Information Security contract jobs near you / remote

Information Security
£519/day

Senior Software Developer

10 days ago
$55 - $70/hour (Estimated)Reston, VANT Concepts
Overview
NT Concepts is seeking a Senior Software Developer to support the DoD enterprise Military Housing system. This complex system of 28 web-based modules used by over 10,000 active users to meet the housing needs of over 2.5 million service members, DoD civilians, and their families.
Responsibilities
As a Senior Software Developer, you will:
  • Work within an Agile development structure to lead the software development processes necessary to support over 400 major updates and product changes per year across the enterprise.
  • Ensure that all Product Increments are appropriately tested, comply with all DoD and service-level security and configuration requirements, and meet the needs of the customer.
  • Gather and analyze user requirements generated through formal Change Management processes from Air Force, Army, Navy, Coast Guard, and DoD-level customers.
Qualifications
Minimum Qualifications
  • BA/BS degree in a technical field (IT, Information Security, Software Development).
  • 10 years of relevant professional experience supporting software development.
  • Familiarity with Agile software development.
  • Experience with Java, SQL
  • CompTIA Security +
  • Current Secret Clearance
Preferred Qualifications
  • At least ONE of these
    • Certified Scrum Master
    • Agile Certified Practitioner (PMI-ACP)
    • Certified Scrum Professional
  • An MS in a technical field is preferred
  • OCA or OCP Java Certification
  • Code in one or more languages besides Java (Python, PHP, C, Pro *C, etc)
Get new remote Information Security contracts sent to you every week.
Subscribed to weekly Information Security alerts! 🎉 You can see it in your dashboard.

Linux Engineer

11 days ago
$55 - $70/hour (Estimated)Dulles, VARaytheon
This position supports Raytheon's DOMino contract, a single-award IDIQ worth over $1 billion. This contract delivers full lifecycle development and sustainment for the Department of Homeland Security’s (DHS) National Cybersecurity Protection System (NCPS). The NCPS assists more than 100 federal civilian government agencies with the protection of their networks against advanced cyber threats. Under this contract, Raytheon will support the government in the design, development, operations and maintenance services for the NCPS. Raytheon will build the mission critical cybersecurity solutions that will enable the timely dissemination of threat warnings and improve information sharing across DHS's stakeholder community.

The Linux Engineer applies current technologies to the design, development, evaluation and integration of computer information systems and networks to maintain system security. Works with commercial computer product vendors in the design and evaluation of state-of-the-art secure COTS applications, operating systems, networks and database products and technology. Provides security engineering and integration services to internal customers. Involved in a wide range of issues including secure architectures, secure electronic data traffic, network security, information security and privacy. Develops security systems for any manual or automated systems environments. Responsible for ensuring the protection of company data against unauthorized disclosure, accidental or intentional loss of data, or unauthorized modification.

The Engineer will need to have the ability and willingness to travel up to 40 percent of the time. The Engineer will need to have a vehicle and be willing to drive it to sites around the DC Metropolitan area. The Engineer must have the ability to lift at least 70 pounds repeatedly.

This position requires work on nights and weekends.

Required Skills:

  • Must have a current Top Secret Clearance with SCI eligibility (SSBI within the last five years) and be able to obtain DHS program suitability prior to starting employment.
  • Proficiency with configuration management using Ansible or Puppet
  • Skilled in Linux-related scripting (Bash, Perl, Python, etc.)
  • Experience with Apache web server configuration and management
  • Management, deployment and troubleshooting of Java and Tomcat applications
  • Experience analyzing and evaluating the security of new and existing IT systems and the procedures to protect information system assets from intentional or inadvertent modification, disclosure, or destruction.
  • Experience analyzing and evaluating the design and operating effectiveness of Information technology and security controls that are in place.
  • Knowledge and understanding of operating systems, networks and services.
  • Knowledge of Red Hat version 6 or 7(rhel6/rhel7) with the ability to engineer, install, administer and maintain.
  • Experience evaluating security solutions to ensure they meet security requirements for processing classified information.
  • Manage changes to system and assesses the security impact of those changes.
  • Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
  • Comprehensive knowledge and understanding of best practices, trends related to information security
  • Strong research, analytical, and problem solving skills
  • Good communication skills including preparing and presenting results, findings and alternatives and influencing management decision making based on the best available data

Desired Skills:

  • Apache/TomCat/NGINX
  • Kerberos/LDAP
  • SSL
  • IDM/Free IPA
  • Docker
  • Open Nebula
  • Ambari
  • Whois
  • Sourcefire
  • Puppet
  • Satellite Server
  • Nagios

Training/certification in any of the following strongly desired:
  • Red Hat Certified System Administrator (RHCSA)
  • Red Hat Certified Engineer (RHCE)

Required Education (including Major):

  • Bachelor's degree with 4 years of relevant experience. Additional years of work experience may be substituted for a degree.

