Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data.
Monitoring external data sources to maintain currency of Computer Network Defense threat condition and determine which security issues may have an impact on the enterprise.
Client Agency is Department of Homeland Security.
100% Onsite; 2 hour on site reporting requirement remains (TS needed).
Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident.
Cardinal Technology Systems, Corp. is a government IT solutions provider servicing commercial and government initiative in various parts of the United States. We are currently seeking a Cyber Incident Manager to work for our company.
Correlating incident data to identify specific trends in reported incidents.
Recommending defense in depth principles and practices (i.e., Defense in Multiple Places, layered defenses, security robustness, etc.).
Receiving and analyzing network alerts from various sources within the enterprise and determine potential causes of such alerts.
Tracking and documenting Computer Network Defense (CND) incidents from initial detection through final resolution, and work with other components within the organization to obtain and coordinate information pertaining to ongoing incidents.
Providing support during assigned shifts (Monday through Friday, normal business hours).
Performing Computer Network Defense incident triage to include determining scope, urgency, and potential impact.
Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise.
United States Citizenship with a TOP SECRET Clearance. Sponsorship will not be provided.
Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability.
BS Incident Management, Operations Management, Cybersecurity, or related degree, or HS Diploma with 7-9 years of incident management or cyber security experience.
5+ years of directly relevant experience in cyber incident management or cybersecurity operations.
Knowledge of incident response and handling methodologies.
Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents.
Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident.
Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.).
Skill in recognizing and categorizing types of vulnerabilities and associated attacks
Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations.
Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation-state sponsored], and third generation [nation-state sponsored]).
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code).
Oral presentation experience and excellent oral and written communication skills.
GCIH, GCFA GISP, GCED, CCFP or CISSP.
Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation-state sponsored], and third generation [nation-state sponsored]).
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code).
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Providing support to plan, coordinate, and implement the lab’s information security
Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design and implementation of security related to lab systems
Possessing and applying expertise on multiple complex work assignments which are broad in nature, requiring originality and innovation in determining how to accomplish tasks
Our company is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. We are seeking an Information Security Manager to support this critical customer mission.
Has the ability to apply a comprehensive knowledge across key tasks and high impact assignments
Providing support to plan, coordinate, and implement the lab’s information security
Providing support for facilitating and helping the lab identify its current security infrastructure and defining future programs, design and implementation of security related to lab systems
Assisting the efforts of security staff to design, develop, engineer and implement solutions to security requirements
Responsible for implementing and developing the DHS IT security
Gathering and organizing technical information about the lab’s mission goals and needs, existing security products, and ongoing programs
Performing risk analyses which also includes risk assessment
Planning and leading major technology assignments
Evaluating performance results and recommending major changes affecting short-term project growth and success
Functioning as a technical expert across multiple project assignments.
U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
5+ years of directly relevant experience in information security
Knowledge of Computer Network Defense (CND) policies, procedures, and regulations
Knowledge of defense-in-depth principles and network security architecture
Knowledge of boundary protection and enclaving
Knowledge of several of the following areas is required: Understanding of business security practices and procedures; current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, and current lab infrastructure technology
Ability to serve as an Information System Security Officer (ISSO)
Must be able to work collaboratively across physical locations.
DHS experience
Cybersecurity skills including threat hunting.
Advanced knowledge of RMF framework
Experience working ATO’s
BS Information Management, Cybersecurity, Computer Science, or related degree; or HS Diploma and 7+ years information security experience.
Certifications: CISSO, CISM, CISSP
Knowledge of authentication and access management technologies
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols
The DHS’s Hunt and Incident Response Team (HIRT) secures the Nation’s cyber and communications infrastructure. HIRT provides DHS’s front line response for cyber incidents and proactively hunting for malicious cyber activity. Our company, as a prime contractor to DHS, performs HIRT investigations to develop a preliminary diagnosis of the severity of breaches. Our company provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking Host Forensics Analysts to support this critical customer mission.
Providing technical assistance on digital evidence matters and forensic investigative techniques to appropriate personnel when necessary
Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating evidence collection operations
Supporting forensic analysis and mentoring/providing guidance to others on data collection, analysis and reporting in support of onsite engagements.
Assisting with leading and coordinating forensic teams in preliminary investigation
Planning, coordinating and directing the inventory, examination and comprehensive technical analysis of computer related evidence
Distilling analytic findings into executive summaries and in-depth technical reports
Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement
Evaluating, extracting and analyzing suspected malicious code
Writing in-depth reports, supports with peer reviews and provides quality assurance reviews for junior personnel
U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
– 8+ years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools
Ability to create forensically sound duplicates of evidence (forensic images)
Able to write cyber investigative reports documenting digital forensics findings
Experience with the analysis and characterization of cyber attacks
Experience with proper evidence handing procedures and chain of custody protocols
Skilled in identifying different classes of attacks and attack stages
Knowledge of system and application security threats and vulnerabilities
Must be able to work collaboratively across physical locations.
Desired Skills/ Experience with or knowledge of two or more of the following tools: EnCase, FTK, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, Splunk, Snort, Other EDR Tools (Crowdstrike, Carbon Black, Etc), Proficiency with conducting all-source research.
BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics experience
Desired Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP
Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise.
Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data
Conducting cursory analysis of log data
Receiving and analyzing network alerts from various sources within the enterprise and determine possible causes of such alerts
Tracking and documenting Computer Network Defense (CND) incidents from initial detection through final resolution
Working with other components within the organization to obtain and coordinate information pertaining to ongoing incidents.
Providing support during assigned shifts
Our company is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. We are seeking a Cyber Threat Analyst to support this critical customer mission.
Applying knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats
Monitoring external data sources (e.g., Computer Network Defense vendor sites, Computer Emergency Response Teams [CERTs], SANS, Security Focus) to maintain currency of Computer Network Defense threat condition and determine which security issues may have an impact on the enterprise
Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident
U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
2+ years of directly relevant experience in cyber incident management or cybersecurity operations
Knowledge of incident response and handling methodologies
Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident
Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
Skill in recognizing and categorizing types of vulnerabilities and associated attacks
Knowledge of basic system administration and operating system hardening techniques
Knowledge of Computer Network Defense policies, procedures, and regulations
Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored])
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code)
Must be able to work collaboratively across physical locations
Required Education: BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with 4-6 years of incident management or cyber security experience.
Knowledge of basic system administration and operating system hardening techniques
Knowledge of Computer Network Defense policies, procedures, and regulations
Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored])
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code)
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Identify intelligence gaps, specify collection requirements to fill gaps in information, and evaluate resulting intelligence requirements.
Collaborate with internal and external stakeholders to mitigate cyber threats
Conduct in-person and virtual briefings on vulnerabilities or threat actors
Identify emerging cyber threats, vulnerabilities, trends, and recommend countermeasures
Improve VM capabilities and knowledge base through training and research
Ingest and analyze information from various classified and unclassified sources
Produce written reports summarizing gathered CTI
Our company is supporting a customer by delivering intelligence support to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability management (VM) efforts. In support of the customer’s strategic direction, we are looking for motivated individuals who can support the development of new and innovative Cyber Threat Intelligence techniques, to be the tip of the spear for VM’s threat intelligence capabilities.
Proactively gather, analyze, and disseminate timely and accurate CTI to support operational decision-making
U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
5+ years of directly relevant experience
Good understanding of intelligence analytical methods and sources
Demonstrated ability to integrate cyber security related data from relevant sources into investigative or analytical products
Ability to work within a multi-disciplined team
Must be able to work collaboratively across agencies and physical locations
Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting
Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system
Must have working familiarity with Open-Source Intelligence sources including the use of scraping tools and darkweb browsers
Must have sufficient technical knowledge to perform analysis on intelligence information to determine operational priorities
Required Education: BS Intelligence, Cybersecurity or related degree, or High School Diploma and 7 years of directly relevant experience.
Experience supporting Intelligence and/or DoD Customers
Experience performing network security or application security
Excellent verbal and writing skills
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Our company provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking Cyber Network Defense Analysts (CNDA) to support this critical customer mission.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
Identify and analyze anomalies in network traffic using metadata
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
Identify applications and operating systems of a network device based on network traffic
Reconstruct a malicious attack or activity based off network traffic
Identify network mapping and operating system (OS) fingerprinting activities
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
Perform cyber defense trend analysis and reporting
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
Provide daily summary reports of network events and activity relevant to cyber defense practices
The CDNA uses information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior. Monitoring and analysis are performed to identify and report events that occur, or might occur, within the network, in order to protect information, information systems, and networks from threats.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
Coordinate with enterprise-wide cyber defense staff to validate network alerts
Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
U.S. Citizenship
Active TS/SCI clearance
Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability
2+ years of direct relevant experience in cyber defense analysis using leading edge technologies and industry standard cyber defense tools
Experience successfully developing and deploying signatures
Experience detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
Experience implementing incident handling methodologies
Experience implementing protocol analyzers
Experience collecting data from a variety of cyber defense resources
Experience reading and interpreting signatures (e.g. snort)
Experience performing packet-level analysis
Experience conducting trend analysis
Required Education: BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 4+ years of network investigations experience.
Python programming experience
Strong math and science background
Experience with Carnegie Mellon SiLK tool suite
One or more of the following professional certifications: GNFA, GCIH, GCIA, GSEC, CASP+, CySA+, PaLMS, FedVTE
GSEC (SANS401), Arcsight (or other SEIM solution), Network+, Security+
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
The DHS’s Hunt and Incident Response Team (HIRT) secures the nation’s infrastructure. HIRT provides DHS’s front-line response for cyber incidents and proactive hunting for malicious cyber activity. Our company provides support for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Our company provides HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. We are seeking a Cyber Security Technical Writer to support this critical customer mission.
