Today
Top Secret/SCI
Unspecified
Polygraph
IT - Security
Fort Meade, MD (On-Site/Office)
Zachary Piper Solutions is seeking an Endpoint Cybersecurity Analyst to support a large scale Federal program at Fort Meade, MD . The selected candidate shall execute in real time, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. This is an on-site position located at Fort Meade, MD. This position requires an Active TS/SCI Clearance and an active IAT/IAM Level II or Level III certification .
Requirements and Duties Include:
Security Clearance Level:
Required Skills and Abilities:
Compensation Includes:
This post opens on 8/22/25 and will remain open for at least 30 days from the posting date
#LI-CB1
#LI-ONSITE
Keywords: Network, STIG, STIGs, DoD, NAVY, powershell, linux, vulnerabilities, cyber, network security, Security+, security, threat prevention, firewall, trellix, queries, query, endpoint, endpoint configuration, endpoint configuration analysis, network infrastructure, DoDIN, endpoint security, cloud security, monitor, detect, IAP's, routers, firewalls, zero trust, TTP's, security+, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, SecurityX, TS/SCI, polygraph, CI poly, Counter Intelligence polygraph, IDPS, mitigation, remediation, cybersecurity,
Requirements and Duties Include:
- Provide analysis of architectures, technologies, DOD policy & information and critical data
- Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
- Prepare and perform briefings appropriate for senior leadership (i.e., general officer or flag officer)
- Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
- Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts.
- Develop standards, metrics and measures to support assessments, process improvements and operational efficiencies across the DODIN.
- Expert understanding of various technologies and cybersecurity areas of interest including but not limited to:
- Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data.
- Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities.
- Cloud Security: Develop strategies to monitor, detect, and prevent unauthorized manipulation and access of cloud services.
Security Clearance Level:
- Active TS/SCI Clearance and eligible for CI Polygraph
Required Skills and Abilities:
- 8 years of related experience
- Bachelor's degree or equivalent experience
- IAT/IAM Level II or III certification (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
- Experience with DoD and DISA networks
Compensation Includes:
- $130,000 - $160,000 *depending on experience*
- Health, Dental, Vision, 401K, Paid Holidays, PTO, Sick Leave if required by law
This post opens on 8/22/25 and will remain open for at least 30 days from the posting date
#LI-CB1
#LI-ONSITE
Keywords: Network, STIG, STIGs, DoD, NAVY, powershell, linux, vulnerabilities, cyber, network security, Security+, security, threat prevention, firewall, trellix, queries, query, endpoint, endpoint configuration, endpoint configuration analysis, network infrastructure, DoDIN, endpoint security, cloud security, monitor, detect, IAP's, routers, firewalls, zero trust, TTP's, security+, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, SecurityX, TS/SCI, polygraph, CI poly, Counter Intelligence polygraph, IDPS, mitigation, remediation, cybersecurity,
group id: 10430981