Cyber Security Support Engineer - Secret Clearance
Dayton, OH
Job Id:
140609
Job Category:
Job Location:
Dayton, OH
Security Clearance:
Secret
Business Unit:
Piper Companies
Division:
Piper Enterprise Solutions
Position Owner:
Brendan McGowan
Piper Companies is looking for a Cyber Security Support Engineer to join a government contractor in Dayton, OH. This role requires the candidate to have an active Secret Clearance
Essential Duties of the Cyber Security Support Engineer:
- Develop interface specifications for use within the enclave environments
- Confirm that enclave systems and network designs support the incorporation of DoD directed vulnerability solutions
- Maintain a schedule for upcoming software and hardware upgrades and follow procedures for regularly scheduled maintenance
- Confirm secure backup of systems and data through formally documented backup plan
Qualifications of the Cyber Security Support Engineer:
- Bachelors degree in Computer Science or related field
- At least 5 years Linux and 3 years IPS, IDS experience required
- Sec + certification required
- Linux +, CASP and CEH certs highly preferred
- Red/Blue Pen testing experience required
- Active Secret clearance required
Compensation for the Cyber Security Support Engineer:
- $150,000 - $170,000 (based on experience)
- Comprehensive benefit package; Cigna Medical, Cigna Dental, Vision, 401k w/ ADP, PTO, paid holidays, sick Leave as required by law
This job opens for applications on 3/6/25. Applications for this job will be accepted for at least 30 days from the posting date
#LI-ONSITE
#LI-BM2
linux, network, sys admin, systems administrator, lan, local area network, wan, wide area network, sec+, security +, sec +, user support, ccna, network engineer, cisco, security, penetration testing, red team, blue team, vulnerability, certified ethical hacker, Cyber Security, Information Security, Network Security, Linux, Unix, Shell Scripting, Bash, Command Line Interface (CLI), Kernel, Systemd, Init, Daemons, Cron Jobs, Package Management, RPM (Red Hat Package Manager), DEB (Debian Package), YUM, APT, DNF, Software Repositories, LVM (Logical Volume Manager), Filesystem, EXT4, XFS, Btrfs, NFS (Network File System), SMB (Server Message Block), CIFS (Common Internet File System), RAID (Redundant Array of Independent Disks), Backup, Restore, Disaster Recovery, High Availability, Load Balancing, Clustering, Virtualization, KVM (Kernel-based Virtual Machine), QEMU, Docker, Containers, Kubernetes, OpenShift, Ansible, Puppet, Chef, SaltStack, Automation, Scripting, Python, Perl, Ruby, Monitoring, Nagios, Zabbix, Prometheus, Grafana, Logging, Syslog, Logrotate, Security, SELinux, AppArmor, Firewalld, Iptables, TCP Wrappers, SSH (Secure Shell), SSL/TLS, Certificates, PKI (Public Key Infrastructure), User Management, Group Management, LDAP (Lightweight Directory Access Protocol), Active Directory, PAM (Pluggable Authentication Modules), Authentication, Authorization, Accounting, Network Configuration, IP Addressing, Subnetting, Routing, DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), VPN (Virtual Private Network), Proxy Servers, Web Servers, Apache, Nginx, Tomcat, Database Servers, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, Backup Solutions, Rsync, Tar, Compression, Gzip, Bzip2, Xz, Performance Tuning, System Optimization, Resource Management, CPU, Memory, Disk I/O, Network I/O, Troubleshooting, Diagnostics, System Logs, Kernel Logs, Application Logs, Debugging, Error Handling, Incident Response, Change Management, Configuration Management, Version Control, Git, SVN (Subversion), Documentation, Technical Writing, System Architecture, Infrastructure Design, Cloud Computing, AWS (Amazon Web Services), Azure, Google Cloud Platform (GCP), Hybrid Cloud, Multi-Cloud, DevOps, CI/CD (Continuous Integration/Continuous Deployment), Jenkins, GitLab CI, Travis CI, Security Audits, Vulnerability Scanning, Penetration Testing, Compliance, GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), SOX (Sarbanes-Oxley Act), ITIL (Information Technology Infrastructure Library), Project Management, Agile, Scrum, Kanban, Team Collaboration, Communication Skills, Problem-Solving Skills, Analytical Skills, Leadership, Mentoring, Training, Documentation, Reporting, Metrics, KPIs (Key Performance Indicators), SLA (Service Level Agreement), Vendor Management, Budgeting, Cost Management, ROI (Return on Investment), Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices