Browse
···
Log in / Register

COMSEC Support Specialist - Active Secret Clearance

Negotiable Salary

ENS Solutions, LLC

Joint Base Andrews, MD, USA

Favourites
Share

Description

*** This role is contingent upon Contract Award*** The COMSEC Support Specialist is responsible for supporting the lifecycle management and accountability of Communications Security (COMSEC) material and equipment in accordance with National and Department of the Navy (DON) standards. The ideal candidate has prior experience as a COMSEC Manager or Key Management Infrastructure (KMI) Registration Manager and a strong understanding of CNSSI 4005, CNSSI 4006, and DON CMS (Communications Material System) policies. Key Responsibilities: Provide technical and operational support to COMSEC account managers in the daily handling, safeguarding, distribution, and destruction of COMSEC keying material and equipment. Serve as a subject matter expert on KMI operations, including user registration, key generation, and key transfer activities. Assist with the administration and operation of Tier 0–Tier 3 KMI components, including Local Management Devices (LMDs) and Electronic Key Management System (EKMS) devices. Perform accountability and inventory tasks in accordance with CNSSI 4005/4006, EKMS-1(series), and DON CMS policy. Monitor and maintain accurate records of COMSEC assets via KMI/EKMS or other COMSEC accounting systems. Prepare and process COMSEC material requests, transaction reports, and other documentation as required. Support audit readiness by conducting internal inspections and assisting with external inspections by NSA or designated authorities. Provide training and guidance to COMSEC users and assist in ensuring compliance with physical and information security regulations. Coordinate with Information Assurance, Network, and Security teams to support secure communications in SIPRNet and other mission-critical environments. Requirements Active Secret clearance (with TS/SCI eligibility preferred). 3–5 years of experience in COMSEC operations, including key management, handling classified COMSEC material, and supporting audit and inspection activities. Previous experience as a COMSEC Manager, Alternate COMSEC Manager, or KMI Registration Manager. In-depth knowledge of CNSSI 4005 (Safeguarding COMSEC) and CNSSI 4006 (Communications Security (COMSEC) Monitoring). Familiarity with Department of the Navy (DON) CMS policies, including EKMS and LMD/KP procedures. Proficient with COMSEC equipment such as SKL, DTD, KIK-30, KIK-11, and legacy key loaders. Strong organizational and documentation skills; ability to maintain 100% accountability in high-tempo environments. DoD 8570 IAT Level II certification (e.g., Security+ CE) preferred. Excellent interpersonal and communication skills; capable of working independently and as part of a secure operations team. Preferred Qualifications: Completion of NSA COMSEC Manager or KMI Operator training courses. Familiarity with Navy-specific COMSEC systems (e.g., Navy Key Management System - NKMS). Experience supporting Navy, Marine Corps, or Joint COMSEC operations in garrison or deployed environments. Benefits Essential Network Security (ENS) Solutions, LLC is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients. Why ENS? Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS 401k Contribution from Day 1 PTO + 11 Paid Federal Holidays Long & Short Term Disability Insurance Group Term Life Insurance Tuition, Certification & Professional Development Assistance Workers’ Compensation Relocation Assistance

