Who We Are: EvoTech is an Economically Disadvantaged Woman Owned Small Business located in San Antonio, TX. EvoTech is all about creating minds, technologies, and cultures that will bring change to the industry. Thinking outside of the box for the next generation of technology solutions. EvoTech provides Cybersecurity, Network Engineering, Program Management, Artificial Intelligence, and Application Development Services.

The Evolution Has Started…Do You Have What It Takes To Be Next?


Location: San Antonio, TX

Job Description: As a Network Operations Analyst you monitor endpoints and provide customer service from the Network Operations Center. The Analyst will be part of a Technical Operations Team that is the single point of contact for incident response and service requests from users.

Skills Desired:

  • Excellent analytical and problem-solving skills
  • Excellent verbal & written communication skills
  • Network troubleshooting
  • Active Listening
  • Close Attention to Detail
  • Strong Organization Skills
  • Systems analysis
  • Time Management
  • Operations Management
  • Active Learning

Responsibilities:

  • Deliver Information Technology (IT) management and security services
  • Provide system monitoring, health, and status reporting
  • Administer and monitor system availability and performance Tools
  • Provide a single point of contact that users and operators can use to report, document, track, and resolve system problems and account issues
  • Interface with personnel and systems to track and resolve incidents
  • Create incident reports and provide recommendations
  • Support requests from local operations supervisor
  • Perform triage, solve straightforward system problems, and utilize appropriate tools
  • Monitor system configuration and status including servers, operating systems, and software applications
  • Provide Tier 1 and Tier 2 support and coordinate with SOC and Field Service Representatives (FSR) to resolve and document incidents
  • Receives calls, opens, and closes trouble tickets
  • Lead troubleshooting via CC Knowledge Base
  • Logs incidents and requests and further escalate issues as needed
  • Creates shift logs
  • Updates incident tickets for root cause analysis and corrective action(s)
  • Escalate/communicate issues as defined by policies and escalation procedures
  • Participate in on-call rotation
  • Must be a US Citizen

Clearance Requirement: A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance



Location: San Antonio, TX

Job Description: We are seeking a highly organized and detail-oriented Business Analyst/Project Manager to join our IT Call Center team. The ideal candidate will have experience in project management, task management, data entry, and Jira board maintenance. This individual will play a key role in ensuring the smooth operation of the section by maintaining project schedules, call center ticket status, and managing performance reviews and job training. Additionally, the successful candidate will be responsible for performing data entry tasks related to project management, task management, and performance review tracking. They should be able to effectively manage data and information to ensure accuracy and efficiency in the call center operations.

Key Responsibilities:

  • Maintaining the Jira board to ensure that all tasks are tracked and prioritized correctly
  • Monitoring and updating the status of call center tickets to ensure that customer queries are resolved in a timely manner
  • Maintain the Jira board for the Section Manager and ensure it is updated on a regular basis
  • Assist with task management and project management for the section. This includes creating and updating project schedules, tracking project progress, and identifying areas for improvement
  • Administer weekly and quarterly business reports on project progress, identify trends, and identify any risks
  • Manage performance review schedules and job training progress for team members
  • Work closely with the Section Manager and other stakeholders to ensure project requirements are clearly defined and met
  • Prepare and present reports on project status and progress to the Section Manager and other stakeholders
  • Stay up to date on industry trends and best practices in project and task management and make recommendations for improvements
  • Perform other duties as assigned by the Section Manager

Qualifications:

  • 3+ years of experience in project management and task management
  • Experience with Jira and other project management tools
  • Strong analytical and problem-solving skills
  • Excellent communication and interpersonal skills
  • Ability to work independently and as part of a team
  • Ability to handle multiple tasks and prioritize effectively
  • Familiarity with Agile project management methodologies is a plus

The Business Analyst/Project Manager will be a key player in ensuring that the IT Call Center runs smoothly and efficiently, and that projects are completed on time and to a high standard.

This is a full-time position with competitive compensation and benefits packages. If you have a passion for project and task management and are seeking a challenging and rewarding opportunity, we encourage you to apply.

To apply for this role, please submit your resume and a cover letter that explains why you are the ideal candidate for this position. We look forward to hearing from you!



Location: San Antonio, TX

Job Description: As a Cybersecurity Analyst, you will monitor the security events and create incidents, as well as monitor the log data and perform analysis on alerts to either create an incident or treat it as a false positive. Analysts will perform dynamic malware analysis to confirm that the artifact is indeed malicious. The Analyst will create an incident report and provide recommendations to help maintain the confidentiality, integrity, and availability of the organization’s data and information assets. The Analyst will analyze vulnerability scans and perform remediations as needed to harden assets through patching and configuration.

