Mid-Senior level
Posted April 17, 2026
Job link
Thinking about this job
Responsibilities
Commitments
Responsibilities
- Analyze similarities and differences of an existing system and customer needs to identify protection needs for information system(s) and network(s); provides detailed specifications for technical needs of the infrastructure
- Develop a system security context and preliminary system security concept of operations (CONOPS), including baseline system security requirements
- Determine appropriate levels of system availability based on critical system functions; provides input on system requirements to address appropriate disaster recovery and continuity of operations requirements
- Evaluate acquisition documents against existing and proposed security architectures and designs by examining the security-relevant parts of a system and interrelationships within the enterprise.
- On going PAM Tool configuration: activities include configuring SmartTules, Splunk/MFA/ServiceNow/SCIM Server Integration, Authentication, Define Beyond Trust Roles, and etc.
- On going management support of PAM tool: activities include providing password safe user support and ticket resolutions, maintaining of virtual appliances (Patches and Upgrades), maintaining and support of Windows/Linux servers/MS SQL server DB, and etc.
- Provision additional Computer resources to support scalability, if needed
Commitments
Location: Remote in Morrisville, NC
On going PAM Tool configuration: activities include configuring SmartTules, Splunk/MFA/ServiceNow/SCIM Server Integration, Authentication, Define Beyond Trust Roles, and etc.
On going account onboarding onto PAM tool : activities include conducting Asset & Account Discovery Sessions
On going management support of PAM tool: activities include providing password safe user support and ticket resolutions, maintaining of virtual appliances (Patches and Upgrades), maintaining and support of Windows/Linux servers/MS SQL server DB, and etc.
Additional Provisions
Must be able to obtain a Position of Public Trust Clearance
Pass both a client mandated clearance process to include drug screening, criminal history check and credit check.
All candidates must be a US Citizen only
Candidate must have lived in the United States for the past 5 years.
Cannot have more than 6 months travel outside the United States within the last five years.
Military Service excluded. (Exception does not include military family members.)
Not Met Priorities
What still needs stronger evidence
Requirements
- On going PAM Tool configuration: activities include configuring SmartTules, Splunk/MFA/ServiceNow/SCIM Server Integration, Authentication, Define Beyond Trust Roles, and etc.
- On going account onboarding onto PAM tool : activities include conducting Asset & Account Discovery Sessions
- On going management support of PAM tool: activities include providing password safe user support and ticket resolutions, maintaining of virtual appliances (Patches and Upgrades), maintaining and support of Windows/Linux servers/MS SQL server DB, and etc.
- Provision additional Computer resources to support scalability, if needed
- Raise issues, risks, or decisions to product owners and management
- Identify roadblocks and propose effective solutions
- Ability to positively influence peer organization and key stakeholders
- An ability to prepare and interpret flowcharts, schedules, and step-by-step action plans
- Extensive experience (7+ years) in information security operations and/or related IT operational functions
- CompTIA Security +
- CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker
- Certified Information System Security Professional (CISSP)
- Must be able to obtain a Position of Public Trust Clearance
- Pass both a client mandated clearance process to include drug screening, criminal history check and credit check.
- All candidates must be a US Citizen only
- Candidate must have lived in the United States for the past 5 years.
- Cannot have more than 6 months travel outside the United States within the last five years.
Preferred Skills
- Background/knowledge of Identity & Access Management with emphasis on Privilege Access Management
- Working knowledge of the BeyondTrust Password Safe or other PAM solutions
- Strong knowledge of directory services: Active Directory or LDAP
- Strong Windows and UNIX system administration
- Excellent oral and written communication skills - Technical writing, diagraming or PPT skills helpful
- Excellent interpersonal and organizational skills
- Experiences in agile environment
Education
- (Not required) – Education
- (Required) – Must possess a minimum of a Bachelor’s Degree in Computer Science, Information Technology, or Information Security (Master’s Degree preferred).
- (Required) – CERTIFICATIONS: (One or more required)
- (Not required) – CompTIA Security +
- (Not required) – CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker
- (Not required) – Certified Information System Security Professional (CISSP)
PlanIT Group is seeking a PAM - Cyber Security Engineer III to support our Federal customer in the Washington, DC area. The ideal candidate will be responsible for the security architecture across a variety of applications or domains, to include cloud computing, and assigned to project/initiatives of large size, complexity, and risk. The Senior Cyber Security Engineer develops actionable security blueprints, principles, models, designs, standards, and guidelines to ensure enterprise information technology architecture and support is consistent, usable, secure and adds value to the business.
Job Title: PAM - Cyber Security Engineer III
Location: Remote in Morrisville, NC
Duration: One year plus annual extensions
Privileged Access Management (PAM) - Cyber Security Engineer III
Responsible for the security architecture across a variety of applications or domains, to include cloud computing, and assigned to project/initiatives of large size, complexity, and risk. The Senior Cyber Security Engineer develops actionable security blueprints, principles, models, designs, standards, and guidelines to ensure enterprise information technology architecture and support is consistent, usable, secure and adds value to the business.
Duties
Analyze similarities and differences of an existing system and customer needs to identify protection needs for information system(s) and network(s); provides detailed specifications for technical needs of the infrastructure
Develop a system security context and preliminary system security concept of operations (CONOPS), including baseline system security requirements
Determine appropriate levels of system availability based on critical system functions; provides input on system requirements to address appropriate disaster recovery and continuity of operations requirements
Evaluate acquisition documents against existing and proposed security architectures and designs by examining the security-relevant parts of a system and interrelationships within the enterprise.
Required Skills/Knowledge
On going PAM Tool configuration: activities include configuring SmartTules, Splunk/MFA/ServiceNow/SCIM Server Integration, Authentication, Define Beyond Trust Roles, and etc.
On going account onboarding onto PAM tool : activities include conducting Asset & Account Discovery Sessions
On going management support of PAM tool: activities include providing password safe user support and ticket resolutions, maintaining of virtual appliances (Patches and Upgrades), maintaining and support of Windows/Linux servers/MS SQL server DB, and etc.
Provision additional Computer resources to support scalability, if needed
Raise issues, risks, or decisions to product owners and management
Identify roadblocks and propose effective solutions
Ability to positively influence peer organization and key stakeholders
Added Benefit
Background/knowledge of Identity & Access Management with emphasis on Privilege Access Management
Working knowledge of the BeyondTrust Password Safe or other PAM solutions
Strong knowledge of directory services: Active Directory or LDAP
Strong Windows and UNIX system administration
Excellent oral and written communication skills - Technical writing, diagraming or PPT skills helpful
Excellent interpersonal and organizational skills
Experiences in agile environment
An ability to prepare and interpret flowcharts, schedules, and step-by-step action plans
Experience Level
Extensive experience (7+ years) in information security operations and/or related IT operational functions
Education
Must possess a minimum of a Bachelor’s Degree in Computer Science, Information Technology, or Information Security (Master’s Degree preferred).
CERTIFICATIONS: (One or more required)
CompTIA Security +
CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker
Certified Information System Security Professional (CISSP)
Additional Provisions
Must be able to obtain a Position of Public Trust Clearance
Pass both a client mandated clearance process to include drug screening, criminal history check and credit check.
All candidates must be a US Citizen only
Candidate must have lived in the United States for the past 5 years.
Cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members.)
Job Title: PAM - Cyber Security Engineer III
Location: Remote in Morrisville, NC
Duration: One year plus annual extensions
Privileged Access Management (PAM) - Cyber Security Engineer III
Responsible for the security architecture across a variety of applications or domains, to include cloud computing, and assigned to project/initiatives of large size, complexity, and risk. The Senior Cyber Security Engineer develops actionable security blueprints, principles, models, designs, standards, and guidelines to ensure enterprise information technology architecture and support is consistent, usable, secure and adds value to the business.
Duties
Analyze similarities and differences of an existing system and customer needs to identify protection needs for information system(s) and network(s); provides detailed specifications for technical needs of the infrastructure
Develop a system security context and preliminary system security concept of operations (CONOPS), including baseline system security requirements
Determine appropriate levels of system availability based on critical system functions; provides input on system requirements to address appropriate disaster recovery and continuity of operations requirements
Evaluate acquisition documents against existing and proposed security architectures and designs by examining the security-relevant parts of a system and interrelationships within the enterprise.
Required Skills/Knowledge
On going PAM Tool configuration: activities include configuring SmartTules, Splunk/MFA/ServiceNow/SCIM Server Integration, Authentication, Define Beyond Trust Roles, and etc.
On going account onboarding onto PAM tool : activities include conducting Asset & Account Discovery Sessions
On going management support of PAM tool: activities include providing password safe user support and ticket resolutions, maintaining of virtual appliances (Patches and Upgrades), maintaining and support of Windows/Linux servers/MS SQL server DB, and etc.
Provision additional Computer resources to support scalability, if needed
Raise issues, risks, or decisions to product owners and management
Identify roadblocks and propose effective solutions
Ability to positively influence peer organization and key stakeholders
Added Benefit
Background/knowledge of Identity & Access Management with emphasis on Privilege Access Management
Working knowledge of the BeyondTrust Password Safe or other PAM solutions
Strong knowledge of directory services: Active Directory or LDAP
Strong Windows and UNIX system administration
Excellent oral and written communication skills - Technical writing, diagraming or PPT skills helpful
Excellent interpersonal and organizational skills
Experiences in agile environment
An ability to prepare and interpret flowcharts, schedules, and step-by-step action plans
Experience Level
Extensive experience (7+ years) in information security operations and/or related IT operational functions
Education
Must possess a minimum of a Bachelor’s Degree in Computer Science, Information Technology, or Information Security (Master’s Degree preferred).
CERTIFICATIONS: (One or more required)
CompTIA Security +
CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker
Certified Information System Security Professional (CISSP)
Additional Provisions
Must be able to obtain a Position of Public Trust Clearance
Pass both a client mandated clearance process to include drug screening, criminal history check and credit check.
All candidates must be a US Citizen only
Candidate must have lived in the United States for the past 5 years.
Cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members.)