At ShorePoint, we recognize that what we do for our customers is critical, complex and often intense. Our team-oriented culture promotes creativity and collaboration in a fun and relaxed work environment.

ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion, and a focus on giving back to our community.

We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers.

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Cybersecurity Engineer to drive the implementation of Zero Trust Infrastructure with data security controls, including enhanced Zero Trust detection capabilities and improved event analysis, in large enterprises within the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

Roles and Responsibilities 

  • Review, analyze, and architect Zero Trust security configurations, designs, and solutions.
  • Drive the Zero Trust security of some of the nation’s most advanced, data-intensive systems.
  • Apply threat modeling techniques for developing custom-tailored Zero-Trust controls that apply to secure design and architecture methodologies for network, data, and application deployments and work to infuse Zero Trust design principles across all pillars in a Zero Trust model.
  • Support enterprise-wide, end-to-end Zero Trust architecture projects involving cutting-edge technologies and concepts, including cloud technologies, enterprise identity, microservices, containers, encryption, tokenization, AI, ML, SIEM, SOAR, and threat modeling.
  • Consult on Zero Trust security technologies, tools, and techniques and communicate the complexities of security with a wide variety of audiences, including senior management.

Required Skills 

  • 8+ years of experience with enterprise security architecture, including designing, building, and maintaining enterprise IT systems.
  • Experience with data classification standards and controls in U.S government environments and classified data handling.
  • Experience with solutions across Zero Trust pillars.
  • Experience with enterprise cloud systems.
  • Working knowledge and understanding of CISA/NIST/DOD Zero Trust research and guidance.
  • Experience with the build-out and lab environments and demo systems to replicate customer environments and real-world simulations.
  • Knowledge of best practice Cybersecurity and Threat-based Cybersecurity frameworks and latest trends.

Desired Skills 

  • Knowledge of U.S. security requirements related to regulations or standards, including NIST SP 800-171, 800-53, RMF, ISO 27001, or SOX.
  • Ability to write and maintain technical documentation, including reference architectures and implementation plans.

Education Requirement 

  • Bachelors degree or equivelant years of experience

Certification Requirement

  • CISSP or Cloud+ certification or equivilant highly desired

Location

  • Remote with some travel required.

Security Clearance 

  • Must be a US Citizen & be able to obtain a clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking an Senior Policy Analyst SME who has experience providing cybersecurity architecture, engineering, and strategic consulting services in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

Roles and Responsibilities

The ideal candidate will provide expert-level technical support services across a broad portfolio of cybersecurity and engineering domains, with an emphasis on enterprise level risk analysis, mitigation, and management. The Senior Policy Analyst SME will help lead the maturation of federal Enterprise Risk Management (ERM) capabilities. The SME will provide thought leadership to guide decision making and innovation at the enterprise level and will identify and implement improvements to increase the value and effectiveness of current and emerging risk management and mitigation strategies and best practices. Our customer’s requirements are dynamic and complex; we are seeking individuals who can effectively balance strategic, long-term planning with the tactical day-to-day demands of supporting a mission-focused customer. The ideal candidate must be a fast learner, and able to effectively engage resources and work across teams to decompose large, complex problems into workable solutions. An aptitude for learning, strategic planning, and the ability to effectively communicate at all levels of the organization are a must

Required Skills

  • Deep understanding of Cyber policy: ICD-503, ITIL, NIST 800-27, NIST Cybersecurity Framework,RMF, FISMA
  • Experience with specific software: Elastic, Cribl, ServiceNow, Splunk, Nessus, Arcsight, Jira, RSA Archer, Xacta
  • Experience working in Agile-based program structures
  • Demonstrated experience leading program delivery
  • Experience performing gap analysis on information assurance standards and common services for strategic cyber investment
  • Experience providing governance and project management support
  • Experience providing government costing estimates and requirements analysis for software and security applications
  • Experience developing FISMA reporting (CyberScope & OMB FISMA reporting requirements) and supporting narratives for compliance and/or gaps in compliance with FISMA reporting requirements
  • An understanding of a wide variety of IT system infrastructure and application development methodologies