Developing and reviewing technical communications deliverables including engineering documentation, operational procedures, plans, action reports, and meeting minutes, coordinating with engineering teams to obtain necessary input data
Creating, reviewing, editing and maintaining technical drawings
Preparing, reviewing, editing and maintaining program technical documents including software and system engineering documents, CONOPS, test reports, user documentation, implementation documentation, etc
U.S. Citizenship
Must have an active Secret clearance and be able to obtain a TS/SCI clearance
Must be able to obtain DHS Suitability
5+ years of technical writing experience including developing communications deliverables plans, action reports, and meeting minutes for internal and external cyber audiences
Experience with creating and maintaining information system security documentation and SOPs
Excellent hands-on experience with Microsoft Office including MS Word, PowerPoint and Visio or related tools
Fluid technical writing and editing skills, including the use of AP Style
Ability to research and analyze complex technical material and break it down into concise, compelling copy that engages the reader
Ability to work under pressure with clients, federal leads and subject matter experts in a fast-paced cybersecurity environment
Ability to capture meeting discussions at a rapid pace using either shorthand and/or typing fast
Required Education: Bachelor’s degree from an accredited college or university in English, Business or related, or 7+ years technical writing and editing experience with a high school diploma
Experience working in a cyber or an IT environment
Experience with creating technical briefings including executive leadership briefings
Familiarity with cybersecurity communications language and subject matter
Experience with software or agile development methodologies
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Serve as the first level Help Desk for the TEN Lab’s systems and accounts.
Good problem solving skills
Provide support for TEN Accounts, Virtual Private Network (VPN), Virtual Desktop Infrastructure (e.g., Citrix), and MacBook to users
Provide insight and updates to lab standard operating procedures (SOPs) and Work Instructions
Our company is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. we are seeking a Technical Engagement Network (TEN) Help Desk Technicians to support this critical customer mission
Assist new user setup of equipment, accounts and tools
Respond to user requests via email, walk-ins, phone calls or other communication means in a timely manner
Create and maintain accurate Tickets for Help Desk activities
Work with Asset Management to support accurate records and maintain a good accounting of assets
Support the implementation of new technologies and equipment in the lab environment
Provide support as needed to lab staff in the tasks of provisioning and issuing equipment to end users, as well as maintaining inventory database
Provide support for systems administration tasks such as patching, updating, and maintaining network infrastructure
U.S. Citizenship
Must have an active DoD Secret clearance, TS/SCI clearance is preferred.
Must be able to obtain DHS Suitability
1+ years of directly relevant experience
Experience with multiple operating systems, to include Windows, Linux/Unix & MacOS
Proficiency and proven capability in the following areas: Asset management practices and principles, Help Desk ticket processing and procedures, good customer support, ability to keep detailed notes, must be able to work collaboratively across physical locations.
Required Education: BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree; or HS Diploma and 3+ years of directly relevant experience.
U.S. Citizenship
Must have an active DoD Secret clearance, TS/SCI clearance is preferred
Must be able to obtain DHS Suitability
1+ years of directly relevant experience
Experience with multiple operating systems, to include Windows, Linux/Unix & MacOS
Proficiency and proven capability in the following areas: Asset management practices and principles, Help Desk ticket processing and procedures, good customer support, ability to keep detailed notes, must be able to work collaboratively across physical locations
Required Education: BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree; or HS Diploma and 3+ years of directly relevant experience
Experience with writing technical procedures and standard operating procedures.
Virtualization automation and optimization.
Experience with Virtual Private Networks (VPN).
Experience with virtual desktops (Citrix, VMWare).
Desired Certifications: Security+
Medical, Dental, Vision Benefits
Paid Vacation, Holidays, Sick Leave, Floating Holidays
Bereavement Leave
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Our company is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. We are seeking a Technical Writer to support this critical customer mission.
Preparing, reviewing, editing, and maintaining program technical documents, standard operation procedures, work instructions, CONOPS, and internal team messaging.
Maintaining statistical diagrams and charts of team engagement reports.
U.S. Citizenship
Must have an active TS/SCI
Must be able to obtain DHS Suitability
5+ years of technical writing experience including developing cybersecurity communications deliverables such as documentation, plans, action reports, and meeting minutes for internal and external audiences
Experience with creating and maintaining government records associated with cybersecurity activities, documentation, and SOPs
Excellent hands-on experience with Microsoft Office Suite, Adobe Products, and GSuite
Fluid technical writing and editing skills, including the use of AP Style and/or government agency directed style guides
Ability to work with technical cyber analysts to evaluate material and break it down into concise, compelling narrative that engages the reader
Ability to work under pressure with engagement leads, technical analysts, and subject matter experts in a fast-paced cybersecurity environment to ensure timely product release
Required Education: Bachelor’s degree from an accredited college or university in English, Business or related; or high school diploma and 7+ years of relevant experience
Desired Skills: Familiarity with cybersecurity communications terminology, concepts, and subject matter
Experience with creating technical briefings including executive leadership briefings
Understanding of different communication styles and formats
Desired Certifications: Sec+
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Our company is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. We are seeking a Technical Writer to support this critical customer mission.
