Position Title. Mid-Level Security Engineer. Location. Woodlawn MD. Hours. 9 am – 5pm. . Position Summary. Iron Vine Security is a rapidly growing information security and information technology company in Washington, DC. We are looking for a dynamic Infrastructure Security Engineer who is proficient in Linux administration (using the CLI) and is passionate about security. The candidate should be knowledgeable in a broad foundation of technologie...
Primary Responsibilities. ● Design, develop, support, and maintain the organization's information systems infrastructure, including the implementation and design of hardware and software with an emphasis on cyber security, risk/vulnerability analysis and compliance to prevent potential threats, attacks, incidents, forensics, intrusions, and/or responses/remediations within the system. ● Review previous documents and prepare up-to-date d...
Position Title. Security_Analyst_(Mid). Location. Baltimore, MD. Hours. 9 am – 5pm. . Position Summary. Iron Vine Security is a rapidly growing information security and information technology company in Washington, DC. We are looking to hire a Junior Security Analyst to provide a full range of cyber security services on a long-term contract in Baltimore, MD. The position is full time/permanent and will support a US Government civilian agency. The...
Job Requirements. Strong written and verbal communication skills. Experience designing, implementing, and maintaining IT security systems to protect digital assets from malicious cyber-attacks. Experience developing and implementing an annual Incident Response Training and Testing Program. Experience implementing, configuring, and administering SIEM and IDS products to ensure proper visibility into the environment and compliance requirements. Abi...
Job Requirements. Strong written and verbal communication skills. Create detections and automations to detect, contain, eradicate, and recover from security threats. Develop new and novel defense techniques to identify and stop advanced adversary tactics and techniques. Perform forensics on network, host, memory, and other artifacts originating from multiple operating systems, applications, or networks and extract IOCs (Indicators of Compromise) ...