Key Responsibilities:

  • The primary responsibility of a Cybersecurity Analyst is to monitor, detect, and respond to security events and incidents in the organization’s IT systems
  • Monitoring and analysis of security events: Analyze and monitor security logs and alerts from various security devices and tools, such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) platforms
  • Incident response: Respond to security incidents, such as malware infections, phishing attacks, and unauthorized access attempts, by following established incident response procedures and playbooks
  • Vulnerability management: Assist in vulnerability scanning and management processes, including assessing and prioritizing vulnerabilities and ensuring timely patching and mitigation
  • Security investigations: Conduct preliminary investigations of security incidents and events, collect and preserve evidence, and report findings to senior analysts or managers
  • Security awareness: Stay current on protection techniques against emerging threats, vulnerabilities, and threat actor attack methods
  • Documentation: Maintain detailed documentation of security events, incidents, and investigations, and ensure that all records are kept up-to-date
  • Compliance: Assist with compliance efforts, such as regulatory compliance, industry standards, and internal policies and procedures
  • Reporting: Generate regular reports on security events and incidents, including trend analysis and recommendations for improvement

Qualifications:

  • A Bachelor’s degree in computer science, cybersecurity, or a related field
  • Minimum 2 years of experience in a cybersecurity/information security role
  • One or more industry certifications such as CompTIA Security+, CEH, or GIAC
  • Knowledge of security tools and technologies, such as firewalls, SIEM, IDS/IPS, antivirus, and DLP
  • Strong analytical skills, attention to detail, and problem-solving abilities
  • Excellent communication skills, both verbal and written
  • Knowledge of security frameworks and standards, such as NIST, ISO, and CIS
  • Understanding of networking and operating systems, such as Windows and Linux
  • Ability to work under pressure and in a fast-paced environment
  • As a Tier 1 Cybersecurity Analyst, you will play a crucial role in protecting the organization’s information systems from potential security threats. You will be part of a team of cybersecurity professionals working together to identify, prevent, and respond to security incidents. Your work will help to maintain the confidentiality, integrity, and availability of the organization’s data and information assets.


Location: San Antonio, TX

Job Description: As an IT Systems Administrator you will monitor, maintain, upgrade, and manage our software, hardware, and networks. The ideal candidate will be able to manage our IT infrastructure, troubleshoot issues, and ensure our systems are secure, efficient, and reliable.

Skills Desired:

  • Excellent teamwork and problem-solving skills
  • Excellent verbal & written communication skills
  • Experience in managing networks and endpoints such as servers and workstations
  • Knowledge of network protocols and security technologies
  • Experience with virtualization and cloud technologies
  • Familiarity with backup and recovery software and methodologies
  • Knowledge of database systems and management tools
  • Time Management in a fast-paced environment
  • Bachelor’s degree in Computer Science or related field, or equivalent experience

Responsibilities:

  • Install and configure software, hardware, and networks
  • Monitor system performance and troubleshoot issues
  • Respond to system alerts and resolve technical issues
  • Manage user accounts, permissions, and access control
  • Maintain security and backup systems to ensure data protection and recovery
  • Implement and maintain disaster recovery plans and procedures
  • Perform triage, solve straightforward system problems, and utilize appropriate tools
  • Manage, monitor, and upgrade system configurations and statuses including servers, operating systems, and software applications
  • Provide support and coordinate with NOC, SOC, and Field Service Representatives (FSR) to resolve and document incidents
  • Evaluate and recommend new technologies to improve the efficiency and effectiveness of the IT infrastructure

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.



Location: San Antonio, TX; Washington DC

Job Description: A Cybersecurity Vulnerability Assessor is responsible for end-to-end cyber security risk management, including risk identification, analysis, and evaluation, identifying remediation requirements, and leading remediation efforts.

Skills Desired:

  • Bachelor’s degree in Computer Science, Information Security, or a related field
  • Ability to work independently and in a team environment
  • Strong knowledge of common vulnerabilities and attack vectors, as well as mitigation strategies
  • Strong attention to detail and ability to follow established processes
  • Excellent analytical and problem-solving skills
  • Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders
  • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CVA, CEH, GSEC, SSCP, GCIH, or OSCP are a plus
  • Minimum 3 years of experience in vulnerability assessment or penetration testing
  • Experience working with vulnerability assessment tools such as Nessus, Qualys, or OpenVAS, as well as experience performing manual testing and exploitation.
  • Responsibilities:

    • Analysis of weapon performance and target vulnerability
    • Analysis of alternatives and trade space studies for concept and developmental weapon programs
    • Target vulnerability model development
    • Experience working with various security methodologies and processes, knowledge of TCP/IP protocols
    • Experience with reverse engineering tools, operating systems and open-source computer forensic tools, and a working understanding of computer forensic techniques and methodologies
    • Security Incident and Event Monitoring (SIEM) experience a plus
    • Provide analysis of Information Security Events and determine true or false positive; and execute appropriate response procedures
    • Define, create and maintain SIEM correlation rules, customer build documents, security process and procedures
    • Accomplish organization goals by accepting ownership for accomplishing new and different requests; explore opportunities to add value to job accomplishments
    • Any additional duties

    Clearance Requirement:

    Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


 

Location: San Antonio, TX; Washington DC

Job Description: As a Cyber Hunt Analyst – SIEM, you will be responsible for proactively and iteratively detect, isolate, and neutralize advanced threats that may evade automated security solutions. You will work closely with the Security Operations Center (SOC) team to proactively hunt for threats and conduct in-depth investigations of potential security incidents using Security Information and Event Management (SIEM) tools. Your ultimate goal will be to identify and remediate security risks before they can cause harm to the organization.