Developing and reviewing technical communications deliverables including cybersecurity documentation, operational procedures, plans, action reports, and meeting minutes, coordinating with Incident Management teams to obtain necessary input data
Preparing, reviewing, editing, and maintaining program technical documents, standard operation procedures, work instructions, CONOPS, and internal team messaging
Maintaining statistical diagrams and charts of team engagement reports
U.S. Citizenship
Must have an active TS/SCI
Must be able to obtain DHS Suitability
5+ years of technical writing experience including developing cybersecurity communications deliverables such as documentation, plans, action reports, and meeting minutes for internal and external audiences
Experience with creating and maintaining government records associated with cybersecurity activities, documentation, and SOPs
Excellent hands-on experience with Microsoft Office Suite, Adobe Products, and GSuite
Fluid technical writing and editing skills, including the use of AP Style and/or government agency directed style guides
Ability to work with technical cyber analysts to evaluate material and break it down into concise, compelling narrative that engages the reader
Ability to work under pressure with engagement leads, technical analysts, and subject matter experts in a fast-paced cybersecurity environment to ensure timely product release
Required Education: Bachelor’s degree from an accredited college or university in English, Business or related; or high school diploma and 7+ years of relevant experience
Desired Skills: Familiarity with cybersecurity communications terminology, concepts, and subject matter
Experience with creating technical briefings including executive leadership briefings
Understanding of different communication styles and formats
Desired Certifications: Sec+
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
The DHS’s Hunt and Incident Response Team (HIRT) secures the nation’s infrastructure. HIRT provides DHS’s front-line response for cyber incidents and proactive hunting for malicious cyber activity. Our company provides support for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. We provide HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. Personnel perform investigations to characterize the level of severity of breaches and develop mitigation/remediation plans. We are seeking Network Forensics Cybersecurity Analysts to support this critical customer mission.
Assists the Government lead with interfacing with the customer while on site
Determines appropriate courses of actions in response to identified and analyses anomalous network activity
Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations
Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies
Collects network intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents
Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information
Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements
Provide technical briefings as required
Assists the Government lead in coordinating teams in preliminary incident response investigations
U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
8+ years of directly relevant experience in network investigations
In depth knowledge of CND policies, procedures and regulations
In depth knowledge of standard protocols – ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, TCP/IP
In depth knowledge and experience of Wifi networking
In depth knowledge and experience of network topologies – DMZ’s, WAN’s, etc.
Substantial knowledge of Splunk (or other SIEM’s)
Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
Knowledge of Computer Network Defense policies, procedures, and regulations
Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture
Proficiency with carving and extracting information from PCAP data
Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
Ability to identify and analyze anomalies in network traffic using metadata
Experience with reconstructing a malicious attack or activity based on network traffic
Experience examining network topologies to understand data flows through the network
Must be able to work collaboratively across physical locations
Substantial knowledge of network device integrity concepts and methodologies
Proficiency with preserving evidence integrity according to standard operating procedures or national standards
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10+ years of network investigations experience.
Certifications: DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst, GCIA, GCIH, CSSP Analyst/CSSP Incident Responder, CEH, SANS GIAC GNFA preferred
Proficiency with virtualized environments
Proficiency with non-traditional network traffic (e.g. Command and Control)
Proficiency with network analysis software (e.g. Wireshark)
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Performing risk analyses which also includes risk assessment
Providing support to plan, coordinate, and implement the lab’s information security
Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design and implementation of security related to lab systems
Providing support to plan, coordinate, and implement the lab’s information security
Providing support for facilitating and helping the lab identify its current security infrastructure and defining future programs, design and implementation of security related to lab systems
Assisting the efforts of security staff to design, develop, engineer and implement solutions to security requirements
Gathering and organizing technical information about the lab’s mission goals and needs, existing security products, and ongoing programs
Cardinal Technology Systems, Corp. is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services
Responsible for implementing and developing the DHS IT security
Has the ability to apply a comprehensive knowledge across key tasks and high impact assignments
Planning and leading major technology assignments
Evaluating performance results and recommending major changes affecting short-term project growth and success
Functioning as a technical expert across multiple project assignments
Possessing and applying expertise on multiple complex work assignments which are broad in nature, requiring originality and innovation in determining how to accomplish tasks
U.S. Citizenship
Must have an active Secret clearance; TS/SCI clearance highly preferred
Must be able to obtain DHS Suitability
BS Information Management, Cybersecurity, Computer Science, or related degree; or HS Diploma and 4-6 years information security experience.
2+ years of directly relevant experience in information security
Knowledge of Computer Network Defense (CND) policies, procedures, and regulations
Knowledge of defense-in-depth principles and network security architecture
Knowledge of boundary protection and enclaving
Knowledge of authentication and access management technologies
Knowledge of several of the following areas is required: Understanding of business security practices and procedures; current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, and current lab infrastructure technology
Ability to serve as an Information System Security Officer (ISSO)
Must be able to work collaboratively across physical locations
DHS experience
Cybersecurity skills including threat hunting.