Source:  workable View Original Post

Location
Joint Base Andrews, MD, USA
Show Map

workable

You may also like

Avint
Mid-Cyber Security Specialist/Analyst (Dragos Experience)
Camp Lejeune, NC 28547, USA
Avint LLC is seeking a dedicated and technically skilled Mid-Cyber Security Specialist/Analyst for an on-site position in Camp Jejeune, NC. In this critical role, you will support and maintain enterprise IT infrastructure in a mission-driven environment, ensuring system reliability, security, and performance. You’ll be responsible for administering and monitoring servers, applying system patches and updates, managing user accounts, and supporting virtualization platforms. Experience with tools such as Active Directory, Windows Server, Linux, VMware or Nutanix, and scripting for automation (PowerShell, Bash, etc.) is essential. Familiarity with security tools and practices, including STIGs, vulnerability remediation, and participation in system accreditation processes, is highly desirable. This position involves working closely with IT, cybersecurity, and operations teams to support day-to-day system functionality, troubleshoot issues, and contribute to system hardening and compliance initiatives. Location: 100% on-site in Camp Lejeune, NC **THIS POSITION REQUIRES AT LEAST 1 YEAR OF EXPERIENCE WITH THE DRAGOS PLATFORM** Responsibilities: Assist with the administration and monitoring of Nutanix Hyperconverged environments supporting FRCS Monitoring servers and applications. Support the deployment, configuration, and maintenance of the Cyber Monitoring Services OT Monitoring Platform, including Central Store, Site Store, and Sensors in lab and production settings. Perform routine configuration and maintenance of Microsoft SQL Server and Windows Server systems to support cybersecurity operations. Utilize the Marine Corps Certification and Accreditation Support Tool (MCCAST V2) to help document compliance efforts and system security posture. Provide day-to-day support for network infrastructure within a DoD environment, helping to ensure secure and stable connectivity. Understand and assist with interfacing cybersecurity practices across high voltage, water/wastewater, and mechanical control systems. Support the administration and monitoring of Unix and Windows systems, applying knowledge of TCP/IP protocols and basic security controls. Monitor and maintain Host-Based Security System (HBSS) to detect and respond to potential threats within DoD systems. Assist in the monitoring and basic troubleshooting of Automated Metering systems used for energy and utilities management. Support DEVSECOPS-aligned activities within USMC environments, ensuring compliance with established cybersecurity policies for ICS/OT systems. Assist in routine updates and support of ICS systems such as Metasys, Niagara AX, Alerton, Honeywell, Trend, KMC, American Automatrix, Loytec, Rockwell, and OSI. Support communications and system integration using protocols such as BACnet/MSTP, BACnet/IP, N2, LON, and SCADA systems related to high voltage and water/wastewater. Apply system and security patches to ICS/OT systems including Metasys, Niagara, Itron, Honeywell, Rockwell, and OSI as part of standard maintenance procedures. Assist in executing components of the USMC Assessment & Authorization (A&A) process, including use of MCCAST 2.0 and support for RMF documentation and compliance. Help manage and track Plans of Action and Milestones (POAMs) to address findings and vulnerabilities. Apply DISA STIGs in coordination with senior staff to ensure systems meet DoD security baselines. Assist in interpreting and implementing security controls based on NIST 800-53 and DoDI 8510.01 frameworks. Conduct preliminary vulnerability assessments and support risk analysis activities to identify and report on security issues. Monitor and analyze cybersecurity data using the Dragos platform to support OT threat detection and situational awareness. Requirements Experience: Minimum 3 years of relevant IT/system administration experience supporting virtualized environments, networks, and OT systems. Minimum 1 year of experience using the Dragos Platform. Education: Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field. Security Clearance: Active Secret clearance required. Certifications: One or more of the following certifications (or equivalent) are highly desired: Cyber Monitoring Services Platform Certified User Certification ITIL v4 Foundations ICS-VLP Certificate (Courses 210W-01 through 210W-10) Risk Management Framework (RMF) Training – USMC specific Cisco Certified Entry Networking Technician (CCENT) or Cisco Certified Network Associate (CCNA) CompTIA Security+ (Sec+) Certified Information Systems Security Professional (CISSP) Microsoft Certifications (Server, Azure, or related) Benefits Joining Avint is a win-win proposition! You will feel the personal touch of a small business and receive BIG business benefits. From competitive salaries, full health, and generous PTO and Federal Holidays. Additionally, we encourage every Avint employee to further their professional development. To assist you in achieving your goals, we offer reimbursement for courses, exams, and tuition. Interested in a class, conference, program, or degree? Avint will invest in YOU and your professional development! Avint is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity and Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. The salary range for this position is: $100,000-$110,000
