes-ranked a top 20 recruiting and executive search firm working with clients nationwide to recruit the highest quality technical resources. We have achieved this by understanding both our candidate's and client's needs and goals and serving both with integrity and a shared desire to succeed.
At ARC Group, we are committed to providing equal employment opportunities and fostering an inclusive work environment. We encourage applications from all qualified individuals regardless of race, ethnicity, religion, gender identity, sexual orientation, age, disability, or any other protected status. If you require accommodations during the recruitment process, please let us know.
Position is offered with no fee to candidate.
Cybersecurity Engineer
Posted 5 days ago
Job Viewed
Job Description
Imagine One is currently seeking multiple candidates for "contingent" positions supporting the U.S. Navy. We are looking for Senior Cybersecurity Engineer III to provide research and engineering services for the U.S. Navy. Apply now and meet new goals as you pursue your passion in cybersecurity!
Experience Requirements:
- Shall have a minimum of five (5) years of Cybersecurity experience in performing system hardening
- Shall have demonstrated experience with performing STIG implementation
- Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
- Shall have demonstrated experience remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Must possess one of the following:
- Bachelor's degree
- Certified Ethical Hacker (CEH) certification
- CompTIA Security+ certification
- One of the following training courses:
- CYBR2100 Certified Ethical Hacker
- CYBR1100 Network Traffic Analysis
- CYBR2100 Certified Ethical Hacker
- CYBR2400 Cyber Operator Training Course
- CYBR4005 Comp Forensics Invest and Response
- Intermediate Cyber Core (ICC)
- NEC 742A Network Security Vulnerability Technician
- NEC H08A Advanced Network Analyst
- NEC H10A Basic Cyber Analyst/Operator
- NETW 4001 Security Plus
- U.S. Citizenship required
- ACTIVE DoD Secret Clearance
- Security investigation with an IT level-1 designation in Joint Personnel Adjudication System (JPAS) and/or Defense Information System for Security (DISS)
Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group medical, vision, and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing master's degree); employee training, development, and education programs; profit sharing; advancement opportunities; and much more!
ISO 9001:2015, ISO 2000-1:2018, ISO 27001:2013
CMMI Development and Services - Maturity Level 3
An Employee-Owned Business
EEO/Veterans/Disabled
Imagine One "Contingent" offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance).
Be The First To Know
About the latest Cybersecurity experts Jobs in Jacksonville !
Cybersecurity Engineer
Posted 5 days ago
Job Viewed
Job Description
ARC Group has an immediate opportunity for a Cybersecurity Engineer! This position is 100% remote working eastern time zone business hours. This is starting out as a contract position running through January 2026 with strong potential to extend longer or convert to FTE. This is a fantastic opportunity to join a well-respected organization offering tremendous career growth potential.
At ARC Group, we are committed to fostering a diverse and inclusive workplace where everyone feels valued and respected. We believe that diverse perspectives lead to better innovation and problem-solving. As an organization, we embrace diversity in all its forms and encourage individuals from underrepresented groups to apply.
100% REMOTE!
Reference# 18396-1
Candidates must currently have PERMANENT US work authorization. Sorry, but we are not considering any candidates from outside companies for this position (no C2C, 3rd party / brokering).
Cybersecurity Engineer
We are seeking an experienced Cyber Security Engineer to join our client's team, responsible for ensuring the security of our applications and APIs. This role will focus on collaborating with cross functional teams, including developers, UI developers, and API developers, to identify and remediate security vulnerabilities. The ideal candidate will have expertise in API security, UI security, as well as secure coding practices, with the ability to balance security with business needs and enable rapid and secure deployment of applications.
Essential Functions
• Collaborate with developers throughout the software development lifecycle to ensure security best practices are integrated into application design and development
• Review scan findings and work with developers to remediate security vulnerabilities and implement fixes within their applications
• Work with application owners to enable single sign on via standards such as SAML or OAuth
• Work with application owners to manage access control via conditional access policies
• Partner with developers to ensure secure coding practices and mitigate security risks
• Provide security guidance and recommendations to development teams to ensure compliance with security standards and regulations
• Develop and maintain security documentation, including threat models, risk assessments, and security requirements
• Stay current with emerging security threats and technologies, applying this knowledge to improve our overall security posture
• Enable the business to rapidly and securely deploy applications balancing security with business needs
Additional Required Qualifications
- 4+ years of experience in cyber security, with a focus on secure development and deployment
- Strong understanding of secure coding practices, threat modeling, and risk assessment
- Experience with Azure / EntraID
- Experience with Single Sign On using SAML or OAuth
- Experience with security tools such as Postman, Burp Suite, etc. and vulnerability management
- Experience with scripting languages such as PowerShell or Python
- Excellent communication and collaboration skills, with the ability to work with technical and non-technical stakeholders
- Strong problem-solving skills, with the ability to analyze complex security issues and develop effective solutions
- Familiarity with API security frameworks and protocols (OAuth, JWT), as well as UI development frameworks and tools
Required Work Experience:
- 4+ years related work experience
- 2+ years in Cybersecurity
- 2+ years Information Technology Infrastructure
Required Education:
• Related Bachelor's degree or additional related equivalent work experience
Required Licenses and Certifications (required within 180 days of FT hire) :
• Cybersecurity Engineer Defense and Threat Operations: SSCP
• Cybersecurity Engineer Enterprise Cybersecurity Services: SSCP
Qualifications:
Must have scripting experience. Must have Azure experience, preferably EntraID. Must be familiar with OWASP top 10.