Advanced knowledge of RMF framework
Experience working ATO’s
One of the following certifications: CISSO, CISM, CISSP
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Must be eligible to obtain a U.S. Government SECRET / TOP SECRET Clearance. (Basic Federal Clearance requirements are U.S. Citizenship, clear criminal history check, no recent or pending bankruptcies)
Will develop custom and COTS (Commercial Off-The-Shelf) user interfaces for data visualization
Will create intuitive, interactive visualizations to simplify and analyze complex datasets
Will design and deliver visualizations that address strategic and tactical mission goals
Will build medium-complexity queries and stored procedures to support dynamic data visualizations
Will use tools such as D3, HTML, and JavaScript to develop custom visualizations
Will leverage enterprise data visualization tools like Qlik and SAP Lumira to meet organizational needs
Will develop visualizations for ERP transactional and analytical data models
Will work iteratively with business stakeholders to gather requirements and create enterprise-level visualizations using agile methodologies
Must be eligible to obtain a U.S. Government SECRET / TOP SECRET Clearance. (Basic Federal Clearance requirements are U.S. Citizenship, clear criminal history check, no recent or pending bankruptcies)
Must have a bachelor’s degree
Must have 5+ years of relevant experience
Must have hands on experience designing and developing custom visualizations using tools like D3, HTML, and JavaScript
Must have hands-on experience with COTS visualization platforms such as Qlik and SAP Lumira
Must have previous experience developing visualizations tailored to ERP transactional and analytical data
Must have previous experience creating medium-complexity queries and stored procedures to enable dynamic data representation
Must have previous experience applying agile methodologies to gather requirements and iterate with stakeholders
Must be willing and able to work a HYBRID schedule (2 days a week in office) at Fort Belvoir, VA
Work location flexibility
Experience with the creation and analysis complex datasets
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
The DHS’s Hunt and Incident Response Team (HIRT) secures the Nation’s cyber and communications infrastructure. HIRT provides DHS’s front-line response for cyber incidents and proactively hunting for malicious cyber activity. Our company, as a prime contractor to DHS, performs HIRT investigations to develop a preliminary diagnosis of the severity of breaches. Our company provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking Cyber Network Defense Analysts (CNDA) to support this critical customer mission. The Computer Network Defense Analyst uses information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior. Monitoring and analysis are performed to identify and report events that occur, or might occur, within the network, in order to protect information, information systems, and networks from threats. CNDAs review data collected to analyze cyber events, and the network environment, to find trends, patterns or anomaly correlations that indicate more serious attacks or future threats. The CNDAs will recommend proactive measures to contain the incident. These proactive measurers include, but are not limited to, identification of intruder local changes/suspect interactions, isolation, in-depth digital media analysis, consultation with law enforcement or counterintelligence organizations, development of signatures to detect this malicious behavior and development and deployment of eradication tools.
Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
Identify applications and operating systems of a network device based on network traffic
Prepare and present reports
Plan and carry out difficult and complex assignments and develop new methods, approaches, and procedures
Conduct analyses and recommend resolution of complex issues affecting the specialty area
Ensure optimal use of commercially available products
Evaluate the effectiveness of installed systems and services
Provide daily summary reports of network events and activity relevant to cyber defense practices
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Determine tactics, techniques, and procedures (TTPs) for intrusion sets
Examine network topologies to understand data flows through the network
Identify and analyze anomalies in network traffic using metadata
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
Reconstruct a malicious attack or activity based off network traffic
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan
Reconstruct a malicious attack or activity based off network traffic
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
Approximately 25% of the CNDA’s time will be spent executing the following tasks:
Prepare and update manuals, instructions, and operating procedures
Evaluate established methods and procedures and prepare recommendations for changes in methods and practices where appropriate
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
The majority of the CNDA’s time (75%) will be spent executing the following tasks: Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
Coordinate with enterprise-wide cyber defense staff to validate network alerts
Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
Perform cyber defense trend analysis and reporting
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
U.S. Citizenship
Active TS/SCI clearance
Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability
5+ years of direct relevant experience in cyber defense analysis using leading edge technologies and industry standard cyber defense tools- Experience successfully developing and deploying signatures
Experience detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
Experience implementing incident handling methodologies
Experience implementing protocol analyzers
Experience collecting data from a variety of cyber defense resources
Experience reading and interpreting signatures (e.g. snort)
Experience performing packet-level analysis
Experience conducting trend analysis
Required Education: BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7-9 years of network investigations experience.
GSEC (SANS401), Arcsight (or other SEIM solution), Network+, Security+ and Python programming experience would be ideal.
Strong math and science background.
Experience with Carnegie Mellon SiLK tool suite.
One or more of the following professional certifications: GNFA, GCIH, GCIA, GSEC, CASP+, CySA+, PaLMS, FedVTE
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Cardinal Technology Systems, Corp. is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services.
Designing, troubleshooting, and implementing software code for end-to-end software development
Designs, develops, enhances, debugs, integrates, and implements software
Troubleshoots production problems related to software applications
Researches, tests, builds, and coordinates the integration of new products based on user requirements
Initiates action for evaluation and recommendation of application software packages, application integration and testing tools
Resolves problems with software and responds to suggestions for improvements and enhancements
Implements recommendations for improving documentation and development process standards
U.S. Citizenship
Must have an active Secret clearance; TS/SCI is preferred
Must be able to obtain DHS Suitability
BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree; or HS Diploma & 7+ years of directly relevant experience.
5+ years of directly relevant experience in applications development
Knowledge of secure software development lifecycle and code versioning and maintenance
Experience with assessing and integrating commercial off the shelf (COTS) products
Knowledge and familiarity to work with the installation, demonstration, test, validation and evaluation of new and existing software, tools, methods, and software measurement technologies
Must have operational experience with Python
Knowledge of software application development and RESTful architecture
Knowledge of data transformation and manipulation via code
Experience working and developing in/with containerization software including Kubernetes and Docker
Must have strong communication skills and have experience interacting and with customers directly in a project environment or technical demonstration
Must be able to work collaboratively across remote and physical locations
Experience with two or more of the following: Python, Silk, JSON, Data Analytics, MongoDB, Elastic Search, Postgress, Ansible, Vue.js, React, HTML, Kubernetes, Docker, Podman, AWS, View Jazz Framework, Process Automation, UI Development, CI/CD knowledge
One of the following certification: CSSLP or Security+
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Cardinal Technology Systems, Corp. is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services.