Skills Desired:

    • Bachelor’s degree in Computer Science, Information Security, or related field.
    • Minimum 4 years of experience in a cyber security / information security role.
    • Knowledge of cyber threat landscape and tactics, techniques, and procedures (TTPs) used by attackers.
    • Familiarity with security tools such as endpoint detection and response (EDR) tools, intrusion detection/prevention systems (IDS/IPS), and firewalls.
    • Experience with malware analysis.
    • Excellent analytical and problem-solving skills, with the ability to think creatively and proactively identify potential threats.
    • Strong communication skills, with the ability to identify and report key analysis information, investigation findings, and remediation results.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CEH, GSEC, CASP+, GCIH, or OSCP are a plus.
    • Administrative experience with SIEM tools.

Responsibilities:

      • Conduct proactive cyber hunting exercises to identify potential threats and vulnerabilities within the organization’s network environment.
      • Investigate security incidents by analyzing network traffic and logs, endpoint data, and other security events to determine the root cause of security incidents.
      • Monitor and Analyze security alerts generated by SIEM tools and other security technologies to identify and prioritize potential security incidents.
      • Maintain SIEM content including rules, filters, dashboards, and reports.
      • Develop and maintain threat intelligence on emerging threats and vulnerabilities to ensure the organization is well-prepared to defend against cyber attacks.
      • Collaborate with the SOC team to escalate incidents to appropriate teams for investigation and remediation.
      • Conduct detailed analysis of malware and other types of malicious code to identify indicators of compromise and determine potential impact.
      • Provide recommendations for improving the organization’s security posture based on threat intelligence and incident analysis.
      • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: As a Cyber Hunt Analyst – SIEM Senior, you will be responsible for proactively and iteratively detect, isolate, and neutralize advanced threats that evade automated security solutions. You will work closely with the Security Operations Center (SOC) team to proactively hunt for threats and conduct in-depth investigations of potential security incidents using Security Information and Event Management (SIEM) tools. Your ultimate goal will be to identify and remediate security risks before they can cause harm to the organization.

Skills Desired:

    • Bachelor’s degree in computer science, information security, or related field.
    • Minimum 6 years of experience in cybersecurity / information security, with a focus on threat hunting and incident response.
    • Strong understanding of SIEM tools, including the ability to develop and implement custom detection rules and queries.
    • Strong understanding of risk management frameworks RMF such as NIST, ISO 27001, CIS, COBIT, and understanding of security controls.
    • Familiarity with a wide range of security tools, such as endpoint detection and response (EDR) tools, intrusion detection/prevention systems (IDS/IPS), and firewalls.
    • Experience with malware analysis and reverse engineering.
    • Excellent analytical and problem-solving skills, with the ability to think creatively and proactively identify potential threats.
    • Strong communication skills, with the ability to clearly articulate complex security concepts to technical and non-technical stakeholders.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CEH, GSEC, CASP+, GCIH, or OSCP are a plus.
    • Knowledge of cyber threat landscape and tactics, techniques, and procedures (TTPs) used by attackers.

Responsibilities:

      • Monitor and analyze security events: Monitor SIEM alerts and logs, investigate incidents, and identify and analyze threats in real-time. Review system and network logs, intrusion detection/prevention systems, and other security data sources for potential threats.
      • Respond to incidents: Respond to security incidents, perform investigations, and gather evidence for potential security incidents. Respond quickly and effectively to security incidents and provide recommendations on remediation.
      • Develop and maintain SIEM content including rules, filters, dashboards, and reports.
      • Conduct security investigations: Conduct security investigations to identify and remediate vulnerabilities, suspicious activity, and potential security incidents.
      • Collaborate with other security teams: Collaborate with other security teams to improve the security posture of the organization. Work with incident response teams, network administrators, and other security analysts to remediate vulnerabilities and mitigate threats.
      • Maintain knowledge of emerging threats: Stay up to date with the latest cyber threats, vulnerabilities, and attack techniques, and use this knowledge to proactively identify and respond to potential threats.
      • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.



Location: San Antonio, TX; Washington DC

Job Description: As a Cybersecurity Analyst Tier I Analyst – Junior you will monitor the security events and create incidents, as well as monitor the log data and perform analysis on alerts to either create an incident or treat it as a false positive. Analysts will perform dynamic malware analysis to confirm that the artifact is indeed malicious. The Analyst will create an incident report and provide recommendations to help maintain the confidentiality, integrity, and availability of the organization’s data and information assets.