Desired Skills 

  • Security Engineering expertise in support of the security architecture of large scale and complex enterprise and/or major mission systems/investment programs – from initial threat and risk assessments, to security architecture requirement development and implementation
  • Experience providing cybersecurity engineering, support, analysis, documentation, and/or validation services for a broad set of IT solutions, including applications, networks, systems, architectures, and infrastructure
  • Experience developing and implementing security and risk mitigation strategies, technical and operational controls, POA&Ms, Risk Acceptance and Waivers
  • Extensive understanding of managing system vulnerabilities and associated Risk Management processes and artifacts
  • Experience developing and executing cybersecurity assessment plans, testing procedures, and providing risk mitigation guidance
  • Experience developing and providing guidance to organizations and/or program/system owners and teams in vulnerability and risk identification, remediation, as well as risk posture determination and risk mitigation
  • Knowledge of Analytic Hierarchy Process (AHP) with Pairwise comparison process and its use to inform decisioning

Education Requirement 

  • Bachelor’s Degree desired

Years of Experience Requirement 

  • 6+ years working within Federal Enterprises supporting cybersecurity related programs

Location 

  • Remote with some travel required

Security Clearance 

  • Must be a US Citizen & be able to obtain a clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Identity and Access Management Subject Matter Expert who has expertise in all aspects of ICAM, Federal ICAM (FICAM), Zero-Trust Implementation, Zero-Trust Architecture coupled with Program Management skills in the federal market.This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Oversee the management and delivery of IAM services.
  • Leads Identity and Access Management change, both within and outside the Department, to meet organizational goals.
  • Documented skills and experience with ICAM architecture implementation, Personal Identity Verification (PIV), Derived Personal Identity Verification (PIV) Credentials, Personal Identity Verification-Interoperable (PIV-I) and alternative PIV form factors (e.g. RSA token, Yubikey, etc.), PIV applications for Physical Access Control System (PACS), PIV applications for Logical Access Control (LACS), Federal Information Security Modernization Act (FISMA), Federal Information Processing Standards (FIPS) Publication 201, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-63, PIV deployment for digital authentication.
  • Has hands-on experience managing or supporting complex technical ICAM implementations, and experience with Federal Public Key Infrastructure (FPKI).
  • Has a robust solid understanding of how ICAM promotes security and trust, as well as meeting business needs while achieving the intended value.
  • Familiar with closing security gaps in user identification and authentication, encryption of sensitive data, and logging and auditing while providing for future identity management needs.

 

Required Skills 

  • Demonstrated experience successfully designing, recommending, and implementing highly innovative solutions that leverage the full breadth of available ICAM tools and technologies (e.g., Okta, Sailpoint, ADFS, SAML, OAuth; PIV/PIV-I/PIV-D; PKI, OSCP, PAM) to solve complex technical issues.
  • Understanding of Zero-Trust Architecture and how ICAM solutions support their success.
  • Strong leadership, written and verbal communication, and analytic and problem-solving skills are required.

Desired Skills 

  • Experience with design, implementation or maintenance of a Zero Trust architecture in a Federated enterprise environment
  • Experience operating and maintaining SD-WAN and/or NFV technologies

 

Education Requirement 

  • Bachelor’s or Master’s degree in Cybersecurity, Information Technology, Computer Science, Engineering, or related field.

 

Years of Experience Requirement

  • 8+ years working on Federal IAM Programs, including leadership of ICAM modernization strategy and projects in large, complex enterprise environments (both on-premise and cloud).

 

Certification Requirement 

  • At least one high level cybersecurity certification is very strongly preferred.

 

Location 

  • Remote with some travel required.

 

Security Clearance

  • Eligibility to obtain and maintain customer required security clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Controls Assessor who has experience conducting independent comprehensive assessments of the management, operational, and technical security/privacy controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market..

Roles and Responsibilities

 

  • Conduct independent security control testing and assessments of the management, operational, and technical security controls to determine the overall effectiveness of security controls, based on the NIST Risk Management Framework (RMF).
  • Technically assess general support system security configurations and security control implementation using manual and automated test methods.
  • Provide an assessment of the severity of weaknesses or deficiencies discovered in the information system and its environment of operation and recommend corrective actions to address identified vulnerabilities.
  • Develop and review SCA artifacts such as Security Assessment Plan (SAP), Security Assessment Reports (SAR) and Security Configuration Reports (SCR).