Designing, troubleshooting, and implementing software code for end-to-end software development
Designs, develops, enhances, debugs, integrates, and implements software
Troubleshoots production problems related to software applications
Researches, tests, builds, and coordinates the integration of new products based on user requirements
Resolves problems with software and responds to suggestions for improvements and enhancements
Initiates action for evaluation and recommendation of application software packages, application integration and testing tools
Implements recommendations for improving documentation and development process standards
U.S. Citizenship
Must have an active Secret clearance; TS/SCI is preferred
Must be able to obtain DHS Suitability
BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree; or HS Diploma & 4-6 years of directly relevant experience.
2+ years of directly relevant experience in applications development
Knowledge of secure software development lifecycle and code versioning and maintenance
Experience with assessing and integrating commercial off the shelf (COTS) products
Knowledge and familiarity to work with the installation, demonstration, test, validation and evaluation of new and existing software, tools, methods, and software measurement technologies
Must have operational experience with Python
Knowledge of software application development and RESTful architecture
Knowledge of data transformation and manipulation via code
Experience working and developing in/with containerization software including Kubernetes and Docker
Must have strong communication skills and have experience interacting and with customers directly in a project environment or technical demonstration
Must be able to work collaboratively across remote and physical locations
Experience with two or more of the following: Python, Silk, JSON, Data Analytics, MongoDB, Elastic Search, Postgress, Ansible, Vue.js, React, HTML, Kubernetes, Docker, Podman, AWS, View Jazz Framework, Process Automation, UI Development, CI/CD knowledge
One of the following certifications: CSSLP or Security+
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Preparing, reviewing, editing, and maintaining program technical documents, standard operation procedures, work instructions, CONOPS, and internal team messaging
We are seeking a Technical Writer & Editor to support a critical customer mission that provides support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. This position
Maintaining statistical diagrams and charts of team engagement reports
Developing and reviewing technical communications deliverables including cybersecurity documentation, operational procedures, plans, action reports, and meeting minutes, coordinating with Incident Management teams to obtain necessary input data
U.S. Citizenship
Must have an active TS/SCI
Must be able to obtain DHS Suitability
Hybrid work schedule that requires one to two (1-2) days of onsite work and a two (2) hour onsite reporting requirement
Bachelor’s degree from an accredited college or university in English, Business or related, or 5+ years technical writing and editing experience with a high school diploma
Five (5) + years of technical writing experience including developing cybersecurity communications deliverables such as documentation, plans, action reports, and meeting minutes for internal and external audiences
Experience with creating and maintaining government records associated with cybersecurity activities, documentation, and SOPs
Excellent hands-on experience with Microsoft Office Suite, Adobe Products, and GSuite
Fluid technical writing and editing skills, including the use of AP Style and/ or government agency directed style guides
Ability to work with technical cyber analysts to evaluate material and break it down into concise, compelling narrative that engages the reader
Ability to work under pressure with engagement leads, technical analysts, and subject matter experts in a fast-paced cybersecurity environment to ensure timely product release
One of the following certifications: Sec+, ITILv4
Familiarity with cybersecurity communications terminology, concepts, and subject matter
Experience with creating technical briefings including executive leadership briefings
Understanding of different communication styles and formats
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
We are seeking a Cyber Forensics Analysts to support the DHS Hunt and Incident Response Team (HIRT). This team secures the Nation’s cyber and communications infrastructure while providing front line response for cyber incidents and hunting for malicious cyber activity.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations
Collects network intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and uses discovered data to enable mitigation of potential incidents
Collects network device integrity data and analyze for signs of tampering or compromise
Analyzes identified malicious network and system log activity to determine weaknesses exploited, exploitation methods, effects on system and information
Planning, coordinating, and directing the inventory, examination, and comprehensive technical analysis of computer related evidence
Serving as technical forensics liaison to stakeholders and explaining investigation details
Tracking and documenting on-site incident response activities and providing updates to leadership through executive summaries and in-depth technical reports
U.S. Citizenship
Must have an active TS clearance or higher and able to obtain DHS Suitability
8+ years of directly relevant experience in cyber forensic and network investigations using leading edge technologies and industry standard forensic tools
8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering, or related degree; or HS Diploma and 10+ years of host or digital forensics or network forensic experience
Experience with reconstructing a malicious attack or activity
Ability to characterize and analyze network traffic, identify anomalous activity / potential threats, analyze anomalies in network traffic using metadata
Ability to create forensically sound duplicates of evidence (forensic images)
Ability to write cyber investigative reports documenting forensics findings
In depth knowledge of: CND policies, procedures, and regulations; system and application security threats and vulnerabilities; network topologies; Wi-Fi Networking; TCP/IP protocols
In depth experience with: identifying different classes and characterization of attacks and attack stages; proactive analysis of systems and networks, to include creating trust levels of critical resources; Splunk (or other SIEMs); Vulnerability scanning, assessment, and monitoring tools such as Security Center, Nessus, and Endgame; MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
Must be able to work collaboratively across physical locations
One of the following certifications: GIAC, GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA
Preferred to have an active TS/SCI clearance
EnCase, FTK, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, and Snort
EDR Tools: Crowdstrike, Carbon Black, Etc.