Skills Desired:

  • A Bachelor’s degree in computer science, cybersecurity, or a related field.
  • Knowledge of security tools and technologies, such as firewalls, SIEM, IDS/IPS, antivirus, and DLP.
  • Strong analytical skills, attention to detail, and problem-solving abilities.
  • Excellent communication skills, both verbal and written.
  • Knowledge of security frameworks and standards, such as NIST, ISO, and CIS.
  • Understanding of networking and operating systems, such as Windows and Linux.
  • Ability to work under pressure and in a fast-paced environment.
  • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as GSEC, or GCIH are a plus.
  • Responsibilities:

    • Monitoring and analysis of security events: Analyze and monitor security logs and alerts from various security devices and tools, such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) platforms.
    • Incident response: Respond to security incidents, such as malware infections, phishing attacks, and unauthorized access attempts, by following established incident response procedures and playbooks.
    • Vulnerability management: Assist in vulnerability scanning and management processes, including assessing and prioritizing vulnerabilities and ensuring timely patching and mitigation.
    • Security investigations: Conduct preliminary investigations of security incidents and events, collect, and preserve evidence, and report findings to senior analysts or managers.
    • Security awareness: Stay current on protection techniques against emerging threats, vulnerabilities, and threat actor attack methods.
    • Documentation: Maintain detailed documentation of security events, incidents, and investigations, and ensure that all records are kept up to date.
    • Compliance: Assist with compliance efforts, such as regulatory compliance, industry standards, and internal policies and procedures.
    • Reporting: Generate regular reports on security events and incidents, including trend analysis and recommendations for improvement.
    • Any additional duties

    Clearance Requirement:

    Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.



Location: San Antonio, TX; Washington DC

Job Description: As a Cybersecurity Analyst will monitor the security events and create incidents, as well as monitor log data and perform analysis on alerts to either create an incident or treat it as a false positive. Analysts will perform dynamic malware analysis to confirm that the artifact is indeed malicious. The Analyst will create an incident report and provide recommendations to help maintain the confidentiality, integrity, and availability of the organization’s data and information assets.

Skills Desired:

  • A Bachelor’s degree in computer science, cybersecurity, or a related field.
  • Minimum 4 years of experience in a cybersecurity / information security role.
  • Knowledge of security tools and technologies, such as firewalls, SIEM, IDS/IPS, antivirus, and DLP.
  • Strong analytical skills, attention to detail, and problem-solving abilities.
  • Excellent communication skills, both verbal and written.
  • Knowledge of security frameworks and standards, such as NIST, ISO, and CIS.
  • Understanding of networking and operating systems, such as Windows and Linux.
  • Ability to work under pressure and in a fast-paced environment.
  • Responsibilities:

    • Monitoring and analysis of security events: Analyze and monitor security logs and alerts from various security devices and tools, such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) platforms.
    • Maintain SIEM content including rules, filters, dashboards, and reports.
    • Incident response: Respond to security incidents, such as malware infections, phishing attacks, and unauthorized access attempts, by following established incident response procedures.
    • Vulnerability management: Assist in vulnerability scanning and management processes, including assessing and prioritizing vulnerabilities and ensuring timely patching and mitigation.
    • Security investigations: Conduct preliminary investigations of security incidents and events, collect, and preserve evidence, and report findings to senior analysts or managers.
    • Security awareness: Educate end-users on security best practices and provide guidance on how to identify and report security incidents.
    • Documentation: Maintain detailed documentation of security events, incidents, and investigations, and ensure that all records are kept up-to-date.
    • Compliance: Assist with compliance efforts, such as regulatory compliance, industry standards, and internal policies and procedures.
    • Reporting: Generate regular reports on security events and incidents, including trend analysis and recommendations for improvement.
    • Any additional duties

    Clearance Requirement:

    Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: As a Senior Cybersecurity Vulnerability Assessor, you will be responsible for conducting vulnerability assessments on complex computer systems, networks, and applications. You will work with a team of cybersecurity professionals to identify vulnerabilities and develop recommendations for mitigating them. The ideal candidate should have experience in vulnerability assessment or penetration testing, as well as a strong understanding of cybersecurity principles and practices.

Skills Desired:

    • Strong knowledge of common vulnerabilities and attack vectors, as well as mitigation strategies.
    • Excellent analytical and problem-solving skills.
    • Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders.
    • Ability to work independently and in a team environment.
    • Strong attention to detail and ability to follow established processes.
    • Experience with vulnerability assessment tools such as Nessus, Qualys, or OpenVAS.
    • Familiarity with common programming languages and scripting languages.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CVA, CISM, CEH, GSEC, SSCP, GCIH, OSCP, or CISSP are a plus.
    • Minimum of 5 years of experience in vulnerability assessment or penetration testing.

Responsibilities:

    • Conduct vulnerability assessments on complex computer systems, networks, and applications using automated tools and manual testing techniques.
    • Analyze and interpret data gathered from vulnerability assessments to determine the severity of vulnerabilities and develop recommendations for mitigating them.
    • Develop remediation plans that detail the steps necessary to mitigate identified vulnerabilities.
    • Communicate findings and recommendations to technical staff, management, and business units in a clear and concise manner.
    • Participate in security incident response activities as necessary.
    • Stay up-to-date with the latest cybersecurity threats and vulnerabilities, and incorporate this knowledge into vulnerability assessments.
    • Provide technical guidance and mentoring to less experienced team members.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.



Location: San Antonio, TX; Washington DC

Job Description: A Digital Forensics Analyst is responsible perform forensic analysis on a variety of digital media devices and mediums to identify, reverse engineer, and de-obfuscate content related to an incident, such as malicious content. The position requires a strong understanding of computer operating systems, file systems, network protocols, and cyber security principles.

