Zel Technologies
  • 05-May-2017 to 21-May-2018 (EST)
  • Arlington, VA, USA
  • Full Time

Must have an active clearance to be considered for this position

Job Summary: The position is located in Arlington, Virginia supporting the Joint Improvised-Threat Defeat Organization (JIDO) Integrated Signatures Program (ISP). Applicant will provide cyber security software engineering support through the usage of ethical hacking in order to identify potential security vulnerabilities in the systems, create a risk profile, and implement proposed solutions in order to eliminate identified vulnerabilities. Applicant will be responsible for leading security assessments of new and existing systems, performing research for the development of new security architectures, and testing tactics, techniques, and procedures for the protection of information.   

Essential Job Functions:

  • Develops scripts, tools or methodologies to enhance the vulnerability assessment and penetration testing processes.
  • Effectively communicate findings and strategy to internal and/or external stakeholders, including executive leadership in order to define needs, develop requirements, analyze findings, and recommend solutions.
  • Conducts analysis of electronic media, packet capture, log data and network devices in support of intrusion analysis through the usage of digital forensics.
  • Provides technical security planning, implementation, configuration, support and troubleshooting expertise on security technologies.
  • Analyzes complex technology, data communications and/or operational problems and implements solutions.
  • Knowledge of designing, configuring, installing and maintaining server hardware and/or software and peripheral equipment.
  • Collaborates with other IT, security, engineering and business teams to develop technical requirements for their systems or networks.
  • Implements solutions and provides technical support as required to meet these requirements.
  • Provides accurate, clear, and concise documentation of system requirements, specifications, and final builds.
  • Performs all necessary functions associated with the implementation and integration of security tools and platforms into the enterprise environment.
  • Performs other duties as required.


  • Good interpersonal skills
  • Effective communicator
  • Works well independently or as part of a group
  • Good writing skills, as there may be a requirement to write reports
  • Degree of judgment and multi-tasking associated with performing job duties
  • Contact with the customer/provide customer support (may be internal or external customer)
  • May conduct some research   



  • Bachelor's Degree in Computer Science, Computer Engineering, or similar degree/certification


  • Master of Science degree in Computer Science, Computer Engineering, or equivalent.
  • Certified Information Systems Security Professional (CISSP)

OR: 4-9 years in an equivalent discipline

Special Requirements:

  • Must have an active clearance to be considered for this position
  • Certified Ethical Hacker (CEH) certificate preferred
  • 3-5 years that encompasses the following technical experience:
    • Working with security solutions and conducting security operations
    • Working with network protocols, data flows and attacks within an IP environment
  • Preferred experience reviewing security tools and solutions and making recommendations on software utilization and strategy preferred
  • Security certified in one or more of the following: Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC), Systems Security Certified Practitioner (SSCP), or Certified Cyber Forensics Professional (CCFP) with CISSP preferred
  • Demonstrated experience in two or more security technologies, e.g. CheckPoint, Fortinet, Cisco, WebSense, Tipping Point, FireEye, Splunk

Equal Employment Opportunity / Affirmative Action Employer
"This contractor and subcontractor shall abide by the requirements of 41 CFR 60741.5(a).   This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities."

Zel Technologies
  • Apply Now

    with our quick 3 minute Application!

  • * Fields Are Required

    What is your full name?

    How can we get a hold of you?

    By clicking the button above, I agree to ApplicantPro's Applicant Information Use Policy.

  • Sign Up For Job Alerts!

  • Share this Page
  • Facebook Twitter LinkedIn Email
Logo Contact Us Home About Us Products/Services Contracts News Careers