Carving and extracting information from PCAP data
Non-traditional network traffic: Command and Control, Preserving evidence integrity according to national standards, Designing cyber security systems and environments in a Linux environment, Virtualized environments, and Conducting all-source research
• Medical, Dental, Vision Benefits
• Paid Life
• Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
• Semi-monthly pay cycle
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Cardinal Technology Systems, Corp. is a government IT solutions provider servicing commercial and government initiative in various parts of the United States. We are currently seeking a Lab Manager/System Administrator to work for our company
Client Agency is Department of Homeland Security
Implementing infrastructure solutions supporting command decision making and execution of mission requirements
Providing support for systems administration tasks such as patching, updating, and maintaining network infrastructure
Supporting the implementation of new technologies and equipment in the lab environment
Provision and provide support for Virtual Private Network (VPN) or Virtual Desktop Infrastructure (e.g.,Citrix) to users
Performing large scale configuration management and deployment across Windows, MacOS, Linux/Unix, and other operating systems and virtual environments
VMware administration responsible for configuration, maintenance, monitoring, and overall support of multiple VMware environments
Setup, install, configure, and triage ESXi Hosts (Rack Mount and Blade Servers)
Performing implementation of granular access control
Participate in a rotating On Call coverage for after hours and weekends support
Maintain and restore VM backups and snapshots
Meet compliance for Information Security Vulnerability Management (ISVMs) and Intelligence Community Vulnerability Alert (ICVAs)
Perform Systems Lifecycle management for all equipment, including planning, implementation, maintenance, upgrades, consolidation, and decommissioning of enterprise hardware, and software
Detects, isolates, documents, reports, and resolves system outages or problems encountered during operations of the operational baseline, which includes collecting diagnostic data, restore the system operation, developing workarounds, and other activities necessary for recovery of a system
Performs system monitoring, analyzing, documenting performance, and conducting trend analysis as required
Manage system requirements and derived requirements to ensure the system is compatible with defined architecture and meets customer needs
Develop technical documentation, including SOPs, user guides, test plans, disaster recovery, failover, and other CDRL items
United States Citizenship with a TOP SECRET Clearance. Sponsorship will not be provided
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 4 years of Linux system administration with VMware VCenter experience
2 + years of system administration in Red Hat version 6 or 7(RHEL6/RHEL7) with the ability to engineer, install, administer, and maintain complex system architectures
Experience with rack/wiring diagrams, firmware, and driver management
Must have the ability to multi-task in a dynamic environment with changing priorities
Ability to work well both independently and in a team environment as needed
Experience with NSX, vROPs, and SRM
Oral presentation experience and excellent oral and written communication skills
VMware Certified Professional (VCP)
Strong knowledge of VMware to include vCenter, vSphere, and ESXi 6.x and 7.x, vCloud Suite, Vmotion, and Veeam
Solid understanding of networking, VLAN, and VXLAN
Ability to configure and integrate storage devices (SAN, NAS) supporting VMware infrastructure
Knowledgeable and experience in application of STIGs to secure VMware services and applications
Demonstrated experience and/or familiarity with one of more of the following: ACLs, ISVM, ICVA, STIGS, etc
Medical, Dental, Vision Benefits
Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Cardinal Technology Systems, Corp. is a government IT solutions provider servicing commercial and government initiative in various parts of the United States. We are currently seeking a Lab Manager/System Administrator to work for our company
Client Agency is Department of Homeland Security
Employing security concepts, theories, insights, tools, and methodologies to mitigate system weaknesses and vulnerabilities
Appling advanced analytical skills and technical resources at the tactical levels and implementing infrastructure solutions supporting command decision making and execution of mission requirements
Providing support for systems administration tasks such as patching, updating, and maintaining network infrastructure
Supporting the implementation of new technologies and equipment in the lab environment
Performing large scale configuration management and deployment across Windows, MacOS, Linux/Unix,and other operating systems and virtual environments
Performing implementation of granular access control
Monitor RedHat platforms security and health, create and maintain reports of findings daily
Create next-generation application platform automation solutions utilizing RedHat Openshift, RedHat Ansible automation, Docker, Kubernetes, and Podman
Integrate and configure COTS, GOTS, and third-party applications into RedHat Openshift and demonstrate ability to manage, maintain and patch containerized applications
Create and support development of automation solutions for deployment of systems and applications to virtual and physical devices using RedHat Openshift, RedHat Ansible Tower, and RedHat Satellite
United States Citizenship with a TOP SECRET Clearance. Sponsorship will not be provided
Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7 years of Linux system administration with RedHat OpenShift experience
5+ years of system administration in Red Hat version 6 or 7(RHEL6/RHEL7) with the ability to engineer, install, administer, and maintain complex system architectures
Extensive experience in centralized patch management using Red Hat Solutions
Extensive knowledge in containerized environments
Proficiency with configuration management using Ansible or Puppet
Skilled in Linux-related scripting (Bash, Perl, Python, etc.)
Knowledge and understanding of operating systems, networks, and services
Manage changes to system and assesses the security impact of those changes
Strong research, analytical, and problem-solving skills
Good communication skills including preparing and presenting results, findings and alternatives and influencing management decision making based on the best available data
Red Hat Certified System Administrator (RHCSA).
Red Hat Certified Engineer (RHCE).
