Endpoint Security Analyst (TS/SCI) at Piper Companies
Fort Meade, Maryland, USA -
Full Time


Start Date

Immediate

Expiry Date

23 Nov, 25

Salary

150000.0

Posted On

23 Aug, 25

Experience

8 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cnd, Cissp, Eligibility, Gcia, Security+, Gcih

Industry

Information Technology/IT

Description

Zachary Piper Solutions is seeking an Endpoint Security Analyst to support a critical 24x7 operations center for DoD Information Network at Ft. Meade, MD. The team is seeking a skilled analyst and incident responder to provide detection, identification, response and reporting of a high visibility network. 

QUALIFICATIONS OF THE ENDPOINT ANALYST:

  • Bachelor’s degree in a relevant field and 8+ years of combined education and professional experience; equivalent experience may be considered in place of a degree.
  • Active DoD TS/SCI clearance with eligibility for Counterintelligence (C/I) Polygraph.
  • Possession of IAT/IAM Level II or III certification, such as Security+, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, or CEH.
  • Strong understanding of cybersecurity operations and security architecture.
  • Deep expertise in:
  • Network and application protocols
  • Cyber vulnerabilities and exploitation methods
  • Adversary tactics, techniques, and procedures (TTPs)
Responsibilities
  • Conduct analysis of architectures, technologies, Department of Defense (DoD) policies, and critical information assets.
  • Design and implement cybersecurity and risk assessment methodologies to support the prevention, detection, and mitigation of anomalous activities, vulnerabilities, and inefficiencies.
  • Prepare and deliver briefings tailored for senior leadership, including general and flag officers.
  • Evaluate enterprise cybersecurity defense strategies to enhance operational effectiveness, security posture, and command and control capabilities.
  • Assess network infrastructure and recommend strategies to minimize or manage potential adverse impacts.
  • Establish standards, metrics, and performance indicators to support assessments, drive process improvements, and enhance operational efficiency across the DoD Information Network (DoDIN).
  • Demonstrate expert-level knowledge across various cybersecurity domains, including but not limited to:
  • Boundary Security: Identify and maintain awareness of the DoDIN boundary, including Internet Access Points (IAPs), peering locations, and other major ingress/egress points. Document boundary architectures and assess deployed defensive capabilities and sensor data availability.
  • Endpoint Security: Conduct analysis and provide enterprise-level strategies for endpoint compliance and integration with mid-tier and boundary security solutions.
  • Cloud Security: Develop and implement strategies to monitor, detect, and prevent unauthorized access and manipulation of cloud-based services.
Loading...