Senior Cyber Security Specialist
Overview
Are you a Senior Cyber Security Specialist who would like to have a positive impact for millions of people? If so, we may have an opportunity for you!
TISTA associates enjoy above Industry Healthcare Benefits, Remote Working Options, Paid Time Off, Training/Certification opportunities, Healthcare Savings Account & Flexible Savings Account, Paid Life Insurance, Short-term & Long-term Disability, 401K Match, Tuition Reimbursement, Employee Assistance Program, Paid Holidays, Military Leave, and much more!
Responsibilities
• Administer, configure, and troubleshoot enterprise inline security systems, including Firewalls, malware Protection Systems, and network taps and packet broker switches.
• Perform real-time network and system malware protection, detection, event triage, and log analysis across inline and passive security sensors.
• Develop, tune, and maintain whitelisting and blacklisting security policies, access control rules, and security profiles.
• Apply strong understanding of ports, protocols, services, IP addressing, and CIDR-based rules to enforce enterprise access controls.
• Analyze syslog, event logs, and network telemetry to support dashboards, threat awareness, and compliance requirements.
• Perform troubleshooting of traffic flows, session behavior, and inline inspection issues in coordination with network and application teams.
• Conduct compliance assessments in accordance with CISA, NIST, and OMB directives.
• Prepare documentation, SOPs, configuration guides, diagrams, and architectural notes for supported systems.
• Provide briefings, reports, and issue summaries to senior managers and VA leadership as requested.
• Support lifecycle efforts such as upgrades, refreshes, and platform optimization for inspection systems.
• Collaborate closely with the Security Operations Center, Network Engineering, Data Center teams, and application owners to ensure aligned security controls across the enterprise.
• Contribute to the development of service-level metrics, KPIs, and operational maturity improvements across the security stack.
• Maintain awareness of emerging cybersecurity threats and apply relevant knowledge to incident response and detection tuning.
• Support or perform packet capture review, network session analysis, and traffic inspection validation.
Qualifications
• Hands-on experience with Firewalls, including knowledge of Application-ID, Threat profiles, malware protection, and security policy design.
• Experience with malware Protection Systems malware detection and inline analysis platforms.
• Experience with network visibility equipment (taps, packet brokers, service chain filtering).
• Solid conceptual understanding of networking concepts including routing, switching, VLANs, VRFs, segmentation, and Cisco/Juniper environments.
• Ability to evaluate and enforce rules using ports, protocols, CIDR ranges, and application-level identifiers.
• Experience with IDS/IPS technologies, SIEM platforms, NAC, vulnerability management, and compliance frameworks.
• Ability to perform event correlation, threat detection, and log analysis in large enterprise environments.
• Strong understanding of hybrid on-prem and cloud environments (e.g., Azure and AWS), including how traffic, logging, and security controls integrate across them, as well as familiarity with enterprise telemetry pipelines.
• Excellent documentation skills, including technical writing, SOP creation, architectural documentation, and configuration baselines.
• Strong communication skills with the ability to explain complex technical concepts in clear, plain language to leadership or non-technical stakeholders.
• Ability and willingness to continually expand skills and learn new technologies as organizational needs evolve.
• Ability to work effectively with SOC analysts, network engineers, data center teams, system administrators, and application teams.
Preferred Skills:
• Experience supporting the Department of Veterans Affairs or other federal healthcare environments.
• Familiarity with ServiceNow, CMDB structures, workflow processes, and operational ticketing.
• Awareness of Azure and AWS cloud services and cloud security concepts.
• Understanding of virtualization and containerization concepts and their relationship to network security visibility.
• Familiarity with enterprise WAF technologies.
• Experience with vulnerability and compliance frameworks such as NIST, CISA, OMB, and FedRAMP.
• Experience contributing to incident response workflows, detection tuning, and malware analysis processes.
• Experience supporting SOP lifecycle management and configuration standardization across enterprise systems.
• Proficiency with Microsoft Teams and SharePoint for communication and content management.
• Familiarity with SIEM platforms and security data correlation workflows.
• Strong professional demeanor with the ability to accept direction and contribute constructively to a team environment.
• Strong accountability and reliability, with consistent availability and responsiveness in a remote work setting.
• Self-motivated and results-driven, with a willingness to take initiative, propose improvements, and consistently set high performance standards, even in the absence of direct assignments.
Education:
• Bachelor's Degree in Computer Science, Electronics Engineering, or equivalent PLUS 10 Years of experience.
• Eight (8) years of additional relevant experience may be substituted for education.
Clearance:
• The ability to pass a Tier 4/HIGH Background Investigation.
Location:
• Remote, USA.
• Monday - Friday (8:00 AM - 4:30 PM CST).
Pay Range:
• The pay for this position ranges from $82,730 to $95,500.
• The actual salary offer will carefully consider a wide range of factors, including your skills, qualifications, experience, and location.
• Also, certain positions are eligible for additional forms of compensation, such as bonuses.
• TISTAA associates are eligible to participate in our comprehensive benefits plan! More information can be found here:
Apply tot his job
Apply To this Job