This position requires a U.S. Person who is eligible to obtain any required Export Authorization.

DOMinoIIS 142462

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

Junior Penetration Tester (Remote)

13 days ago
RemoteBlack Knight
Position: Junior Penetration Tester (Remote)

Job Description:

Please Note: Due to government contract requirements, only U.S. citizens may be considered for this position.

Black Knight is the premier provider of integrated technology, services, data and analytics that lenders and servicers look to first to help successfully manage the entire loan life cycle. Our deep understanding of regulatory and compliance issues complements the knowledge, technology and solutions we offer to help our clients achieve their business goals. Black Knight offers leading software systems; data and analytics offerings; and information solutions that facilitate and automate many of the business processes across the mortgage life cycle.

JOB FAMILY DESCRIPTION

Responsible for protecting the company from dynamic and evolving threats by coordinating and performing penetration tests. Monitors and researches emerging and advanced information security threats, as well as assesses customer data, investigating repeating trends, attacks, malicious intellectual properties, and other abnormalities. Minimizes data exposure risks by meeting all company and regulatory requirements while developing and implementing business solutions.

This position is remote / telecommute eligible. If located in Jacksonville, FL some onsite will be required.

GENERAL DUTIES & RESPONSIBILITIES

  • Coordinate Penetration testing with 3rd party vendors to prevent possible incidents that target the company and pose an imminent risk to the company, its employees and customers.
  • Plans, directs and facilitates response and recovery activities in response to a threat in software applications.
  • Provides consulting services with software development teams on code vulnerabilities and completes interpretations of the risk to the company and clients.
  • Conducts scan reviews and provides recommendations to management regarding filters, blocking, vulnerability remediation, etc.
  • Researches hackers and hacker techniques and provides detailed briefings and intelligence reports to management.
  • Conducts analysis of intelligence data as it pertains to the application security of the Client. Collaborates with intrusion analysts to identify, report on, and coordinate remediation of threats to the company and its clients.
  • Conducts Security vulnerability assessments of Web, Desktop Applications, and Web Services. Performs other related duties as assigned.

EDUCATIONAL GUIDELINES

Bachelor’s Degree in Computer Science, Information Systems, Computer Engineering or the equivalent combination of education, training, or work experience.

Professional certification such as CISSP, GXPN, GWAPT, GPEN, GWEB, GSSP, OSCP, or CEH is a plus.

GENERAL KNOWLEDGE, SKILLS & ABILITIES

  • Experience with Penetration Testing tools such as Burp Suite, Kali Linux, etc. preferred
  • Experience with scripting languages such as Python, Selenium (Add-On), SQL syntax, Powershell, etc. preferred
  • Knowledge of common application vulnerabilities (OWASP Top 10) a plus
  • Experience with either Java and/or .NET (C#) development languages and code preferred
  • ability to evaluate information security risk implications
  • Knowledge of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks and exploits
  • Knowledge of relevant legal and regulatory requirements
  • Knowledge of common information security management frameworks
  • Experience working with a diverse range of data sources/streams and managing these effectively
  • Excellent analytical, decision-making and problem-solving skills with proficiency in project management
  • Strong understanding of developing and deploying analytical tools and technologies to cybersecurity challenges
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, defend the analysis, and apply attribution to cyber threat activity
  • Knowledge of computer network defense operations (e.g., proxy, firewall, IDS/IPS, router/switch, open source information collection, etc.)
  • Ability to develop partnership-oriented relationships with business executives and functional leaders
  • Strong background in security operations, process, solutions and technologies
  • Strong understanding of policy, compliance, and best practice security principles
  • Working knowledge of Linux, Windows, and / or Network Operating Systems
  • Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Experience with enterprise risk assessment methodologies
  • Must be able to multitask in a fast-paced environment with focus on timeliness, documentation, and communications with peers and business users alike
  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within Black Knight or outside the organization (executives, regulators, clients, etc.)
  • Results oriented, business focused, and successful at interfacing across multiple organizational units