 

Required Skills

 

  • Hands on experience conducting vulnerability assessments and analysis of scan results with Tenable Nessus.
  • Hands on experience conducting configuration compliance assessments (automated and manual) using Tenable Nessus and DISA STIGs. Experience providing analysis of compliance scan results.
  • Experience working with Plans of Action and Milestones (POA&Ms) to include providing detailed vulnerability summaries and impacts and drafting risk mitigation strategies for identified risk.
  • Experience with RMF steps 4-6 (Assess, Authorize, Monitor) for federal applications and GSSs.
  • Experience assessing various IT infrastructure systems (networking appliances, firewalls, IDS/IPS, etc.) and end-user devices for vulnerabilities and configuration compliance.
  • Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Ability to communicate effectively; strong documentation and communication (written and verbal) skills.

Desired Skills 

  • Understanding of security principles for Industrial Control Systems (ICS).
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Education Requirement 

  • BS degree in CS, IT, or Engineering.

 

Years of Experience Requirement 

  • 5+ years experience conducting security assessments on federal applications and general support systems (GSSs) to ensure compliance with the NIST SP 800-53 Rev. 4, NIST 800-37 Rev.1, and agency-specific requirements.

 

Certification Requirement 

  • One of the Following: CISSP, CISA, CAP, GSNA.

 

Location 

  • Arlington, VA, Remote Available.

 

Security Clearance

  • Eligibility to obtain and maintain customer required security clearance.

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Junior Accoutant who will support the growth of the company by assisting with the prepration of accurate and timely financial statements. This is a unique opportunity to join a rapidly growing company while learning on the job and taking on additional financial reporting responsibilities.

Roles and Responsibilities

 

The Junior Accountant at ShorePoint will provide full lifecycle accounting support. Primary responsibilities will include:

  • Process Accounts Payable, including setting up new vendors, reviewing invoices for accuracy and entering into the Accounting system.
  • Process Accounts Receivable, including reviewing employee timecards, preparing invoices in accordance with contract requirements, and answering client questions.
  • Process Payroll, including employee changes and assistance.
  • Assist with monthly ledger reconciliation and required journal entries.
  • Assist in completing audits.

Required Skills

 

  • Attention to detail and organizational skills are paramount.
  • Ability to adapt to changing demands and deadlines in a fast-paced environment.
  • Be able to work both independently and as part of a team.
  • Skillful in the use of discretion to be a trustworthy steward of confidential information.

Desired Skills

  • Ability to take initiative to solve problems independently and creatively.
  • Negotiation and networking skills will be useful in this role.

Education Requirement

  • Accounting degree required

 

Years of Experience Requirement

  • 1 – 2

 

Certification Requirement

  • None required

 

Location

  • Herndon, VA

 

Security Clearance

  • None

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Network Engineer who has experience planning, implementing, and operating network services/systems, to include hardware and virtual environments in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Plans, implements, and operates network services/systems, to include hardware and virtual environments.
  • Integrate, Configure and optimize physical and virtual network hardware and software.
  • Perform Telecommunications Maintenance (Data, Voice, Images, including Wireless)
  • Develop and implement network backup and recovery procedures.
  • Integrate new systems into existing network architecture.
  • Monitor network capacity and performance.
  • Patch network vulnerabilities to ensure that information is safeguarded against outside parties.

 

Required Skills

  • Expert knowledge of routing, TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Expert knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • Expert knowledge of DMVPN, BGP, OSPF, and EIGRP.
  • Working knowledge of SD-WAN and NFV.
  • Working knowledge of the UNIX, Linux and Windows Operating System’s and familiarity with a variety of subsidiary support systems.
  • Working knowledge of Active Directory, Office 365, Azure and AWS cloud services.
  • Working knowledge of VMWare ESX and Redhat OS virtualization.
  • Experience with monitoring, data backups and recovery techniques, system utilization, and recovery testing.
  • Experience creating and maintaining network and system diagrams.
  • Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Must have the ability and desire to solve problems and work in a highly technical environment.
  • Must be detailed oriented and possess good technical writing skills.
  • Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously; coordinating resources and ensuring scheduled goals are met
  • Ability to make decisions and resolve problems effectively – Seek out information and data to evaluate, prioritize and formulate best solution or practice
  • Must be able to multi-task, work independently and as part of a team, share workloads,and deal with sudden shifts in project priorities

Desired Skills

  • Experience with design, implementation or maintenance of a Zero Trust architecture in a Federated enterprise environment
  • Experience operating and maintaining SD-WAN and/or NFV technologies

