DefendEdge Cyber Security Jobs

DefendEdge Cyber Security Jobs

Be Part of Something Special

DefendEdge Cyber Security Jobs is looking for new or experienced individuals to join a our team. Make a difference in your career. Join the future in technology and innovation.

Looking for Cyber Security Jobs? Join DefendEdge

We are one of the fastest growing Cyber Security companies in the US. On day one our focus was to hire the right people made up of diverse backgrounds and inspiring goals. As we grow, our need for more adaptive people becomes important. This gives our team the opportunity to learn more about emerging cyber technologies.

Our Team Delivers

All DefendEdge hires have a deep understanding and commitment to customer service. It is important that our highest priority and focus is to protect clients from cyber attacks. We often go above and beyond our jobs providing this client assurance.

Work-Life Balance as Entrepreneurs

Like many jobs, the hours and responsibilities can be long and demanding. We do a pretty good job of striking a balance in our lives without losing focus. Our team knows what needs to get done as far as client deliverables and expectations. We emphasize teamwork by demonstrating it each day and don’t hold people to a traditional work schedule.

How to Qualify for Jobs and Get Started at DefendEdge:

  • High Aptitude

  • Critical Thinking

  • Innovative

  • Collaborate

  • Highly Motivated

  • Communication

  • Desire to Learn Emerging Technologies and Methodologies

  • Understand the basic Fundamentals in Business and Industries

You MatterYour opinion and voice is importantRelaxed EnvironmentA balanced day is a productive dayTraining & CertificationsOngoing continuous improvement is essential in our differentiationUnlimited VacationWhy place limits on responsible adults? DefendEdge doesn’t.Health InsuranceWe offer several options in health insurance plans that is right for you.
Previous
Next

Come Join our
Fun
High Performing
Intelligent
Client Focused
Team

DE success
DefendEdge Security Monitoring

Company and Personal Success can be Achieved Together!

What we Look for:

  • DefendEdge has always and continues to be primarily built on a foundation of highly talented individuals with the ability to overachieve limits and obstacles. We don’t care about academics or degrees. We focus on hiring individuals that can demonstrate personal drive, success, and aptitude.

What we Offer:

  • DefendEdge offers on-the-job training using our proven, highly effective cybersecurity program, including various industry-recognized certifications. 
  • We also provide internships by partnering with universities and the DOD SkillBridge program and provide the opportunity for Service members to gain valuable civilian work experience within the cybersecurity industry.  

Why?

  • This enables us to provide a premium class of cyber security service that differentiates us from others. Our values, environment, and teamwork are a perfect combination for the types of individuals we hire.

Jobs on our Team

  • DS/IPS, penetration and vulnerability testing
  • Firewall and intrusion detection/prevention protocols
  • Security best practices and threat modeling
  • PCI, HIPAA, NIST, GLBA and SOX compliance assessments
  • Windows, UNIX and Linux operating systems
  • Performance tuning views, indexes, SQL and PLSQL
  • Application security and encryption technologies
  • Fundamentals in programming languages
  • Subnetting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods
  • Network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc.)
  • Advanced Persistent Threats (APT), phishing and social engineering, access controllers, anti-malware and enhanced authentication
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, ettercap, static source code analysis tools, dynamic binary testing tools
  • Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security related certifications a plus: CISSP, CISA, CEH, GIAC
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering
  • Metasploit framework
  • Forensics tools
  • Cryptography principles
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • TCP/IP-based network communications
  • Computer hardware and software systems
  • Operating system installation, patching and configuration
  • Backup and archiving technologies
  • Web-based application security
  • eDiscovery tools (NUIX, Relativity, Clearwell, etc.)
  • Forensic software applications (e.g. EnCase, FTK, Helix, Cellebrite, XRY, etc.)
  • Enterprise system monitoring tools and SIEMs
  • Cloud computing
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, nessus, ettercap, static source code analysis tools, fuzzing tools, dynamic binary testing tools
  • Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering
  • Metasploit framework
  • Forensics tools
  • Cryptography principles
  • Extensive experience in project management for software development
  • Adept at learning and applying new technologies and solving new problems
  • Excellent communication skills – both written and verbal – for internal and client-centric environments
  • Collaborative in nature
  • Effective organizational skills with strong attention to detail
  • Demonstrated ability to collect client feedback and understand and address client pain points
  • Familiarity in dealing with managing engagements with large enterprise clients
  • Ability to develop relationships with clients built on trust and credibility
  • Extensive experience with Atlassian products
  • Experience with functional programming languages such as Scala or Erlang
  • Understanding of DevOps tools and CI/CD processes
  • Experience and interest in large-scale distributed systems
  • Interest in with Apache Spark, Apache Pig, AWS Pipelines, Google Dataflow, or MapReduce
  • Advanced knowledge of domain controllers, network security monitoring tools, SIEMs, threat intelligence, et.
  • Experience with computer network operations and Security Operations Centers
  • IDS/IPS, penetration and vulnerability testing
  • TCP/IP, computer networking, routing and switching
  • DLP, anti-virus and anti-malware
  • Firewall and intrusion detection/prevention protocols
  • Secure coding practices, ethical hacking and threat modeling
  • Windows, UNIX and Linux operating systems
  • ISO 27001/27002, ITIL and COBIT frameworks
  • PCI, HIPAA, NIST, GLBA and SOX compliance assessments
  • C, C++, C#, Java or PHP programming languages
  • Security Information and Event Management (SIEM)
  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies
  • ISO 27001/27002, ITIL and COBIT frameworks
  • Windows, UNIX and Linux operating systems
  • Perimeter security controls – firewall, IDS/IPS, network access control and network segmentation
  • Router, switch and VLAN security; wireless security
  • Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
  • Practices and methods of IT strategy, enterprise architecture and security architecture
  • Network security architecture development and definition
  • Knowledge of third party auditing and cloud risk assessment methodologies
  • Working knowledge of regulatory and industry data security standards (e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
  • ISO 27001/27002, ITIL and COBIT frameworks
  • Windows, UNIX and Linux operating systems
  • MSSQL and ORACLE databases
  • C, C++, C#, Java and/or PHP programming languages
  • ACL, IDEA and/or similar software programs for data analysis
  • Fidelis, ArcSight, Niksun, Websense, ProofPoint, BlueCoat and/or similar auditing and network defense tools
  • Firewall and intrusion detection/prevention protocols
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • TCP/IP-based network communications
  • IP security
  • Relational databases (e.g. SQL, MySQL, SQLite, etc.)
  • Hypervisors (e.g. VMware, KVM, etc.)
  • Python Experience in HTML/CSS
  • XML/Web Services, AJAX
  • Cloud computing
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Network scanning tools (e.g. Nessus, ACAS, RETINA, Gold Disk, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering
Contact us for your next Career