Threat Intelligence Analyst I

Entry-level role into the job family. Works under general direction or on IT security projects as a project team member. Works on simple to moderately complex security issues or projects that require basic to increased skill in one (1) or more IT functional areas. Requires general understanding of security issues, techniques, and implications across at least one (1) computer platform. Must have general knowledge in networking, databases, systems, and/or Web operations. Typically requires up to three (3) or more years of combined IT and security work experience with extensive exposure conducting network security vulnerability assessments, penetration testing, or other related experience using advanced networking tools and security solutions OR shows adequate non-traditional experience in international or collegiate hacker competitions, bug bounty programs, participation in the security research community, cyber security military training, or ethical hacking internship programs.

Black Knight is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, disability, age, and protected veteran or military family status. Our employees’ diversity is our strength, and when we embrace our differences, it makes us better and brighter. Black Knight’s commitment to inclusion is at the core of who we are, and motivates us in how we do business each and every day.

Location: Remote

Time Type: Full time

Junior Penetration Tester (Remote)

13 days ago
RemoteBlack Knight Financial Services
Position: Junior Penetration Tester (Remote)

Job Description:

Please Note: Due to government contract requirements, only U.S. citizens may be considered for this position.

Black Knight is the premier provider of integrated technology, services, data and analytics that lenders and servicers look to first to help successfully manage the entire loan life cycle. Our deep understanding of regulatory and compliance issues complements the knowledge, technology and solutions we offer to help our clients achieve their business goals. Black Knight offers leading software systems; data and analytics offerings; and information solutions that facilitate and automate many of the business processes across the mortgage life cycle.

JOB FAMILY DESCRIPTION

Responsible for protecting the company from dynamic and evolving threats by coordinating and performing penetration tests. Monitors and researches emerging and advanced information security threats, as well as assesses customer data, investigating repeating trends, attacks, malicious intellectual properties, and other abnormalities. Minimizes data exposure risks by meeting all company and regulatory requirements while developing and implementing business solutions.

This position is remote / telecommute eligible. If located in Jacksonville, FL some onsite will be required.

GENERAL DUTIES & RESPONSIBILITIES

  • Coordinate Penetration testing with 3rd party vendors to prevent possible incidents that target the company and pose an imminent risk to the company, its employees and customers.
  • Plans, directs and facilitates response and recovery activities in response to a threat in software applications.
  • Provides consulting services with software development teams on code vulnerabilities and completes interpretations of the risk to the company and clients.
  • Conducts scan reviews and provides recommendations to management regarding filters, blocking, vulnerability remediation, etc.
  • Researches hackers and hacker techniques and provides detailed briefings and intelligence reports to management.
  • Conducts analysis of intelligence data as it pertains to the application security of the Client. Collaborates with intrusion analysts to identify, report on, and coordinate remediation of threats to the company and its clients.
  • Conducts Security vulnerability assessments of Web, Desktop Applications, and Web Services. Performs other related duties as assigned.

EDUCATIONAL GUIDELINES

Bachelor’s Degree in Computer Science, Information Systems, Computer Engineering or the equivalent combination of education, training, or work experience.

Professional certification such as CISSP, GXPN, GWAPT, GPEN, GWEB, GSSP, OSCP, or CEH is a plus.