$100,000-110,000
Aretum
Senior IA/Cybersecurity Lead
Washington, DC, USA
ARETUM is seeking a Senior IA/Cybersecurity Lead to oversee and enhance our information assurance strategies while ensuring compliance with cybersecurity regulations and frameworks. In this pivotal role, you will guide a talented team in developing, implementing, and maintaining robust information assurance and cybersecurity programs tailored for our government clients. As a Senior IA/Cybersecurity Lead, you will be responsible for evaluating and strengthening security controls, conducting risk assessments, and managing compliance with Federal Information Security Management Act (FISMA) requirements. Your leadership will be crucial in establishing a security-first culture within the organization, and will directly contribute to safeguarding critical information systems. Key Responsibilities Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.  Monitor DOD, and other sites (e.g. Army Cyber) for new standards, regulations and policies.  Review contract deliverables for compliance.  Support risk management framework (RMF) implementation.  Assess Information Assurance Vulnerability Alert (IAVA) management plans and processes.  Develop and maintain Plans of Actions and Milestones (POAMs) for security related activities.  Manage DD2875 submissions and support provisioning activities.  Lead a Cybersecurity team and support interaction with other IT teams.   Requirements A minimum of ten years of DoD IA experience  Possess one of the following certifications: GSLC, CISSP, CISM, and CISA, or another DoD 8570.01-M Level 3 authorized IAT/IAM certification.  A minimum of eight years of experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing tools and work efforts.  A minimum of eight years of experience with the NIST RMF, NIST SP 800-53, STIGs, SCAP, IAVAs, and FISMA.  A minimum of eight years of experience supporting DoD defensive cyber operational activities, including, but not limited to, information system protection, defense, response (incident handling), reporting, and recovery.  A minimum of eight years of experience in managing complex DoD projects.  Possess a minimum of a favorably adjudicated NACLC/ANACI investigation (Tier 3) at proposal submission.  Preferred Qualifications  A bachelor’s degree in an IT related field  Strong verbal and written communication skills as well as the ability to work independently.  Experience leading teams.  Experience writing Standard Operation Procedures (SOP), COOP Planning, POA&Ms, and other documentation in support of RMF as required.  The ability to provide technical evaluation of proposed system(s) and application approaches.  Work Environment & Physical Requirements  This is a remote/work-from-home position. The employee is expected to maintain a professional and distraction-free home office environment with reliable internet access and the ability to participate in video and audio calls during standard working hours. Standard office equipment such as a computer, phone, and webcam will be used regularly.  The physical demands described here are representative of those that must be met to successfully perform the essential functions of this job:  Prolonged periods of sitting and working on a computer.  Frequent use of hands and fingers to operate computer and telephone equipment.  Must be able to lift up to 15 pounds occasionally (e.g., moving equipment).  Ability to participate in virtual meetings and communicate clearly via video/audio platforms.  Travel Requirement  This is a remote position; however, occasional travel may be required based on project needs, client meetings, team collaboration events, or training sessions. Travel is expected to be less than 10% and will be communicated in advance whenever possible. EEO & Pay Transparency Statement  Aretum is committed to fostering a workplace rooted in excellence, integrity, and equal opportunity for all. We adhere to merit-based hiring practices, ensuring that all employment decisions are made based on qualifications, skills, and ability to perform the job, without preference or consideration of factors unrelated to job performance.  As an Equal Opportunity Employer, Aretum complies with all applicable federal, state, and local employment laws.  We are proud to support our nation’s veterans and military families, providing career opportunities that honor their service and experience.  If you require a reasonable accommodation during the hiring process due to a disability, please contact our Talent Acquisition team for assistance.    In compliance with Executive Order 13665, Aretum will not discharge or otherwise discriminate against employees or applicants for inquiring about, discussing, or disclosing their own pay or that of another employee or applicant.  U.S. Work Authorization   Applicants must be U.S. citizens and currently authorized to work in the United States on a full-time basis. This position supports a federal government contract and therefore requires an active Top Secret Clearance or the ability to obtain one.  Benefits Health Care Plan (Medical, Dental & Vision)  Retirement Plan (401k, IRA)  Life Insurance (Basic, Voluntary & AD&D)  Paid Time Off (Vacation, Sick & Public Holidays)  Family Leave (Maternity, Paternity)  Short Term & Long-Term Disability  Training & Development 