Skills Desired:

  • Bachelor’s degree in Information Security, Cyber Security, Digital Forensics, or a related field.
  • At least 6 years of experience in information security, cybersecurity, digital forensics, or a related field.
  • Strong knowledge of computer operating systems, network protocols, and cyber security principles.
  • Experience with digital forensic tools, such as EnCase, FTK, and X-Ways.
  • Strong analytical and problem-solving skills.
  • Excellent written and verbal communication skills.
  • Ability to work independently and in a team environment.
  • Required certification: Security+ (or ability to obtain withing 60 days of employment). Relevant certifications, such as GCFA, GCFE, CFCE, CCE, or EnCE are a plus.
  • Responsibilities:

    • The Digital Forensics Analyst will be responsible for investigating cyber security incidents, conducting forensic analysis on digital devices, and providing expert artifacts and evidence for legal proceedings related to cyber crimes.
    • The ideal candidate will have experience in computer forensics, a strong understanding of cyber security, and the ability to work in a fast-paced environment.
    • Conducting investigations and gathering digital evidence related to cyber security incidents, such as hacking, data breaches, and cyber attacks.
    • Assist investigations into cyber security incidents, including data breaches, malware attacks, and phishing schemes.
    • Analyze complex digital evidence, such as log files, network traffic, and system images, to identify the cause and extent of a security breach.
    • Maintain standard operating procedures for conducting digital forensic investigations.
    • Present findings and recommendations to senior management, legal teams, and law enforcement.
    • Experience with the latest tools and techniques related to cyber forensics and cyber security.
    • Any additional duties

    Clearance Requirement:

    Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: The Digital Forensics Investigator Senior will be responsible for managing and leading investigations into cyber security incidents, analyzing complex digital evidence, and presenting findings to senior management and other stakeholders. The ideal candidate will have extensive experience in cyber security, digital forensics, and a strong track record of success in managing and leading investigations.

Skills Desired:

    • Bachelor’s degree in Information Security, Cyber Security, Digital Forensics, or a related field.
    • At least 6 years of experience in information security, cybersecurity, digital forensics, or a related field.
    • Strong knowledge of computer operating systems, network protocols, and cyber security principles.
    • Experience with digital forensic tools, such as EnCase, FTK, and X-Ways.
    • Strong analytical and problem-solving skills.
    • Excellent written and verbal communication skills.
    • Ability to work independently and in a team environment.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Relevant certifications, such as GCFA, , GCFE, CFCE, CCE, or EnCE are a plus.

Responsibilities:

    • Manage and lead investigations into cyber security incidents, including data breaches, malware attacks, and phishing schemes.
    • Analyze complex digital evidence, such as log files, network traffic, and system images, to identify the cause and extent of a security breach.
    • Develop and maintain standard operating procedures for conducting digital forensic investigations.
    • Present findings and recommendations to senior management, legal teams, and law enforcement.
    • Experience with the latest tools and techniques related to cyber forensics and cyber security.
    • Participate in the development and implementation of cyber security policies and procedures.
    • Mentor and train junior members of the cyber forensics team.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: As an Enterprise Security Architect, you will be responsible for developing and implementing the organization’s security architecture, strategies, and standards to ensure the security of its information systems and assets. You will work with business and technical stakeholders to design and implement security solutions that align with the organization’s goals and objectives. The ideal candidate should have a strong technical background in cybersecurity and a thorough understanding of enterprise architecture principles.

Skills Desired:

    • Bachelor’s degree in Computer Science, Information Security, or a related field.
    • Minimum of 6 years of experience in cybersecurity or information security.
    • Strong knowledge of enterprise architecture principles, security technologies, and industry best practices.
    • Experience with security risk assessments and developing risk mitigation strategies.
    • Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders.
    • Ability to work independently and in a team environment.
    • Strong attention to detail and ability to follow established processes.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CVA, CEH, GSEC, SSCP, or GCIH are a plus.
    • Strong knowledge of enterprise architecture principles, security technologies, and industry best practices.

Responsibilities:

    • Develop and implement the organization’s security architecture, strategies, and standards to ensure the security of its information systems and assets.
    • Collaborate with business and technical stakeholders to identify security requirements and design security solutions that align with the organization’s goals and objectives.
    • Evaluate and recommend security technologies and products to meet security requirements and industry best practices.
    • Develop and maintain security policies, procedures, and standards.
    • Provide technical guidance and mentoring to security staff and other stakeholders.
    • Lead security risk assessments and develop risk mitigation strategies.
    • Conduct security audits to ensure compliance with security policies, procedures, and standards.
    • Stay up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
    • Participate in incident response activities as necessary.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: The Enterprise Security Architect will be responsible for designing and implementing security solutions for our organization to protect our information, technology, and physical assets from potential security threats. The successful candidate will work collaboratively with stakeholders across the organization to assess security needs and develop and implement strategies to address them.

Skills Desired:

    • Bachelor’s degree in Computer Science, Information Technology, or a related field.
    • 6+ years of experience in enterprise security architecture or a related field.
    • Strong technical knowledge of security technologies and tools, including firewalls, intrusion detection/prevention systems, access control systems, and encryption technologies.
    • Experience designing and implementing security policies and protocols.
    • Strong analytical and problem-solving skills.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other relevant industry certifications such as CISM, CEH, SSCP, or CISSP are a plus.
    • Must have strong communication and collaboration skills to work effectively with stakeholders across different departments and levels of the organization.