GENERAL KNOWLEDGE, SKILLS & ABILITIES

  • Experience with Penetration Testing tools such as Burp Suite, Kali Linux, etc. preferred
  • Experience with scripting languages such as Python, Selenium (Add-On), SQL syntax, Powershell, etc. preferred
  • Knowledge of common application vulnerabilities (OWASP Top 10) a plus
  • Experience with either Java and/or .NET (C#) development languages and code preferred
  • ability to evaluate information security risk implications
  • Knowledge of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks and exploits
  • Knowledge of relevant legal and regulatory requirements
  • Knowledge of common information security management frameworks
  • Experience working with a diverse range of data sources/streams and managing these effectively
  • Excellent analytical, decision-making and problem-solving skills with proficiency in project management
  • Strong understanding of developing and deploying analytical tools and technologies to cybersecurity challenges
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, defend the analysis, and apply attribution to cyber threat activity
  • Knowledge of computer network defense operations (e.g., proxy, firewall, IDS/IPS, router/switch, open source information collection, etc.)
  • Ability to develop partnership-oriented relationships with business executives and functional leaders
  • Strong background in security operations, process, solutions and technologies
  • Strong understanding of policy, compliance, and best practice security principles
  • Working knowledge of Linux, Windows, and / or Network Operating Systems
  • Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Experience with enterprise risk assessment methodologies
  • Must be able to multitask in a fast-paced environment with focus on timeliness, documentation, and communications with peers and business users alike
  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within Black Knight or outside the organization (executives, regulators, clients, etc.)
  • Results oriented, business focused, and successful at interfacing across multiple organizational units

Threat Intelligence Analyst I

Entry-level role into the job family. Works under general direction or on IT security projects as a project team member. Works on simple to moderately complex security issues or projects that require basic to increased skill in one (1) or more IT functional areas. Requires general understanding of security issues, techniques, and implications across at least one (1) computer platform. Must have general knowledge in networking, databases, systems, and/or Web operations. Typically requires up to three (3) or more years of combined IT and security work experience with extensive exposure conducting network security vulnerability assessments, penetration testing, or other related experience using advanced networking tools and security solutions OR shows adequate non-traditional experience in international or collegiate hacker competitions, bug bounty programs, participation in the security research community, cyber security military training, or ethical hacking internship programs.

Black Knight is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, disability, age, and protected veteran or military family status. Our employees’ diversity is our strength, and when we embrace our differences, it makes us better and brighter. Black Knight’s commitment to inclusion is at the core of who we are, and motivates us in how we do business each and every day.

Location: Remote

Time Type: Full time

SailPoint Sr. Consultant / Technial Manager

16 days ago
$55 - $70/hour (Estimated)Herndon, VACredenceIA Consulting

CredenceIA Consulting is fast growing management consulting and IT services firm. We are hiring experienced, and motivated SailPoint Sr. Developer / Technical Manager to join our Team.

The successful candidate will be joining our implementation services team, and will deliver identity governance solutions. As SailPoint Sr. Developer / Technical Manager, you will have strong development, implementation and design experience in developing connectors, workflows, database, RBAC and other critical aspect of SailPoint implementation. You will also have experienced working with the latest version of SailPoint and architect the solutions around it. In addition, you would have:

  • Ability to define and develop requirements. Ability to drive discussions
  • Ability to drive architecture and development
  • Prior implementation experience, preferably strong development and engineering background (atleast 2 implementation experience with SailPoint)
  • Experience with the implementation of IAM solutions both cloud based and on premise
  • You must be a candidate with one or more of prior IAM governance implementation experience beyond SailPoint (e.g. OIM, Saviynt, CA, IBM)
  • Experience to function as business analyst and hands-on development experience
  • Strong communication skills

Required:

  • 6+ years’ experience in developing, implementing or architecting IAM solutions
  • 5+ years’ experience with installation, configuration, development, and deployment of one of the following IAM products: SailPoint, Oracle Identity Manager, Saviynt
  • 4+ years’ experience with programming/development with Java, Javascript, SQL, JSP/Servlets
  • SQL programming, database tuning experience
  • Installation, configuration and tuning of application/web servers
  • Knowledge of XML/WSDL/XSD/JQuery
  • Knowledgeable on key IAM concepts (Identity Lifecycle, Roles, SOD, workflow development, birthright access, privilege access etc.)
  • Experienced in REST protocols
  • Experienced in Service Oriented Architecture
  • Development of use cases/test cases, participation in SIT/UAT testing
  • Ability to travel upto 25% (Be flexible on travel)
  • BA/BS Degree in Computer Science, Information Security, Engineering, Finance, Business, Math, etc.

Visa

  • USC, Green Card preferred

Your world of opportunities begins here! Apply today.

Job Types: Full-time, Contract

Job Types: Full-time, Contract

Experience:

  • SailPoint Archihtecture and Development: 5 years (Required)

Education:

  • Bachelor's (Preferred)

Required travel:

  • 25% (Preferred)

SailPoint Architect / Manager

23 days ago
$55 - $70/hour (Estimated)Reston, VACredenceIA Consulting

CredenceIA Consulting is fast growing management consulting and IT services firm. We are hiring experienced, and motivated SailPoint Architect / Manager to join our Team.

