This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Analyze, implement, and manage policies and procedures to ensure database and software security. Apply advanced skills, extensive technical expertise, and full industry knowledge. Develop innovative solutions to complex problems. Work without considerable direction and mentor and supervise team members.
Job Responsibility:
Analyze, implement, and manage policies and procedures to ensure database and software security
Apply advanced skills, extensive technical expertise, and full industry knowledge
Develop innovative solutions to complex problems
Work without considerable direction and mentor and supervise team members
Requirements:
10+ years of experience in an ISSE, ISSO, or IT role
Experience with HBSS or Trellix
Experience with Active Directory, Group Policy, and Heavy Security Technical Implementation Guide (STIG)
Experience with Vulnerability Management, such as ACAS, Nessus, NexPose, or OpenVAS
Experience with administering, maintaining, implementing upgrades for, and ensuring the readiness of several classified virtual enterprise systems and corresponding technologies such as Enterprise Linux, Cisco Systems, Juniper Switch, Router, NGFW, Red Hat, Palo Alto, Windows Server, and Windows Workstation
Knowledge of how System Engineers and administrators perform system hardening utilizing STIGs
Knowledge of Information Assurance (IA) concepts, practices, and procedures using established DoD security policies and standards to mitigate RMF security risks
TS/SCI clearance
Bachelor’s degree
DoD 8140 baseline Level II certification, such as Security+, CySA+, or CISSP Certification
Nice to have:
Experience with DoD architecture, strategic planning, concept of operations, performance attributes, system architecture and design, evolving methodologies, and statutory or regulatory requirements
Experience with Security Information and Event Management (SIEM) systems such as Splunk, Elastic, Logstash, or Kibana
Experience with data broker technologies such as Cribl or Confluent, operating system security events such as Windows or Linux, and networking protocols such as TCP/IP, DNS, DHCP, or HTTP/HTTPS
Experience with cybersecurity tools and technologies such as IDS/IPS, firewalls, host-based security, or Identity and Access Management (IDAM), and DevSecOps tools and practices such as CI/CD pipelines, including GitLab CI/CD or Azure DevOps
Experience with ICAM principles and technologies such as multi-factor authentication and privileged access management
Knowledge of Zero Trust principles and frameworks such as NIST 800-207
TS/SCI clearance with a polygraph
Master's degree in a technology field, such as Cybersecurity, Computer Science, or Information Technology
Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), or GIAC Vulnerability Assessment Professional (GVAP) Certification
What we offer:
Health, life, disability, financial, and retirement benefits