Today
Top Secret/SCI
Unspecified
Polygraph
IT - Security
Fort Meade, MD (On-Site/Office)
Zachary Piper Solutions is seeking an Endpoint Security Analyst to provide network operations and cyber defense support to a DoD customer. A qualified candidate will provide holistic enterprise defensive strategies for Cloud, network boundaries, cross domains, and varying endpoint technologies. This position is fully onsite at Fort Meade, MD.
Must have active TS/SCI Clearance
Primary Responsibilities:
• Provide analysis of architectures, technologies, DOD policy & information and critical data
• Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
• Prepare and perform briefings appropriate for senior leadership (i.e., general officer or flag officer)
• Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
• Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts.
• Develop standards, metrics and measures to support assessments, process improvements and operational efficiencies across the DODIN.
• Expert understanding of various technologies and cybersecurity areas of interest including but not limited to:
• Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data.
• Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities.
• Cloud Security: Develop strategies to monitor, detect, and prevent unauthorized manipulation and access of cloud services.
Basic Qualifications:
• Active DoD TS/SCI clearance and eligible for C/I Polygraph
• Bachelor's degree in a related discipline with 8+ years of applicable combined education and experience; additional related years of experience is accepted in lieu of a degree.
• IAT/IAM Level II OR III (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
• Familiarity with all related aspects of cybersecurity operations and security architecture
• In-depth knowledge of (1) network and application protocols, (2) cyber vulnerabilities and exploitation techniques and (3) cyber threat/adversary methodologies (TTPs).
Compensation:
$150,000k -160,000k** depending on experience and degree**
Full Benefits -Medical, Dental, Vision, 401K, Paid Holidays, PTO, Sick Leave if required by law
This job opens for applications on 8/28/2025. Applications for this job will be accepted for at least 30 days from the posting date
#LI-Onsite
#LI-GC2
Key words: prevention, detection, mitigation, cyber threat, adversary methodologies, protocols, anomalous activity, vulnerabilities, inefficiencies, DODIN, endpoint security, Boundary Security, IAP's, OT, OT technologies, ICS, DCS, SCADA, PLC, Industrial control systems, infrastructure, programmable logic controllers, supervisory control and data acquisition, mitre attacks, RMF, Cyber, cyber security, cyber-security, security, mitre, risk management framework, netflow, PCAP, custom application logs, Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, incident response, forensic media analysis, malware analysis ,reverse-engineering, cyber threat intelligence analysis, security architecture, engineering, analysis, analyze, analyzes, analyst, architectures, technologies, policies, information, analytic data, determine prevention, detection, mitigation, anomalous activity, vulnerabilities, inefficiencies, policy, strategic planning, recommendations, consulting, consultants, consultant, best practices
Must have active TS/SCI Clearance
Primary Responsibilities:
• Provide analysis of architectures, technologies, DOD policy & information and critical data
• Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
• Prepare and perform briefings appropriate for senior leadership (i.e., general officer or flag officer)
• Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
• Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts.
• Develop standards, metrics and measures to support assessments, process improvements and operational efficiencies across the DODIN.
• Expert understanding of various technologies and cybersecurity areas of interest including but not limited to:
• Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data.
• Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities.
• Cloud Security: Develop strategies to monitor, detect, and prevent unauthorized manipulation and access of cloud services.
Basic Qualifications:
• Active DoD TS/SCI clearance and eligible for C/I Polygraph
• Bachelor's degree in a related discipline with 8+ years of applicable combined education and experience; additional related years of experience is accepted in lieu of a degree.
• IAT/IAM Level II OR III (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
• Familiarity with all related aspects of cybersecurity operations and security architecture
• In-depth knowledge of (1) network and application protocols, (2) cyber vulnerabilities and exploitation techniques and (3) cyber threat/adversary methodologies (TTPs).
Compensation:
$150,000k -160,000k** depending on experience and degree**
Full Benefits -Medical, Dental, Vision, 401K, Paid Holidays, PTO, Sick Leave if required by law
This job opens for applications on 8/28/2025. Applications for this job will be accepted for at least 30 days from the posting date
#LI-Onsite
#LI-GC2
Key words: prevention, detection, mitigation, cyber threat, adversary methodologies, protocols, anomalous activity, vulnerabilities, inefficiencies, DODIN, endpoint security, Boundary Security, IAP's, OT, OT technologies, ICS, DCS, SCADA, PLC, Industrial control systems, infrastructure, programmable logic controllers, supervisory control and data acquisition, mitre attacks, RMF, Cyber, cyber security, cyber-security, security, mitre, risk management framework, netflow, PCAP, custom application logs, Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH, incident response, forensic media analysis, malware analysis ,reverse-engineering, cyber threat intelligence analysis, security architecture, engineering, analysis, analyze, analyzes, analyst, architectures, technologies, policies, information, analytic data, determine prevention, detection, mitigation, anomalous activity, vulnerabilities, inefficiencies, policy, strategic planning, recommendations, consulting, consultants, consultant, best practices
group id: 10430981