Education Requirement

  • BA/BS in Computer Science, Engineering or related technical IT field

Years of Experience Requirement

  • At least 10 years of directly related work experience

Certification Requirement

  • Relevant industry certification preferred

Location

  • Arlington, VA

Security Clearance

  • Eligibility to obtain and maintain customer required security clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking Compliance and Continuous Monitoring Engineers to: Provide Security Assessment & Authorization (A&A) and Information Assurance (IA) Support; Conduct Technical Security Assessments; Perform Enterprise Vulnerability Scanning & Reporting Functions; and Conduct Enterprise Vulnerability System Scanning. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

 

  •  Work closely with target organizations to ensure full comprehension of the standard security controls; conduct site visits as required
  •  Assist with security controls compliance assessments using established matrixes of tailored control and provide expert support in assessments of target organizations
  • Provide support to Vulnerability Management programs
  • Provide support to assessed organizations to ensure proper tracking of Plan of Action and Milestone (POA&M) items
  • Provide support and conduct annual reviews of the security controls (or some subset of the security controls) to ensure continued compliance as requested
  •  Assist with establishing footholds on endpoints within monitored organizations networks in order to provide day-to-day visibility into the security posture
  •  Provide expert support for the development and maintenance of develop of processes and best-practices for evaluating A&A data through a standard scorecard
  •  Utilize industry standard tools for automating the review of system configuration and security control compliance
  • Conduct periodic NIST controls assessments in support of network authorization and continuous monitoring
  • Provide detailed observations from controls assessments in the form of Security Assessment Report (SAR) and Risk Assessment Report (RAR) documents
  • Employ a scan-patch-scan methodology to ensure all systems identify and receive appropriate security patches
  • Conduct vulnerability scanning using industry standard tools (e.g. Tenable Nessus) on a weekly to bi-weekly basis
  • Report scan result data to appropriate system administrators to aid in the deployment of system updates and patches
  • Develop a mitigation plan detailing a prioritized timeline for patch deployment (e.g. 30-60-90-day patch deadlines based on each finding’s severity level)
  • Conduct false positive analysis and vulnerability analysis to determine the legitimacy of all detected vulnerabilities as well as prioritize their remediation
  • Configure the identified application to effectively ingest, process, and report vulnerability data collected during assessments as well as data provided from organizations’ self-assessments
  • Conduct long term trend analysis, identifying improvements or degradations in system security posture across the enterprise
  • Provide dashboard views of data roll-ups from all facets of assessed systems (e.g. risk, vulnerability data, POA&M status) in order to present high-level executive summary reports to government leadership

 

Required Skills

 

  • Must be able to perform Vulnerability and Compliance assessments on all devices identified during enterprise network scans, including: Operating systems, Oracle and MySQL Databases, and Web applications
  • Comfortable using enterprise-class network scanning tools such as: (Tenable Nessus, Tenable Security Center), database scanning tools (AppDetective and DbProtect) and Web scanning tools (Web Inspect), and should be knowledgeable about the security best practices and most common vulnerabilities that exist for each of these technologies, including SANS and OWASP Top 1
  • Experience performing enterprise-level assessment scanning of Networks, databases, and Web Applications
  • Comfortable configuring and performing host, ports and services discoveries on large enterprise networks, and identify target operating systems and applications/services based on discovery scan results
  • Experience with open source and commercial testing tools; A non-comprehensive list includes Nessus, NMAP, App Detective, Hailstorm, Guardium, and Web Inspect
  • Comfortable using, configuring, troubleshooting, and administering Tenable Security Center, Tenable Nessus (standalone), AppDetective, and Web Inspect
  • Solid understanding of the security policies used by intelligence organizations, as well as security guidelines published by the National Institute of Standards (e.g., 800-53 and 800-53a)
  • Ability to think critically and creatively. Capable of synthesizing and analyzing large amounts of scan data
  • Ability to articulate thoughts and findings in a concise and comprehensive manner

Certification Requirement

 

  • Must have one of the following certifications: ISC2, CISSP, GIAC, GCIA, or GCIH

 

Education Requirement

 

  • Bachelor’s degree or ten (10) years of IT experience

Location

 

  • Washington, D.C.

 Security Clearance

 

  • Top Secret with SCI eligibility and ability to pass a Counter-Intelligence (CI) polygraph

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Program Manager who has experience providing leadership to a team responsible for delivering Independent Verification and Validation (IV&V) support services for the review of Security Authorization Packages and other risk management documents in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

 

  • Provide leadership to a team responsible for delivering Independent Verification and Validation (IV&V) support services for the review of Security Authorization Packages and other risk management documents.
  • Accountable for day-today performance of contractor staff and deliverables including managing all operational activities.
  • Serve as a technical advisor for complex decisions and issues.
  • Provide deep subject matter expertise in applicable NIST reference documents and associated NIST processes such as the Risk Management Framework and NIST Security Engineering as applied in the U.S. Federal Government IT Environment.
  • Provide expertise in privacy and security requirements as applied in the U.S. Federal Government IT Environment.
  • Advise on technology innovations, security threats and other industry trends.