• Experience with the OWASP Top 10 and remediation strategies
• Experience with the creation of both technical and non-technical documentation
• Experience with agile development methodologies
• Experience with CI/CD pipelines and tools such as Jenkins
Would you like to know more about our new opportunity? For immediate consideration, please send your resume directly to Suresh Gaddala at or apply online while viewing all of our open positions at
ARC Group is a Forbes-ranked a top 20 recruiting and executive search firm working with clients nationwide to recruit the highest quality technical resources. We have achieved this by understanding both our candidate's and client's needs and goals and serving both with integrity and a shared desire to succeed.
At ARC Group, we are committed to providing equal employment opportunities and fostering an inclusive work environment. We encourage applications from all qualified individuals regardless of race, ethnicity, religion, gender identity, sexual orientation, age, disability, or any other protected status. If you require accommodations during the recruitment process, please let us know.
Position is offered with no fee to candidate.
Cybersecurity Engineer
Posted today
Job Viewed
Job Description
Imagine One is currently seeking multiple candidates for "contingent" positions supporting the U.S. Navy. We are looking for Senior Cybersecurity Engineer III to provide research and engineering services for the U.S. Navy. Apply now and meet new goals as you pursue your passion in cybersecurity!
Experience Requirements:
- Shall have a minimum of five (5) years of Cybersecurity experience in performing system hardening
- Shall have demonstrated experience with performing STIG implementation
- Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
- Shall have demonstrated experience remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Educational Requirements:
- Must possess one of the following:
- Bachelor's degree
- Certified Ethical Hacker (CEH) certification
- CompTIA Security+ certification
- One of the following training courses:
- CYBR2100 Certified Ethical Hacker
- CYBR1100 Network Traffic Analysis
- CYBR2100 Certified Ethical Hacker
- CYBR2400 Cyber Operator Training Course
- CYBR4005 Comp Forensics Invest and Response
- Intermediate Cyber Core (ICC)
- NEC 742A Network Security Vulnerability Technician
- NEC H08A Advanced Network Analyst
- NEC H10A Basic Cyber Analyst/Operator
- NETW 4001 Security Plus
- U.S. Citizenship required
- ACTIVE DoD Secret Clearance
- Security investigation with an IT level-1 designation in Joint Personnel Adjudication System (JPAS) and/or Defense Information System for Security (DISS)
Security Requirements:
Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group medical, vision, and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing master's degree); employee training, development, and education programs; profit sharing; advancement opportunities; and much more!
ISO 9001:2015, ISO 2000-1:2018, ISO 27001:2013 CMMI Development and Services - Maturity Level 3 An Employee-Owned Business EEO/Veterans/Disabled
Imagine One "Contingent" offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance).
Cybersecurity Engineer
Posted 1 day ago
Job Viewed
Job Description
Employer Industry: Cybersecurity Solutions Why consider this job opportunity: Opportunity for career advancement and growth within the organization Engaging and collaborative work environment that fosters creativity and skill development Involvement in cutting-edge security technology and solutions Chance to make a positive impact on the cybersecurity posture of the enterprise and its subsidiaries Comprehensive training provided on security capabilities, processes, and procedures What to Expect (Job Responsibilities): Research, evaluate, validate, and recommend technical security solutions while assisting with their implementation Manage system/application environments, configurations, policies, and operational activities for assigned security solutions Monitor, report on, and enhance the performance of assigned technical security solutions Provide incident response and troubleshoot software/hardware issues for assigned security solutions Collaborate with various business areas to support work group initiatives and ensure timely completion of security tasks What is Required (Qualifications): Minimum of 4 years of related work experience At least 2 years of experience in Cybersecurity At least 2 years of experience in Information Technology Infrastructure Related Bachelor's degree or equivalent work experience Basic understanding of security concepts and controls for networks, applications, and operating systems How to Stand Out (Preferred Qualifications): Exposure to project management methodologies like Waterfall, Agile, Lean, or SAFe methodologies We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately. We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer. #J-18808-Ljbffr