Clearance Jobs
Cleared - Cybersecurity (Multiple Levels)
Clearance Jobs, Bethesda, Maryland, United States, 20814
Cleared Cybersecurity (Multiple Levels)
Noblis is seeking a Cleared Cybersecurity (Multiple Levels) with IC experience and ACTIVE Top Secret with SCI and Polygraph in Bethesda, MD and McLean, VA. The Cybersecurity SME will be responsible for and not limited to: Driving technical and operational effectiveness by evaluating cyber defense capabilities, conducting control assessments, identifying gaps, establishing metrics, and aligning with organizational security objectives. Leading continuous improvement initiatives through process analysis, architectural improvements, workflow optimization, and capability enhancement roadmaps. Enhancing incident response capabilities by designing procedures and playbooks, developing standardized approaches for different incident types, establishing escalation paths, and coordinating cross-functional response activities. Improving situational awareness through effective reporting templates, actionable security dashboards, real-time visibility mechanisms, and contextual intelligence distribution. Optimizing security tool usage by maximizing SIEM effectiveness, fine-tuning correlation rules, synthesizing multi-source data, ensuring system integration, and recommending enhancements. Implementing security automation by identifying suitable processes, designing workflows, developing scripts, implementing automated responses, and documenting procedures. Managing the security reporting lifecycle from data collection to distribution, ensuring timely delivery, implementing feedback mechanisms, establishing archival procedures, and meeting compliance requirements. Fostering an agile security approach through methodologies like security sprints, retrospectives, iterative development, and balancing agility with compliance requirements. Coordinating cross-functional security activities by serving as a liaison between teams, aligning initiatives with organizational goals, facilitating knowledge sharing, and building stakeholder relationships. Leading security tool integration through architecture design, API implementation, data normalization, integration testing, and documentation. Driving security data analytics by developing collection strategies, implementing advanced analytics, creating visualizations, designing KPIs, and leveraging data for decision-making. Managing security automation development by establishing coding standards, ensuring proper testing, implementing change management, and documenting solutions. This SETA role provides technical and programmatic support to government teams by translating mission needs into technical requirements, managing those requirements, and shaping strategic program direction. Responsibilities include contract support (SOWs, RFPs, cost proposals), performance monitoring, stakeholder coordination, and communicating complex concepts through reports, meetings, and senior-level briefings. The team ensures projects stay on track by overseeing cost, schedule, and performance. Required Qualifications: Experience concentrating on overall technical and operational effectiveness of capabilities. Experience providing recommendation on continuous improvement of the processes and architecture supporting the overall Cyber Defense operational activities including, but not limited to, analysis, incident handling and reporting products, and the reporting lifecycle. Experience providing effective incident response capabilities, usable and effective reports that address overall situational awareness. Experience maximizing the use of tools to correlate information and synthesize data into usable and actionable events. Experience identifying and providing an agile approach to the automation of any manual or efficient processes that exist across the cyber defense program. Required minimum skills and knowledge: US Citizenship is required. Active Top Secret/SCI clearance with Polygraph. Bachelor's degree in computer science, data science, or a related field. Multiple levels can be accommodated: Senior Level: Bachelor's degree + 6 years of experience OR Master's Degree + 4 years of experience OR PhD + 2 years of experience OR High School Diploma/GED + 10 years of experience OR Associate's degree + 8 years of experience Compensation: $117,800 - $184,100 Expert Level: Bachelor's degree + 8 years of experience OR Master's Degree + 6 years of experience OR PhD + 4 years of experience OR High School Diploma/GED + 12 years of experience OR Associate's degree + 10 years of experience Compensation: $142,600 - $222,850 Desired Qualifications: IC experience is highly desirable. Experience with having successfully demonstrated the ability to independently conduct the appropriate analysis to offer recommendations, solutions, and alternatives to resolve issues, concerns, problems, or methods. Experience in establishing strong working relationships with program managers as well as organization leadership; tracking task order efforts to rapidly identify and resolve potential and new problems; and identifying and resolving administrative and contractual issues related to a support services contract. Ability to solve problems in a rapidly changing environment, and interface with customers directly. Strong understanding of intelligence disciplines, methodologies, and the intelligence cycle. Ability to work in a fast paced, dynamic, and team environment.