 

Required Skills

 

  • Demonstrable experience in implementation and delivery of services based on NIST 800 series publications.
  • Advanced proficiency in analytical, project planning, negotiations, interpersonal and communication skills (verbal and written).
  • Demonstrated expertise with implementing processes to improve Security IT operational availability in U.S. Federal Government enterprise IT environment.
  • Experience promoting the use of automation for near real-time risk management and ongoing system and control authorization through the implementation of continuous monitoring processes
  • Experience developing metrics to provide senior leaders and managers with the necessary information to make cost-effective, risk-based decisions for information systems supporting their missions and business functions
  • Experience with the integration of security and privacy requirements and controls into enterprise architecture, SDLC, acquisition processes, and systems engineering processes
  • Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously; coordinating resources and ensuring scheduled goals are met
  • Ability to make decisions and resolve problems effectively – Seek out information and data to evaluate, prioritize and formulate best solution or practice
  • Must be able to multi-task, work independently and as part of a team, share workloads,and deal with sudden shifts in project priorities

Desired Skills

 

  • Specific experience developing and executing against an IV&V methodology in a Federal enterprise environment

 

Education Requirement

 

  • BA/BS in Computer Science, Engineering or related technical IT field

 

Years of Experience Requirement

 

  • At least ten (10) years of experience providing Security Services Support in the U.S. Federal Government.
  • At least four (4) years of experience supervising projects or project teams in a U.S. Federal Government contract delivery environment.

 

Certification Requirement

 

  • ITIL v3, foundation certification
  • Preferred – ISC2 Certified Information Systems Security Professional (CISSP)
  • Preferred – Global Information Assurance Certification (GIAC)

 

Location

 

  • Arlington, VA (Remote)

 

Security Clearance

 

  • Eligibility to obtain and maintain customer required security clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking Information System Security Officer’s (ISSO) who has experience working with both Agile and Waterfall System Development Lifecycles (SDLC’s) and integrating RMF process into a Federal Information System. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

 

Responsible for supporting Senior Information System Security Officers (ISSOs) with the following:

 

  • Developing and maintaining System Security Plans (SSP).
  • Implementing and managing NIST 800-53 Rev. 5 or later Security Controls.
  • Supporting the SA&A process.
  • Supporting Continuous Monitoring activities.
  • Managing POA&Ms and developing remediation strategies.
  • Aligning systems activities to the NIST Cyber Security Framework (CSF).
  • Supporting the incident response process.
  • Identifying and supporting system Interconnection Security requirements.
  • Supporting audit logging review and remediation activities.
  • Providing OMB FISMA data.
  • Developing and documenting incident reporting procedures for service desk, admins, and security staff for incidents.

 

Required Skills

Must have a good understanding of SDLC and RMF Process including:

 

  • Experience advising government program managers on security testing methodologies and processes
  • Experience performing system analysis, system audits, system monitoring, security control assessment/testing, risk management, incident response
  • Experience evaluating certification documentation and providing written recommendations for accreditation to government PMs
  • Experience reviewing system security to accommodate changes to policy or technology
  • Evaluation of IT threats and vulnerabilities to determine whether additional safeguards are needed
  • Experience advising the government concerning the impact levels for Confidentiality,
  • Integrity, and Availability for the information on a system
  • Experience conducting certification tests that include verification that the features and assurances required for each protection level are in place
  • Experience with conducting and coordinating IS security inspections, tests, and reviews
  • Experience assessing changes in the system, its environment, and operational needs that could affect the accreditation
  • Experience preparing the final SAR containing the results and findings from the assessment
  • Experience with Initiating a POA&M with identified weaknesses and suspense dates for each IS based on findings and recommendations from the SAR
  • Experience performing risk assessments and making recommendations to customers

Certification Requirement

  • At least one of the following computer security certifications : CISSP, CCSP, CISM, GSLC, CISA, CASP, or equivalent

Education Requirement

  • Preferred Education : Bachelors of Science degree preferably in Information Systems, Computer Engineering, Computer Science, or Cyber Security, or equivalent experience