Negotiable Salary
Triage Staffing
Cybersecurity Systems Administrator
Cincinnati, OH, USA
The Cybersecurity Systems Administrator plays a critical hybrid role, bridging traditional IT systems administration with advanced information security responsibilities. This position ensures the confidentiality, integrity, and availability of organizational systems by managing security tools, responding to threats, and maintaining secure infrastructure across cloud and on-prem environments.  This is a hands-on role assisting with Tier 2/Tier 3 escalations and strategic cybersecurity tasks, such as monitoring security alerts, conducting phishing campaigns, managing vendor relationships, and writing security policies. You'll work cross-functionally to support tool integrations, secure network operations, and align the organization with industry security standards.    Core Functions & Responsibilities  Cybersecurity & Risk Management  Monitor and respond to security alerts and incidents, using tools such as SIEMs and endpoint protection platforms.  Manage and maintain core security infrastructure, including firewalls, antivirus, encryption, and multi-factor authentication systems.  Lead phishing simulation campaigns and drive employee cybersecurity awareness training.  Write, implement, and maintain information security policies, procedures, and best practices.  Oversee identity and access management (IAM) systems, including SSO implementations and integrations with enterprise platforms.  Assist with vulnerability scanning, patching coordination, and hardening of systems based on industry frameworks.  Support regulatory and compliance needs (e.g., Joint Commision, HIPAA, GDPR, PCI-DSS), ensuring ongoing audit readiness.  IT Systems Administration & Tool Management  Administer and configure Microsoft-based infrastructure, including Active Directory, Azure AD, and Microsoft 365.  Manage security groups, application integrations, and group policy management across systems.  Provide Tier 2/Tier 3 escalation support for complex IT and security issues, including advanced troubleshooting.  Maintain and support cloud and on-prem environments, including campus networking, DNS, Web Application Firewall (WAF), servers, and endpoint provisioning.  Configure and optimize Intune, Windows Deployment Services, and automation tools to improve operational efficiency.  Support system stability and reliability across enterprise networks and SaaS platforms.  Collaboration & Strategic Support  Partner with IT, compliance, and business teams to integrate security best practices into daily operations and project workflows.  Serve as a technical lead during incident response efforts, including documentation, colleague communication, and root cause analysis.  Collaborate with third-party vendors for tool evaluation, contract review, and ongoing vendor management.  Manage cloud-based applications and infrastructure including Azure AD, Microsoft 365, and enterprise SaaS platforms.  Requirements Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, or a related field.  2+ years of experience in a hybrid IT/security role or cybersecurity-focused systems administration.  Proficient in managing and securing cloud platforms such as Microsoft Azure and SaaS environments.  Familiarity with security frameworks and tools (e.g., NIST CSF, SIEM, IDS/IPS, MFA, VPNs).  Hands-on experience with firewalls, encryption, group policy, and endpoint protection tools.  Strong knowledge of network protocols and system hardening best practices.  Experience responding to incidents and conducting root cause analysis and remediation.  Working knowledge of compliance frameworks like Joint Commission, HIPAA, PCI-DSS, and GDPR.  Experience with vulnerability scanning (e.g., Qualys, Tenable, Rapid7) and code scanning tools (e.g., Snyk, SonarQube, GitHub Advanced Security).  Excellent troubleshooting skills, communication skills, and documentation habits.  Preferred:  Certifications such as Security+, CISSP, CISM, CEH, or Microsoft/Azure certifications.  Experience with ITIL processes or other service management methodologies.     Work Schedule  In-office with flexibility to work from home with manager approval.    Benefits Why Triage? Our commitment to creating a unique work culture sets us apart from the rest—no corporate robots here. Triage values transparency and autonomy, and we believe in recognizing your efforts and dedication. Join us on this exciting journey as we continue to be recognized among Inc. Magazine's 5000 fast-growing companies in America. Triage Staffing is an equal-opportunity employer committed to fostering diversity and inclusion in the workplace. We prohibit discrimination and harassment based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws. Note: This job description outlines the primary duties and responsibilities of the Intern role but is not an exhaustive list. Additional tasks may be assigned by your supervisor or manager. All duties are subject to change and may be modified to reasonably accommodate individuals with disabilities. Your performance will be evaluated based on your execution of the tasks outlined in this job description.
