Today
Top Secret/SCI
Unspecified
Unspecified
IT - Security
Fort Meade, MD (On-Site/Office)
Zachary Piper Solutions is seeking an OT Cyber Security Analyst to provide network operations and cyber defense support to a DoD customer. A qualified candidate will provide holistic enterprise defensive strategies for Cloud, network boundaries, cross domains, and varying endpoint technologies. This position is fully onsite at Fort Meade, MD.
Must have active TS/SCI Clearance
Primary Responsibilities
· Provide analysis of architectures, technologies, policies, information and analytic data used to determine prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
· Perform cyber situational awareness activities and provide analysis and recommendations of situation awareness capabilities.
· Works with team to support asset management efforts, including monitoring and investigative efforts.
· Works cross-functionally to ensure an accurate inventory of OT assets and reduction in security vulnerabilities.
· Works with system vendors and industry experts to identify vulnerability mitigations.
· Research all available information and gathers data to analyze system issues and recommend solutions.
· Identifies areas of risk and properly communicates them to project manager.
· Develop presentations and briefs for senior leader engagement (GS-15, O6)
· Conduct micro and macro analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
· Analyze policy, program management office managed systems, hardware, and software, cloud, network infrastructure in order to recommend methods and strategies that reduce and/or managed impacts.
· Provide operational assessments, analysis, metrics, recommendations, and enhancements to address Current Operations, Future Operations and long term plans.
· Provide proactive cyber security, incident management, and impact assessments based on enterprise cyber security capabilities implemented.
· Monitor and recommend configuration management changes of various passive and active defensive capabilities, to include but not limited to, countermeasures, detection methods, and other mitigation strategies, etc. to determine and forecast the most prudent, efficient, and supportable operational environment
· Provide enterprise wide cybersecurity, threat analysis, manage, integrate and employ countermeasures and defensive strategies across a multi-tiered, porous domain inclusive of Cloud, federated regional gateways, cross domain peering points, internet access points, and endpoints.
· Manage enterprise-wide malware analysis collaboration and sharing of IOCs
· Analyze and document the function, behavior, origin, and impact of malware samples; support the calculation of risk to the DODIN
· Develop and recommend malware analysis SOPs/TTPs for the collection, analysis and protection of the DODIN
Basic Qualifications
· Active DoD TS/SCI clearance
· Bachelor's degree in a related discipline with 4 to 8 years of applicable combined education and experience; additional related years of experience is accepted in lieu of a degree.
· IAT Level II & III, IAM Level II, CSSP Analyst, (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
· Experience operating and maintaining Operational Technology (OT) Security tools.
· Demonstrates basic research and data analysis capabilities such as conducting thorough internet searches, analyzing data in tools like Microsoft Excel, etc.
· Demonstrates understanding of implementation objectives, project plan and one's role within a project.
· Familiarity with all related aspects of cybersecurity operations/analysis (e.g. incident response & management, forensic media analysis, malware analysis/reverse-engineering, cyber threat intelligence analysis, etc.) and security architecture & engineering.
· In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies (TTPs).
· Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs)
Compensation:
$160,000k -170,000k** depending on experience and degree**
Full Benefits -Medical, Dental, Vision, 401K, Paid Holidays, PTO, Sick Leave if required by law
This job opens for applications on 8/25/2025. Applications for this job will be accepted for at least 30 days from the posting date
#LI-Onsite
#LI-GC2
Key words: OT, OT technologies, ICS, DCS, SCADA, PLC, Industrial control systems, programmable logic controllers, supervisory control and data acquisition, mitre attacks, RMF, Cyber, cyber security, cyber-security, security, mitre, risk management framework, netflow, PCAP, custom application logs, Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, incident response, forensic media analysis, malware analysis ,reverse-engineering, cyber threat intelligence analysis, security architecture, engineering, analysis, analyze, analyzes, analyst, architectures, technologies, policies, information, analytic data, determine prevention, detection, mitigation, anomalous activity, vulnerabilities, inefficiencies, policy, strategic planning, recommendations, consulting, consultants, consultant, best practices
Must have active TS/SCI Clearance
Primary Responsibilities
· Provide analysis of architectures, technologies, policies, information and analytic data used to determine prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
· Perform cyber situational awareness activities and provide analysis and recommendations of situation awareness capabilities.
· Works with team to support asset management efforts, including monitoring and investigative efforts.
· Works cross-functionally to ensure an accurate inventory of OT assets and reduction in security vulnerabilities.
· Works with system vendors and industry experts to identify vulnerability mitigations.
· Research all available information and gathers data to analyze system issues and recommend solutions.
· Identifies areas of risk and properly communicates them to project manager.
· Develop presentations and briefs for senior leader engagement (GS-15, O6)
· Conduct micro and macro analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
· Analyze policy, program management office managed systems, hardware, and software, cloud, network infrastructure in order to recommend methods and strategies that reduce and/or managed impacts.
· Provide operational assessments, analysis, metrics, recommendations, and enhancements to address Current Operations, Future Operations and long term plans.
· Provide proactive cyber security, incident management, and impact assessments based on enterprise cyber security capabilities implemented.
· Monitor and recommend configuration management changes of various passive and active defensive capabilities, to include but not limited to, countermeasures, detection methods, and other mitigation strategies, etc. to determine and forecast the most prudent, efficient, and supportable operational environment
· Provide enterprise wide cybersecurity, threat analysis, manage, integrate and employ countermeasures and defensive strategies across a multi-tiered, porous domain inclusive of Cloud, federated regional gateways, cross domain peering points, internet access points, and endpoints.
· Manage enterprise-wide malware analysis collaboration and sharing of IOCs
· Analyze and document the function, behavior, origin, and impact of malware samples; support the calculation of risk to the DODIN
· Develop and recommend malware analysis SOPs/TTPs for the collection, analysis and protection of the DODIN
Basic Qualifications
· Active DoD TS/SCI clearance
· Bachelor's degree in a related discipline with 4 to 8 years of applicable combined education and experience; additional related years of experience is accepted in lieu of a degree.
· IAT Level II & III, IAM Level II, CSSP Analyst, (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
· Experience operating and maintaining Operational Technology (OT) Security tools.
· Demonstrates basic research and data analysis capabilities such as conducting thorough internet searches, analyzing data in tools like Microsoft Excel, etc.
· Demonstrates understanding of implementation objectives, project plan and one's role within a project.
· Familiarity with all related aspects of cybersecurity operations/analysis (e.g. incident response & management, forensic media analysis, malware analysis/reverse-engineering, cyber threat intelligence analysis, etc.) and security architecture & engineering.
· In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies (TTPs).
· Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs)
Compensation:
$160,000k -170,000k** depending on experience and degree**
Full Benefits -Medical, Dental, Vision, 401K, Paid Holidays, PTO, Sick Leave if required by law
This job opens for applications on 8/25/2025. Applications for this job will be accepted for at least 30 days from the posting date
#LI-Onsite
#LI-GC2
Key words: OT, OT technologies, ICS, DCS, SCADA, PLC, Industrial control systems, programmable logic controllers, supervisory control and data acquisition, mitre attacks, RMF, Cyber, cyber security, cyber-security, security, mitre, risk management framework, netflow, PCAP, custom application logs, Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, incident response, forensic media analysis, malware analysis ,reverse-engineering, cyber threat intelligence analysis, security architecture, engineering, analysis, analyze, analyzes, analyst, architectures, technologies, policies, information, analytic data, determine prevention, detection, mitigation, anomalous activity, vulnerabilities, inefficiencies, policy, strategic planning, recommendations, consulting, consultants, consultant, best practices
group id: 10430981