Responsibilities:

    • Collaborate with stakeholders to identify potential security risks and develop appropriate measures to mitigate them.
    • Develop and implement security policies, procedures, and protocols to ensure the protection of organizational assets.
    • Design and implement security technologies and tools to prevent and detect security breaches.
    • Assess and recommend improvements to existing security measures and technologies.
    • Provide guidance and support to teams across the organization to ensure compliance with security policies and protocols.
    • Stay up to date with the latest security threats and trends and adjust security strategies and measures accordingly.
    • Communicate complex technical concepts to non-technical stakeholders and build consensus around security initiatives.
    • Work collaboratively with other IT teams to integrate security solutions with existing IT infrastructure and systems.
    • Architect solutions to ensure that an organization’s information, technology, and physical assets are protected from threats such as cyber attacks, data breaches, and unauthorized access.
    • Designs architecture to include the software, hardware, and communications to support the total requirements, as well as provide for present and future cross-functional requirements and interfaces.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: The ISSO is responsible for ensuring the confidentiality, integrity, and availability of information systems, and for protecting these systems from potential security threats and vulnerabilities.

Skills Desired:

    • Bachelor’s degree in computer science, information security, or a related field.
    • 6 Years of experience in information security, risk management, or related fields.
    • Experience developing and leading cybersecurity/information security team.
    • Knowledge of security principles, practices, and technologies.
    • Familiarity with laws, regulations, and compliance standards.
    • Strong analytical and problem-solving skills.
    • Excellent written and verbal communication skills.
    • Ability to work independently and as part of a team.
    • Required certification: CISSP. CISM or relevant managerial is a plus.
    • Ability work closely with other IT professionals and senior management to ensure the security of the organization’s information systems.

Responsibilities:

    • Developing, implementing, and maintaining security policies, procedures, and standards for information systems.
    • Ensuring compliance with applicable laws, regulations, and guidelines regarding information security.
    • Conducting risk assessments and vulnerability assessments to identify and mitigate potential security threats and vulnerabilities.
    • Developing and implementing security plans to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
    • Monitoring and analyzing security alerts and events to identify and respond to security incidents.
    • Conducting security training and awareness programs for employees and other stakeholders.
    • Conducting security audits and evaluations of information systems to ensure compliance with security policies, procedures, and standards.
    • Collaborating with other IT staff and stakeholders to integrate security measures into information systems.
    • Staying up to date with emerging security threats and technologies and recommending changes to security policies and procedures as necessary.
    • Communicating security risks and issues to management and other stakeholders and recommending strategies to mitigate them.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: As a Penetration Tester, you will examine computer systems, networks, and applications for vulnerabilities and weaknesses that attackers might exploit. You must be proficient in operating systems, networks, and programming languages. A Penetration Tester should also be familiar with the latest security threats and trends and able to think creatively and strategically to identify vulnerabilities and develop effective solutions.

Skills Desired:

    • Strong understanding of a variety of technical concepts such as: Application development, networking, systems administration, and information security practices.
    • Extensive experience with a range of testing tools and methodologies, including both manual and automated testing.
    • Strong web application development, security flaw and remediation technical understanding.
    • Demonstrated experience with a variety of open source and commercial testing tools in areas such as web interception proxies, packet capture, debugging and API interaction.
    • Experience with data analytics with the ability to provide qualitative analysis and recommendations.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as GPEN, CISA, CVA, CEH, GSEC, OSCP, or GCIH are a plus.
    • Strong verbal and written communication skills.

Responsibilities:

    • Conducting complex security assessments of computer systems, networks, and applications using a variety of tools and techniques.
    • Developing and executing comprehensive test plans to simulate advanced cyber-attacks, and assessing the effectiveness of the organization’s cybersecurity defenses against these attacks.
    • Evaluate current security operations and providing recommendations to improve systems.
    • Perform penetration tests simulate cyber-attacks and determine the effectiveness of the organization’s cybersecurity defenses.
    • Communicating findings and recommendations to senior management and other stakeholders and providing advice on cybersecurity strategy and best practices.
    • Conducting research and development to identify new and innovative testing tools and methodologies.
    • Maintaining up-to-date knowledge of the latest threats, vulnerabilities, and security trends, and using this knowledge to improve the organization’s cybersecurity defenses.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: A cybersecurity program manager is a professional responsible for overseeing and managing an organization’s cybersecurity program. Their primary role is to ensure that the organization’s sensitive data and systems are protected from cyber threats.

Skills Desired:

    • Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
    • Minimum 8 years of experience in cybersecurity, with a focus on program management.
    • Experience with industry standards such as NIST Cybersecurity Framework, ISO 27001, or SOC2.
    • Strong leadership and communication skills, with the ability to motivate and manage cross-functional teams.
    • Experience managing complex cybersecurity programs and initiatives, including budgeting, resource allocation, and risk management.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Industry qualifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar are a plus.
    • A deep understanding of cybersecurity principles and best practices, including threat modeling, risk assessment, and incident response.