Kerberos/LDAP
OpenShift
IDM/Free IPA
Docker
Ambari
Ansible
Puppet
Satellite Server
Nagios
Medical, Dental, Vision Benefits
Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Brief project management, technical design, and outcomes to both technical and non-technical audiences including senior government stakeholders throughout the model development/ project lifecycle through written as well as in-person reporting
Cardinal Technology Systems, Corp. is a government IT solutions provider servicing commercial and government initiative in various parts of the United States. We are currently seeking a Senior Data Scientist to work for our company
Client Agency is U.S. Customs and Border Protection
Perform hands-on analysis and modeling involving the creation of intervention hypotheses and experiments, assessment of data needs and available sources, determination of optimal analytical approaches, performance of exploratory data analysis, and feature generation (e.g., identification, derivation, aggregation)
Collaborate with mission stakeholders to define, frame, and scope mission challenges where big data interventions may offer important mitigations and develop robust project plans with key milestones, detailed deliverables, robust work tracking protocols, and risk mitigation strategies
Demonstrate proficiency in extracting, cleaning, and transforming CBP transactional and mission data associated within an identified problem space to build predictive models as well as develop appropriate supporting documentation
Leverage knowledge of a variety of statistical and machine learning techniques and methods to define and develop programming algorithms; train, evaluate, and deploy predictive analytics models that directly inform mission decisions
Execute projects including those intended to identify patterns and/or anomalies in large datasets; perform automated text/data classification and categorization as well as entity recognition, resolution and extraction; and named entity matching
United States Citizenship with the ability to obtain a U.S. Customs and Border Protection suitability. Sponsorship will not be provided
One CE certification: Oracle/WebLogic, Microsoft, Sun, Okta, or AWS -OR- Relevant certification from a nationally recognized technical authority
Bachelor’s Degree (required), Master’s or Ph.D. degree (preferred) in operations research, industrial engineering, mathematics, statistics, computer science/engineering, or other related technical fields with equivalent practical experience
5+ years of related experience
Experience in developing machine learning models and applying advanced analytics solutions to solve complex business problems
Experience with programming languages including: R, Python, Scala, Java
Proficiency with SQL programming
Experience constructing and executing queries to extract data in support of EDA and model development
Proficiency with statistical software packages including: SAS, SPSS Modeler, R, WEKA, or equivalen
Experience with pattern recognition and extraction, automated classification, and categorization
Experience with entity resolution (e.g., record linking, named-entity matching, deduplication/disambiguation)
Experience with unsupervised and supervised machine learning techniques and methods
Experience performing data mining, analysis, and training set construction
Oral presentation experience and excellent oral and written communication skills
Master’s Degree in mathematics, statistics, computer science/engineering, or other related technical fields with equivalent practical experience
Proficiency with Unsupervised Machine Learning methods including Cluster Analysis (e.g., K-means, K-nearest Neighbor, Hierarchical, Deep Belief Networks, Principal Component Analysis), Segmentation, etc
Proficiency with Supervised Machine Learning methods including Decision Trees, Support Vector Machines, Logistic Regression, Random/Rotation Forests, Categorization/Classification, Neural Nets, Bayesian Networks, etc
Experience with pattern recognition and extraction, automated classification, and categorization
Experience with entity resolution (e.g., record linking, named-entity matching, deduplication/ disambiguation)
Experience with visualization tools and techniques (e.g., Periscope, Business Objects, D3, ggplot, Tableau, SAS Visual Analytics, PowerBI)
Experience with big data technologies (e.g., Hadoop, HIVE, HDFS, HBase, MapReduce, Spark, Kafka, Sqoop)
Medical, Dental, Vision Benefits
Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
Cardinal Technology Systems, Corp (“CTech-Sys”), www.ctech-sys.com, is an SBA Certified 8(a) and HUBZone company located in the National Capital Region (NCR) and serves both government and commercial clients such clients as US CBP, US CIS, DLA, DFuse Technologies, and American Environmental Engineering Consultants.
Cardinal Technology Systems, Corp is an Equal Employment Opportunity employer and it’s our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, or any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. CTech-Sys is committed to actively capitalizing on the diversity of skills, talents and perspectives of our employees.
Paid vacation, holidays, sick leave, floating holidays, and bereavement leave : At Cardinal, we believe that time off is essential for maintaining a healthy work-life balance and supporting overall well-being. Our comprehensive leave policies, including paid vacation, holidays, sick leave, floating holidays, and bereavement leave, are designed to ensure employees have the flexibility and support they need to recharge and manage personal commitments.
Vision and dental insurance : Cardinal provides a competitive Vision and Dental insurance for our eligible Full-Time Employees. Employee is covered at 100%, spouse/domestic partner and family are covered at 50% by the company.
Comprehensive medical coverage with two plan options: Cardinal offers competitive medical coverage for eligible full-time employees. Employee coverage is fully funded at 100%, while coverage for spouses, domestic partners, and families is partially funded at 50% by the company.
Certification Assistance: Cardinal is committed to supporting employees in their professional development by offering certification assistance. This benefit reflects our dedication to helping employees enhance their skills and advance in their careers. To participate in this program, employees must have been with the company for at least one year, be full-time, obtain pre-approval, and sign a reimbursement agreement. Employees must remain with the company for at least 18 months after completing the certification to avoid reimbursement obligations.