Noblis is seeking a Cleared Cybersecurity (Multiple Levels) with IC experience and ACTIVE Top Secret with SCI and Polygraph in Bethesda, MD and McLean, VA. The Cybersecurity SME will be responsible for and not limited to: Driving technical and operational effectiveness by evaluating cyber defense capabilities, conducting control assessments, identifying gaps, establishing metrics, and aligning with organizational security objectives. Leading continuous improvement initiatives through process analysis, architectural improvements, workflow optimization, and capability enhancement roadmaps. Enhancing incident response capabilities by designing procedures and playbooks, developing standardized approaches for different incident types, establishing escalation paths, and coordinating cross-functional response activities. Improving situational awareness through effective reporting templates, actionable security dashboards, real-time visibility mechanisms, and contextual intelligence distribution. Optimizing security tool usage by maximizing SIEM effectiveness, fine-tuning correlation rules, synthesizing multi-source data, ensuring system integration, and recommending enhancements. Implementing security automation by identifying suitable processes, designing workflows, developing scripts, implementing automated responses, and documenting procedures. Managing the security reporting lifecycle from data collection to distribution, ensuring timely delivery, implementing feedback mechanisms, establishing archival procedures, and meeting compliance requirements. Fostering an agile security approach through methodologies like security sprints, retrospectives, iterative development, and balancing agility with compliance requirements. Coordinating cross-functional security activities by serving as a liaison between teams, aligning initiatives with organizational goals, facilitating knowledge sharing, and building stakeholder relationships. Leading security tool integration through architecture design, API implementation, data normalization, integration testing, and documentation. Driving security data analytics by developing collection strategies, implementing advanced analytics, creating visualizations, designing KPIs, and leveraging data for decision-making. Managing security automation development by establishing coding standards, ensuring proper testing, implementing change management, and documenting solutions. This SETA role provides technical and programmatic support to government teams by translating mission needs into technical requirements, managing those requirements, and shaping strategic program direction. Responsibilities include contract support (SOWs, RFPs, cost proposals), performance monitoring, stakeholder coordination, and communicating complex concepts through reports, meetings, and senior-level briefings. The team ensures projects stay on track by overseeing cost, schedule, and performance. Required Qualifications: Experience concentrating on overall technical and operational effectiveness of capabilities. Experience providing recommendation on continuous improvement of the processes and architecture supporting the overall Cyber Defense operational activities including, but not limited to, analysis, incident handling and reporting products, and the reporting lifecycle. Experience providing effective incident response capabilities, usable and effective reports that address overall situational awareness. Experience maximizing the use of tools to correlate information and synthesize data into usable and actionable events. Experience identifying and providing an agile approach to the automation of any manual or efficient processes that exist across the cyber defense program. Required minimum skills and knowledge: US Citizenship is required. Active Top Secret/SCI clearance with Polygraph. Bachelor's degree in computer science, data science, or a related field. Multiple levels can be accommodated: Senior Level: Bachelor's degree + 6 years of experience OR Master's Degree + 4 years of experience OR PhD + 2 years of experience OR High School Diploma/GED + 10 years of experience OR Associate's degree + 8 years of experience Compensation: $117,800 - $184,100 Expert Level: Bachelor's degree + 8 years of experience OR Master's Degree + 6 years of experience OR PhD + 4 years of experience OR High School Diploma/GED + 12 years of experience OR Associate's degree + 10 years of experience Compensation: $142,600 - $222,850 Desired Qualifications: IC experience is highly desirable. Experience with having successfully demonstrated the ability to independently conduct the appropriate analysis to offer recommendations, solutions, and alternatives to resolve issues, concerns, problems, or methods. Experience in establishing strong working relationships with program managers as well as organization leadership; tracking task order efforts to rapidly identify and resolve potential and new problems; and identifying and resolving administrative and contractual issues related to a support services contract. Ability to solve problems in a rapidly changing environment, and interface with customers directly. Strong understanding of intelligence disciplines, methodologies, and the intelligence cycle. Ability to work in a fast paced, dynamic, and team environment.