Gathering your results ...
30+ days
Not Specified
Not Specified
Not Specified
<p>Zachary Piper Solutions is seeking an Endpoint Security Analyst to support a critical 24x7 operations center for DoD Information Network at Ft. Meade, MD. The team is seeking a skilled analyst and incident responder to provide detection, identification, response and reporting of a high visibility network.</p> <p>Clearance: Active TS/SCI</p> <p>Location: Ft. Meade, MD (100% onsite)</p> <p>Shift: Monday-Friday standard operating hours</p> <p>This job opens for applications on 8/22/2025. Applications for this job will be accepted for at least 30 days from the posting date</p> <p>Responsibilities of the Endpoint Analyst:</p> <ul> <li>Conduct analysis of architectures, technologies, Department of Defense (DoD) policies, and critical information assets. </li><li>Design and implement cybersecurity and risk assessment methodologies to support the prevention, detection, and mitigation of anomalous activities, vulnerabilities, and inefficiencies. </li><li>Prepare and deliver briefings tailored for senior leadership, including general and flag officers. </li><li>Evaluate enterprise cybersecurity defense strategies to enhance operational effectiveness, security posture, and command and control capabilities. </li><li>Assess network infrastructure and recommend strategies to minimize or manage potential adverse impacts. </li><li>Establish standards, metrics, and performance indicators to support assessments, drive process improvements, and enhance operational efficiency across the DoD Information Network (DoDIN). </li><li>Demonstrate expert-level knowledge across various cybersecurity domains, including but not limited to: </li><li>Boundary Security: Identify and maintain awareness of the DoDIN boundary, including Internet Access Points (IAPs), peering locations, and other major ingress/egress points. Document boundary architectures and assess deployed defensive capabilities and sensor data availability. </li><li>Endpoint Security: Conduct analysis and provide enterprise-level strategies for endpoint compliance and integration with mid-tier and boundary security solutions. </li><li>Cloud Security: Develop and implement strategies to monitor, detect, and prevent unauthorized access and manipulation of cloud-based services. </li></ul> <p>Qualifications of the Endpoint Analyst:</p> <ul> <li>Bachelor's degree in a relevant field and 8+ years of combined education and professional experience; equivalent experience may be considered in place of a degree. </li><li>Active DoD TS/SCI clearance with eligibility for Counterintelligence (C/I) Polygraph. </li><li>Possession of IAT/IAM Level II or III certification, such as Security+, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, or CEH. </li><li>Strong understanding of cybersecurity operations and security architecture. </li><li>Deep expertise in: </li><li>Network and application protocols </li><li>Cyber vulnerabilities and exploitation methods </li><li>Adversary tactics, techniques, and procedures (TTPs) </li></ul> <p>Compensation of the Endpoint Analyst:</p> <ul> <li>Total compensation based on experience level - $150,000 - $165,000+ based on experience level </li><li>Full Benefits: PTO, 11 Paid Holidays, Sick leave as required by state law, Cigna Medical, Dental, and Vision, 401k with ADP </li><li>Certification reimbursement </li><li>Contract mobility and job stability - Contract through 2030 </li></ul> <p>Keywords: cyber, cybersecurity, networks, threat analysis, trend analysis, arcsight, splunk, wireshark, sharepoint, windows, vulnerability, endpoint, EDR, Sentinel, defender, Crowdstrike, malware, DoD, CYSA, CISSP, CASP, SOAR, hiring, SIEM, vulnerability exploitation, ITIL, ITIL v3, sec+, security+ CE, CCNA Security, CySA+, GICSP, GSEC, SSCP, stigs, stig, ts/sci, top secret/sci, security clearance, bachelors, network defense, network defense operations, triage of events, CEH, APT, TTP, advanced persistent threat, tactics, techniques, procedures, information assurance, CND, computer network defense, CI polygraph, counter intelligence, counterintelligence, SOC, security operations center, intelligence, intelligence agency, threat reporting, cyber threat, COTS, security principles, threat hunting, reporting, briefing, protocols, operating system, OS, DOD, department of defense, Chantilly, springfield, Virginia, cyber intelligence, security tools, GSEC, SSCP, CCNA, NOC, network operations center, network traffic, bachelors, masters, government, Federal, federal systems, ACAS, NESSUS, exploitation, exploit, network monitoring, polygraph, crowdstrike, EDR, splunk, SOAR, arcsight, MITRE ATT&CK, hiring, intelligence, intrusion detection, networking, IDS, IPS</p>
 
        POST A JOB
            It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts. 
 The first step is to SIGN UP so that you can manage all your job postings under your profile.
            
 If you already have an account, you can LOGIN to post a job or manage your other postings. 
 Thank you for helping us get Americans back to work!
        
            It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts. 
 The first step is to SIGN UP so that you can manage all your job postings under your profile.
            
 If you already have an account, you can LOGIN to post a job or manage your other postings. 
 Thank you for helping us get Americans back to work!