Recent Searches

You haven't searched anything yet.

1 Cyber Security engineer Job in Florida, NY

SET JOB ALERT
Details...
Kalani Consulting
Florida, NY | Full Time
$119k-150k (estimate)
2 Weeks Ago
Cyber Security engineer
$119k-150k (estimate)
Full Time 2 Weeks Ago
Save

Kalani Consulting is Hiring a Cyber Security engineer Near Florida, NY

Senior Cyber Security Engineer Onsite Location: MacDill AFB, FL Active Top Secret Security Clearance RequiredKalani Consulting Inc., recently awarded Best and Brightest Companies to Work for in The Nation for the second year in a row and Washington Post’s Top Workplaces of 2023 is looking to add more talent to our team! Kalani is a fast-growing small business located in Northern Virginia with an increasing base of government customers. We specialize in Information Technology, and management consulting. We offer very competitive salaries and benefits and are an employee-focused company. Join us and experience the Aloha Spirit!
Overview:
  • Review Cyber Intelligence and identify how current threats affect networks.
  • Perform Cybersecurity Detection and Incident Response activities for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
  • Review cyber events and document Cybersecurity incidents as directed in SINCE and ServiceNow. Additionally, produce After Action Reports to close Cybersecurity incidents.
  • Work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, SPLUNK, SIEM, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
  • Work with vendors to ensure the CND Tool suits detect and capture required cyber incidents, to include latest industry threats and zero-days, etc.
  • Review intelligent reports and provide daily Cyber Assessment on the impact to networks.
  • Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations.
  • Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity.
  • Research and develop methods of tracking and detecting malicious activity within a network.
  • Be available for after-hours support when required. Incident response is a vital position to respond to critical cyber-attacks and our Enterprise is a 24/7 operation.
  • Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks.
  • Continuously improve processes for use across multiple detection sets for more efficient operations.
  • Perform malware analysis with CND tools.
  • Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort).
  • Create Splunk dashboarding, reports, and alerts with reference to Security detection and Incident Response.
  • Utilize available resources to conduct Cybersecurity activities, and report to senior staff and government personnel on overall program security posture.
  • Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats
  • Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, ST&Es, and CCRI.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
  • Assists with implementation of countermeasures or mitigating controls.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Work with the Information Assurance Team, Security Manager and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
  • Provides guidance and work leadership to less-experienced technical staff members.
  • Maintains current knowledge of relevant technology as assigned.
  • Participates in special projects as required.
  • Provide Incident Detection through understanding malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.
Qualifications: Required Qualifications:
  • 5 years of experience required
  • Must possess and maintain a TS/SCI clearance
  • BA/BS degree – may substitute additional years of experience
  • Comprehensive knowledge of data security administration principles, methods, and techniques
  • Must meet DOD 8570.01M requirements for IAT Level II & CSSP-Incident Responder
  • Familiarity with System & Network concepts, user authentication, and use of Cyber Stacks
  • Understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01 and other applicable policies
Preferred Qualifications:
  • Security Operations Center (SOC) Experience
  • ESS (HBSS) Proficiency
  • ACAS Proficiency
  • SPLUNK & SYSLOG data normalization
  • The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment
  • The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment
KCI is an Equal Opportunity Employer that values the strength diversity brings to the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status, or any other characteristic protected by law.
Powered by JazzHR
GQgnN4yxXL

Job Summary

JOB TYPE

Full Time

SALARY

$119k-150k (estimate)

POST DATE

06/09/2024

EXPIRATION DATE

07/06/2024

WEBSITE

kciconsulting.com

HEADQUARTERS

Leesburg, VA

SIZE

<25

Show more

Kalani Consulting
Full Time
$105k-132k (estimate)
2 Weeks Ago
Kalani Consulting
Full Time
$81k-99k (estimate)
1 Month Ago
Kalani Consulting
Full Time
$132k-164k (estimate)
1 Month Ago

The job skills required for Cyber Security engineer include Cybersecurity, Leadership, Consulting, Incident Response, SIEM, Data Security, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Security engineer. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Security engineer. Select any job title you are interested in and start to search job requirements.

For the skill of  Cybersecurity
Cynet Systems
Contractor
$109k-137k (estimate)
2 Weeks Ago
For the skill of  Leadership
Mediaite
Full Time
$102k-131k (estimate)
Just Posted
For the skill of  Consulting
Choreograph
Full Time
$194k-238k (estimate)
Just Posted
Show more

The following is the career advancement route for Cyber Security engineer positions, which can be used as a reference in future career path planning. As a Cyber Security engineer, it can be promoted into senior positions as a Cyber Security Architect III that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Security engineer. You can explore the career advancement for a Cyber Security engineer below and select your interested title to get hiring information.

Varsity Tutors, a Nerdy Company
Full Time
$55k-111k (estimate)
3 Weeks Ago