Responsibilities:

    • Developing and implementing cybersecurity policies and procedures to protect the organization’s data and systems from cyber threats.
    • Leading a team of cybersecurity professionals to monitor the organization’s network and systems for potential security breaches.
    • Conducting regular risk assessments to identify vulnerabilities and develop mitigation strategies.
    • Ensuring compliance with industry and government regulations related to cybersecurity.
    • Communicating with senior executives and other stakeholders about cybersecurity risks and strategies.
    • Managing cybersecurity incidents and coordinating response efforts with other departments and external partners.
    • Keeping up to date with the latest cybersecurity threats and trends and adapting the organization’s cybersecurity program accordingly.
    • Any additional duties

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: We are seeking an experienced and certified Information Security Engineer to join our team. The successful candidate will be responsible for securing our cloud infrastructure and ensuring the confidentiality, integrity, and availability of our systems and data. This role will require expertise in cloud security technologies and best practices, as well as a deep understanding of regulatory compliance requirements.

Skills Desired:

    • Bachelor’s degree in Computer Science, Information Security, or related field.
    • Strong knowledge of cloud security best practices and technologies, including network security, identity and access management, data encryption, and vulnerability management
    • Experience with regulatory and compliance frameworks such as FedRAMP, NIST, or FISMA.
    • Strong analytical and problem-solving skills
    • Excellent written and verbal communication skills
    • Ability to work independently and as part of a team
    • Experience with DevSecOps methodologies and tools such as Terraform, Ansible, and Kubernetes
    • Familiarity with containerization technologies such as Docker and Kubernetes
    • Experience with scripting languages such as Python, Ruby, or Bash
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CEH, SSCP, or CISSP are a plus.
    • Minimum 5 years of experience in information security with a focus on cloud security
    • Experience with cloud-based security tools such as CloudTrail, CloudWatch, and Security Hub

Responsibilities:

    • Design, implement, and maintain security controls for our cloud infrastructure, including identity and access management, network security, data encryption, and vulnerability management
    • Design, configure and deploy security tools such as IDS/IPS, SIEM, DLP, and vulnerability management systems.
    • Conduct regular security assessments and penetration testing of our cloud environment to identify and remediate security vulnerabilities.
    • Develop and maintain security policies, procedures, and standards for our cloud infrastructure to ensure compliance with regulatory requirements such as NIST, ISO, COBIT.
    • Collaborate with development and operations teams to ensure that security is integrated into the SDLC process.
    • Collaborate with cross-functional teams to identify and prioritize security risks and implement appropriate mitigations.
    • Provide guidance and training to development teams on secure coding practices and security requirements for cloud-based applications.
    • Monitor and investigate security incidents and breaches, and coordinate incident response activities as needed.
    • Keep up to date with emerging cloud security technologies, trends, and best practices
    • Any additional duties.

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: A Security Operations Center (SOC) Manager is a cybersecurity professional responsible for managing and overseeing the day-to-day operations of a SOC team. The SOC Manager ensures the team is effective in detecting, analyzing, and responding to security incidents, and provides guidance and leadership to the team.

Skills Desired:

    • Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
    • Minimum 8 years of experience in cybersecurity, with a focus on security operations.
    • Experience managing a SOC team, including resource allocation, performance management, and incident response.
    • In-depth knowledge of security technologies such as SIEM, IDS/IPS, EDR, and threat intelligence platforms.
    • Understanding of cybersecurity principles and best practices, including incident response, vulnerability management, and threat hunting.
    • Knowledge of industry standards such as NIST Cybersecurity Framework, ISO 27001, or SOC2.
    • Excellent leadership and communication skills, with the ability to motivate and manage a team.
    • Security+ (or ability to obtain withing 60 days of employment). Industry qualifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar are a plus.

Responsibilities:

    • Developing and implementing strategies for the SOC team to detect, analyze, and respond to security incidents.
    • Managing the SOC team’s day-to-day operations, including incident response, threat hunting, and vulnerability management.
    • Ensuring the SOC team is meeting service level agreements (SLAs) for incident response and resolution.
    • Leading the development and implementation of security policies, procedures, and standards.
    • Coordinating with other cybersecurity teams, such as the Threat Intelligence team and Incident Response team, to ensure effective security operations.
    • Overseeing the deployment and management of security technologies, such as SIEM, IDS/IPS, and EDR.
    • Providing regular reports to senior management on the SOC team’s performance, metrics, and KPIs.
    • Any additional duties.

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.


Location: San Antonio, TX; Washington DC

Job Description: As a Senior Cyber Hunt Analyst (SIEM Master), you will be responsible for proactively and iteratively detect, isolate, and neutralize advanced threats that evade automated security solutions. Your primary role will be to lead the threat hunt team with effective strategies to analyze data and identify anomalous activity that could indicate an attack or security breach. The Senior Cyber Hunt Analyst will lead the team’s quality control efforts to help maintain the confidentiality, integrity, and availability of the organization’s data and information assets.