The successful candidate will be joining our implementation services team, and will deliver identity governance solutions. As SailPoint Architect / Manager, you will have strong development, implementation and design experience in developing connectors, workflows, database, RBAC and other critical aspect of SailPoint implementation. You will also have experienced working with the latest version of SailPoint and architect the solutions around it. In addition, you would have:

  • Experience and understanding of IAM concepts
  • Ability to define and develop requirements. Ability to drive discussions
  • Ability to drive architecture and development
  • Prior implementation experience, preferably strong development and engineering background (atleast 2 implementation experience with SailPoint)
  • Experience with the implementation of IAM solutions both cloud based and on premise
  • You must be a candidate with one or more of prior IAM governance implementation experience beyond SailPoint (e.g. OIM, Saviynt, CA, IBM)
  • Experience to function as business analyst and hands-on development experience
  • Strong communication skills

Required:

  • 6+ years’ experience in developing, implementing or architecting IAM solutions
  • 5+ years’ experience with installation, configuration, development, and deployment of one of the following IAM products: SailPoint, Oracle Identity Manager, Saviynt
  • 4+ years’ experience with programming/development with Java, Javascript, SQL, JSP/Servlets
  • SQL programming, database tuning experience
  • Installation, configuration and tuning of application/web servers
  • Knowledge of XML/WSDL/XSD/JQuery
  • Knowledgeable on key IAM concepts (Identity Lifecycle, Roles, SOD, workflow development, birthright access, privilege access etc.)
  • Experienced in REST protocols
  • Experienced in Service Oriented Architecture
  • Development of use cases/test cases, participation in SIT/UAT testing
  • Ability to travel upto 25% (Be flexible on travel)
  • BA/BS Degree in Computer Science, Information Security, Engineering, Finance, Business, Math, etc.

Visa

  • USC, Green Card preferred

Your world of opportunities begins here! Apply today.

Job Types: Full-time, Contract

Job Types: Full-time, Temporary, Contract

Experience:

  • SailPoint Archihtecture and Development: 5 years (Required)

Education:

  • Bachelor's (Preferred)

Required travel:

  • 25% (Preferred)

SharePoint Administrator ( Only GC holders or US citizens)

23 days ago
$55 - $70/hour (Estimated)Ashburn, VA 20147CLS Bank International

Only GC Holders or US citizens

SharePoint Administrator
Ashburn, VA
Duration : 2 plus years

The SharePoint Administrator is responsible for providing technical support for the SharePoint environment, as well as:

1. Working with customers from the Information Services Department and Business Units to fulfill tickets

2. Providing development support for Nintex Forms and Workflows

3. Creating training content and delivering it to internal customers

Education/Certifications/Experience

  • Bachelor’s degree in Information Technology or related area
  • TS, ITP, MCSE or other MS certifications are a plus
  • 2-4 years’ experience

Computer Skills

  • Nintex Advanced Workflow and Intelligent Process Automation
  • SharePoint 2016
  • SharePoint Services/Portal Server
  • Windows Server
  • Microsoft Networking and Support
  • Microsoft Office Suite

Knowledge, Skills, & Abilities

* 3-5 years of SharePoint Administrator experience (hands on working with users)

* Strong working knowledge of SharePoint 2013/2016

* Strong working knowledge of SharePoint workflows, InfoPath, Nintex, and SharePoint built-in SOAP and Rest services

  • Knowledge of Active Directory
  • Strong troubleshooting skills on resolving SharePoint related issues
  • Basic knowledge and understanding of software development languages and tools to integrate communication and collaboration technologies with other applications and business systems.
  • Excellent verbal and written communication skills
  • Knowledge of information security and systems administration
  • Proven analytical skills with information systems.
  • Excellent verbal and written communication skills
  • Knowledge of information security and systems administration

Essential Functions, Duties, & Responsibilities

  • Supports Intranet sites built on SharePoint 2016
  • Configures SharePoint services and settings
  • Documents SharePoint policies, procedures, and configurations
  • Reviews and monitoring usage reports
  • Manages content databases and creating new ones as required
  • Administers and maintains sites and sub-sites
  • Manages security for sites and sub-sites
  • Manages the site layout structure and content

Job Types: Full-time, Contract

Contract Length:

  • More than 1 year

Contract Renewal:

  • Likely

Information Systems Security Engineer

1 month ago
$60 - $75/hour (Estimated)Reston, VA 20190CACI

Job Description

As an Information Systems Security Engineer (ISSE), your primary function is to ensure that the client’s new cloud development environment meets all security requirements and specifications according to their Risk Management Framework (RMF).