Negotiable Salary
Prosync
Sr. Information System Security Officer
Annapolis Junction, MD, USA
ProSync Technology Group, LLC (ProSync) is an award-winning, SDVOSB Defense Contracting company with a strong military heritage and a record of excellence in supporting the Department of Defense and the Intelligence Community.  If you have prior military service or government contracting experience, are proud to serve and support our nation, and want to help support ProSync's mission to "Define and Redefine the State of Possible,” please apply today! The Senior Information Systems Security Officer (ISSO) will provide aid to the program, organization, system, or enclave's information assurance program and will also lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies in addition to the below. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements A minimum of twelve (12) years of total experience in the information security arena. A minimum of seven (7) years of experience directly as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. A Bachelors of Science degree in Computer Science, Information Assurance, Information Security, or related discipline. Experience supporting over 30 SSP's. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate). A Top Secret/SCI w/ Polygraph is required. Benefits Join PROSYNC and enjoy our great benefits! Compensation: We offer bonuses that are awarded quarterly to our employees and our compensation rates are highly competitive. Health & Retirement: We offer a comprehensive Health Benefits package and 401K Retirement plan so you can take care of yourself and your family, now and in the future. Other health-related benefits include an employee assistance program for those difficult times or when you need to take care of your mental health. Education: Individual growth is a priority at ProSync. Employees are encouraged to take advantage of our company-sponsored continuing education program so you can get your degree or that next certification you need to propel you to the next level. Work/Life Balance: A healthy work/life balance is essential for building and executing your work effectively at ProSync, but it’s also necessary to allow you the room to pursue everything else you want to develop in your personal life.. We offer generous Paid Time Off and 11 paid holidays a year. ProSync also provides flexible work options that work with your schedule and lifestyle.
Negotiable Salary
DMV IT Service
Cyber Detection & Automation Engineer
Seattle, WA, USA
Job Title: Cyber Detection & Automation Engineer  Location: Seattle, WA  Employment Type: Contract About Us:  DMV IT Service LLC is a trusted IT consulting firm, established in 2020. We specialize in optimizing IT infrastructure, providing expert guidance, and supporting workforce needs with top-tier staffing services. Our expertise spans system administration, cybersecurity, networking, and IT operations. We empower our clients to achieve their technology goals with a client-focused approach that includes online training and job placements, fostering long-term IT success. Job Purpose: The Cyber Detection & Automation Engineer will design, build, and maintain advanced detection logic and automation workflows across various security platforms. This role works closely with SOC analysts, threat intelligence teams, and incident responders to enhance threat detection, streamline security operations, and improve overall response capabilities. Requirements Key Responsibilities Develop and automate high-precision detection rules across SIEM, EDR, and cloud telemetry sources (e.g., Sentinel, Defender, AWS). Continuously monitor and optimize detection alerts to minimize false positives and enhance accuracy. Validate and test detection mechanisms to ensure ongoing reliability and effectiveness. Document detection methods, engineering processes, and knowledge transfer materials. Conduct detection coverage assessments and improve resilience and accuracy through gap analysis. Create security automation workflows using SOAR platforms, particularly Microsoft Sentinel and Logic Apps. Build custom integrations between security platforms, including SIEM, EDR, threat intelligence feeds, and ticketing systems. Automate repetitive SOC tasks like alert triage, IOC lookups, and ticket creation. Develop dashboards and utilities that provide insights into SOC metrics and operational performance. Collaborate with SOC analysts and threat intelligence teams to stay ahead of emerging threats using the MITRE ATT&CK framework. Maintain and update playbooks, runbooks, and documentation related to detection strategies and attacker behaviors. Prepare reports on detection performance, automation activities, and recommended improvements for leadership. Required Skills & Experience Bachelor’s degree in cybersecurity, computer science, IT, or related discipline. 