Skills Desired:

    • Bachelor’s degree in computer science, information security, or related field.
    • Minimum 6 years of experience in information security/cybersecurity, with a focus on threat hunting and incident response.
    • Strong understanding of SIEM tools, including the ability to develop and implement custom detection rules and queries.
    • Familiarity with a wide range of security tools, such as endpoint detection and response (EDR) tools, intrusion detection/prevention systems (IDS/IPS), and firewalls.
    • Experience with malware analysis and reverse engineering.
    • Excellent analytical and problem-solving skills, with the ability to think creatively and proactively identify potential threats.
    • Strong communication skills, with the ability to clearly articulate complex security concepts to technical and non-technical stakeholders.
    • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other industry certifications such as CISM, CEH, GSEC, CASP+, GCIH, or OSCP are a plus.
    • Strong understanding of risk management frameworks RMF such as NIST, ISO 27001, CIS, COBIT, and understanding of security controls.
    • Must be able to pass a Background Clearance Process
    • Must be able to work flexible hours
    • Must have the ability to work under pressure and in a fast-paced environment
    • Must have the ability to work on cross-functional teams and projects
    • Must have the Ability to work independently and in a team environment.

Responsibilities:

    • Lead threat hunt team by motivating and inspiring to achieve cybersecurity goals and protect company mission.
    • Use SIEM tools to monitor and analyze network traffic and security events, identifying potential threats and security incidents.
    • Develop and maintain SIEM content including rules, filters, dashboards, and reports.
    • Conduct proactive threat hunting activities to identify unknown threats and vulnerabilities that may have gone undetected by other security tools.
    • Analyze and investigate alerts, logs, and other security data to identify the root cause of security incidents.
    • Develop and implement custom detection rules and queries to identify new and emerging threats.
    • Conduct in-depth analysis of malware and other attack techniques to develop countermeasures and mitigation strategies.
    • Lead other members of the cybersecurity team to respond to security incidents and provide guidance on remediation strategies.
    • Document investigation findings and communicate results to management and other stakeholders.
    • Stay up to date on the emerging cybersecurity threats, latest trends, and incorporate that knowledge into threat hunting activities.
    • Develop security policies and procedures: Develop and implement security policies, procedures, and guidelines to ensure the confidentiality, integrity, and availability of sensitive data and systems.
    • Any additional duties.

Clearance Requirement:

Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.



Location: San Antonio, TX; Washington DC

Job Description: A Senior Cybersecurity Analyst is an experienced professional who plays a critical role in an organization’s cybersecurity program. The primary responsibilities of a Senior Cybersecurity Analyst are to oversee the design, implementation, and maintenance of the organization’s cybersecurity defenses, as well as lead incident response and threat intelligence activities. The Senior Cybersecurity Analyst will lead the team’s quality control efforts to help maintain the confidentiality, integrity, and availability of the organization’s data and information assets.

Skills Desired:

  • A Bachelor’s degree in computer science, cybersecurity, or a related field. A Master’s degree is preferred.
  • Minimum 6 years of experience in cybersecurity, with a strong emphasis on incident response and threat intelligence.
  • Knowledge of security tools and technologies, such as firewalls, SIEM, IDS/IPS, antivirus, and DLP.
  • Strong analytical skills, attention to detail, and problem-solving abilities.
  • Excellent communication skills, both verbal and written.
  • Experience with security frameworks and standards, such as NIST, ISO, and CIS.
  • Understanding of networking and operating systems, such as Windows and Linux.
  • Leadership and management skills, with the ability to lead cross-functional teams and projects.
  • Ability to work under pressure and in a fast-paced environment.
  • Required certification: Security+ (or ability to obtain withing 60 days of employment). Other relevant industry certifications such as CISM, GSEC, SSCP, or GCIH are a plus.
  • Responsibilities:

    • Cybersecurity strategy: Develop and implement a comprehensive cybersecurity strategy that aligns with the organization’s business objectives and risk tolerance.
    • Cybersecurity defense: Oversee the design, implementation, and maintenance of cybersecurity defenses, such as firewalls, intrusion detection and prevention systems, security information and event management (SIEM) platforms, and other security tools.
    • Maintain SIEM content including rules, filters, dashboards, and reports.
    • Incident response: Lead incident response activities, such as triage, investigation, containment, eradication, and recovery, and ensure that all incidents are handled according to established procedures.
    • Threat intelligence: Monitor and analyze threat intelligence data from various sources, such as industry groups, vendors, and government agencies, to stay up to date on emerging threats and trends.
    • Risk assessment: Conduct periodic risk assessments to identify and prioritize potential threats and vulnerabilities, and develop mitigation plans to address them.
    • Security awareness: Develop and deliver cybersecurity awareness training and education programs for end-users and other stakeholders.
    • Compliance: Ensure that the organization complies with relevant regulatory requirements, such as PCI-DSS, and GDPR, as well as industry standards, such as NIST, ISO, and CIS.
    • Reporting: Generate regular reports on cybersecurity metrics, such as risk posture, threat landscape, and incident response effectiveness, and provide recommendations for improvement.
    • Any additional duties.

    Clearance Requirement:

    Must be a US Citizen. A successful candidate is subject to a background investigation by the government and must be able to meet the requirements to hold a SECRET clearance.