Your responsibilities will include the following:

  • Coordinating Assess and Authorize (A&A), Configuration Management (CM), and Release Management requirements for the client's systems in accordance with RMF
  • Performing and reviewing technical security assessments of computing environments to identify points of vulnerability, non-compliance with established information assurance (IA) standards and regulations, and recommending mitigation strategies
  • Reviewing software assessment reports, including code and application scans, and fixing any vulnerabilities that may be present and properly addressing as to not pose a threat to the network
  • Validating and verifying system security requirements definitions and analyzing and establishing system security designs
  • Providing expert level consultation and technical services on all aspects of Information Security
  • Applying leading-edge principles, theories, and concepts to the development, maintenance, and implementation of information security standards, procedures, and guidelines
  • Ensuring and approving Plan of Action and Milestones (POA&M) are in place for vulnerabilities that cannot be remedied at the time of the finding
  • Responsible for providing high level technical leadership focused on complex information security architecture
  • Performing security research, analysis, and design for the client computing systems and infrastructure
  • Responsible for the prevention, detection, investigation and response with respect to security threats and attacks
  • Facilitating and managing security vulnerability assessments and penetration tests
  • Planning and overseeing configuration changes for major security infrastructure platforms
  • Determining the extent a system change may affect the security posture of either the information system or the computing environment and ensuring the implementation of such change are documented
  • Developing, implementing, and documenting formal security programs and policies throughout the program, and monitoring compliance to these policies and programs
  • Leading the technical aspects of internal security audits
  • Conducting trade-off analyses of products for clients to determine optimal information security solutions

You will have experience with the following:

  • Current TS/SCI with Polygraph clearance
  • Experience working with IT customers within the Intelligence Community
  • Experience working with the Xacta tool
  • Expertise in the areas of vulnerability and risk management
  • Working knowledge of IT security assessment and network vulnerability tools
  • Experience with large scale enterprise IT contracts
  • A minimum of 10 years of practical experience transitioning to and operating within RMF applications

Candidate must have a bachelor's degree in Computer Science or equivalent, and one of the following experiences in information assurance:

  • 12 Years of job related experience and High School/GED diploma
  • 10 Years of job related experience and Associate degree
  • 8 Years of job related experience and Bachelor’s degree
  • 6 Years of job related experience and Master’s degree
  • 4 Years of job related experience and Doctorate

Core hours:

9:30am to 2:30pm

Work location:

McLean, VA

Job Location

US-Reston-VA-VIRGINIA SUBURBAN


CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

Senior Information Security Engineer

1 month ago
$60 - $75/hour (Estimated)Reston, VADAtec Solutions

8+ years of experience in Information Security

Responsible for the continuous daily care, support and administration of PKI - Certification Lifecycle Management Responsibilities: Also, the daily contribution to the implementation of at rest and in-flight data encryption for existing Data Protection projects.

Application Security knowledge and experience are a plus. Plus familiarity with Guardium Database Security solution.
Implementation of native database encryption solutions, techniques, and methodologies, specifical encryption of database application of data at rest and in transit.
Familiarity with data tokenization

Provide support services to project teams, organizational teams, etc. around Certificate Lifecycle Management for PKI
Identification and escalation of environmental issues as pertaining ability/inability to function at the expected performance level.
Planning for environment expansion in support of corporate growth.
Coordination with other corporate groups in providing open communication specific to all environment activities, including testing, upgrades, scheduled downtime.

Requirements :

8+ years of experience in Information Security specifically, Data Encryption, PKI and Secure Software Development.
PKI
Venafi
HSM
Certificate Lifecycle Management
Application Security
Guardium
Data Encryption
Cryptography
Data Protection

Candidate required to be available for on-site interview at our location.

Job Type: Contract