Computer Systems Security Engineerother related Employment listings - Hanover, MD at Geebo

Computer Systems Security Engineer

Company Overview GovCIO is a team of transformers--people who are passionate about transforming government I.T. We believe in making a difference by developing digital strategies and delivering the technology-related innovation that improves governmental operations each day. But we can't do it alone. We welcome and nurture an inclusive and diversified work culture. Because different backgrounds, experiences, abilities, and perspectives make us better decision-makers, problem solvers, and creators. We're changing the face of I.T. - from our diverse staff to the end-products we develop. And we're excited to expand our team. Are you ready to be a transformer? Responsibilities Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyberthreats and adversaries. Develops cyberthreat profiles based on geographic region, country, group, or individual actors. Produces cyberthreat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure,computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and networksecurity and encryption. 1.Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyberthreats to the client. 2.Provides timely and actionable sanitized intelligence to cyber incident response professionals. 3.Leverages technical knowledge of computer systems and networks with cyberthreat information to assess the client's security posture. 4.Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks. 5.Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership. Qualifications Bachelor's with 8
years (or commensurate experience) Required Skills and Experience Secret Clearance Security
w/ce certification Cloud experience highly preferred Preferred Skills and Experience AWS Cloud Experience CASP or CISSP certification #cjpost
Salary Range:
$100K -- $150K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.