5+ years of experience in cybersecurity, with at least 3 years focused on detection and automation engineering. Proficient in writing detection logic using KQL, SPL, or similar query languages. Skilled in scripting with Bash, PowerShell, Python, or JavaScript. Hands-on experience developing automation with SOAR platforms, particularly Microsoft Sentinel/Logic Apps. Strong understanding of SOC operations, incident response workflows, and threat detection strategies. Experience working with RESTful APIs and integrating third-party security tools. Background in cloud environments, preferably AWS and Azure. In-depth knowledge of the MITRE ATT&CK framework and threat modeling. Practical understanding of attacker TTPs and detection methodologies. Familiarity with version control (Git), CI/CD pipelines, and infrastructure as code. Ability to process and analyze large datasets to detect patterns and threats. Effective communication skills for diverse technical audiences. Collaborative mindset with the ability to work across multiple teams in a fast-paced environment. Preferred Certifications Microsoft SC-200, Azure Security Engineer Associate AWS Certified Security – Specialty GIAC (GCIA, GCTI, GDAT) CISSP, CISM
Negotiable Salary
Trexquant Investment
Senior Cyber Security Engineer (USA)
Stamford, CT, USA
Trexquant is a growing systematic fund adviser with a core team of highly accomplished technologists. We apply a wide variety of statistical and machine learning techniques to build investment portfolios and trade our client assets in global equity and derivatives markets.  Our global team is composed primarily of research professionals with advanced science, math and technology degrees, with locations in the US, China and India.   We’re looking for a motivated and technically adept security engineer to support the Technology and Compliance teams in engineer, enhancing and maintaining the Firm’s security program and infrastructure.   This opportunity is ideal for a security professional who strives to work on diverse projects in an academically-influenced technologist culture, with mentoring and guidance from veteran staff. Responsibilities Explore, develop and implement innovative security solutions, protocols, and procedures to protect the organization’s systems and networks. Maintain current security platforms and set up preventive measures. Assist in reviewing cybersecurity protocols designed to protect the Firm’s proprietary data, systems and infrastructure in accordance with industry regulations and best practices. Monitor vulnerability awareness platforms, penetration testing results, and other risk analysis to identify and mitigate security weaknesses. Help maintain and review data flow monitoring and configure logging tools to capture and detect suspicious behavior.  Assist compliance team  with incident response procedures to identify, manage, and mitigate security incidents and breaches, and establish a protocol for security incident reporting. Collaborate with internal stakeholders to carry-out periodic risk assessments and work closely with consultants to ensure ongoing compliance and security readiness. Stay up to date with the latest security trends, technologies, and threat intelligence. Requirements Bachelor’s degree  in Cybersecurity, Information Technology, Computer Science, or a related field. Master’s degree in a related field preferred. 3+ years of prior experience in a security engineering or security operations role, ideally at a quantitative adviser, technology company or systematic trading firm. Solid understanding of security concepts such as encryption, authentication, access control, vulnerability management and network monitoring and security. Experience with security tools such as firewalls, SIEM systems, IDS/IPS and vulnerability scanners. Knowledge of security frameworks and standards (e.g., NIST,  ISO 27001, SOC 2, PCI-DSS, GDPR). Experience with scripting or automation (e.g., Python, Bash, PowerShell) to implement security measures or automate tasks. Ability to translate complex security concepts to non-technical stakeholders. Industry certifications such as CISSP, CEH, or CompTIA Security+ are preferred. Good knowledge of Unix-like operating systems and experience with FreeBSD is a plus. Benefits Competitive salary, plus bonus based on individual and company performance Collaborative, casual, and friendly work environment while solving the hardest problems in the financial markets PPO Health, dental and vision insurance premiums fully covered for you and your dependents Pre-tax commuter benefits Weekly company meals Trexquant is an Equal Opportunity Employer
Negotiable Salary
Cookie
Cookie Settings
© 2025 Servanan International Pte. Ltd.