 

Years of Experience Requirement

  • 5- 7 years of experience

 

Location

  • Washington, D.C (Remote available)

 

Security Clearance

  • Active Secret clearance is required

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Threat Detection Engineer/Content Developer who has experience searching for threats, inspecting network traffic, investigating and analyzing logs along with developing custom Splunk content in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Capture use cases from subscribers or other team members and develop correlation rules
  • Utilize knowledge of latest threats and attack vectors to develop Splunk correlation rules for continuous monitoring
  • Develop, manage, and maintain Splunk data models
  • Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
  • Develop custom regex to create custom knowledge objects
  • Developing custom SPL using macros, lookups, etc., and network security signatures such as SNORT and YARA
  • Develop custom dashboards and reports for customer stakeholders
  • Train and mentor junior staff

 

Required Skills

  • Extensive experience working with various security methodologies and processes
  • Advanced knowledge of TCP/IP protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices
  • Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Web-filtering, Advanced Threat Protection
  • Experience developing advanced correlation rules utilizing tstats and data models for cyber threat detection
  • Experienced with creating and maintaining Splunk knowledge objects
  • Experienced managing and maintaining Splunk data models
  • Experience creating regex for pattern matching
  • Experience implementing security methodologies and SOC processes

Desired Skills

  • Experience with cloud (e.g. o365, Azure, AWS, etc) security monitoring and familiar with cloud threat landscape
  • Completed Splunk Advance Searching and Reporting training
  • Experience developing custom scripts using python
  • Splunk certifications

 

Education Requirement

  • Bachelor’s Degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field

 

Years of Experience Requirement

  • 12 years of experience in incident detection and response, malware analysis, or cyber forensics

 

Location

  • Arlington, VA

 

Security Clearance

  • Ability to obtain an Entry on Duty (EOD) clearance to support this program

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Splunk Engineer Subject Matter Expert who has experience installing and maintaining Splunk infrastructure in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Conceptualize, design, build, and maintain current and future customer-supported tools and platforms
  • Manage multiple assignments, changing priorities, and work independently with little oversight
  • Lead team of Splunk engineers in the management of Splunk solution to optimize data availability for SOC and other stakeholders.
  • Develop data storage, access, and retention strategies for a large IT enterprise using industry standards and best practices to advise Customer executive-level stakeholders
  • Design, build, implement, and administer Splunk infrastructure in on-prem and cloud environments.
  • Create, manage, and support automation solutions for Splunk deployment and orchestration in on-prem and cloud environments
  • Work with existing and custom Splunk applications and add-ons to fulfill customer needs
  • Provide overall engineering and design support for a distributed Splunk environment consisting of heavy forwarders, indexers, and search head servers, spanning security, performance, and operational roles
  • Onboard data to Splunk via forwarder, scripted inputs, TCP/UDP, and modular inputs from various sources
  • Normalize data to ensure CIM compliance, and develop data models to accelerate queries, dashboards, and correlation searches
  • Work closely with all relevant stakeholders to solve technical problems at the network, system, and application levels
  • Conduct periodic architectural reviews of Splunk and related systems to assess effectiveness and propose optimal installation alternatives as required
  • Develop and manage comprehensive documentation, artifacts, procedures, and processes for the optimal management of the Splunk infrastructure

 

Required Skills

  • Excellent written and oral skills, ability to work closely with multiple customers, manage expectations, and track engagement scope
  • Experience implementing FISMA, NIST, NSA, and other information security, cybersecurity and CDM-related industry policies, procedures, guidelines, standards, and best practices
  • Expert-level knowledge and ability with Splunk Enterprise Security or integration with other Security Information and Event Management (SIEM) platforms
  • Extensive experience with advanced configuration of Splunk including Indexer Clustering and Search Head Clustering
  • Proficient at data on-boarding activities including routing, parsing, and normalizing events to the Splunk Common Information Model (CIM)
  • Proficiency onboarding data using Splunk-developed add-ons for Windows, Linux, and common third-party devices and applications
  • Experience onboarding data into Splunk via forwarder, scripted inputs, TCP/UDP, and modular inputs from a variety of sources
  • Proficiency managing Splunk using the Splunk command-line interface
  • Proficiency managing Splunk using configuration files
  • Experience collaborating with separate engineering teams to configure data sources for Splunk integration
  • Intermediate understanding of SQL and common SQL dialects
  • Proficiency implementing and onboarding data in Splunk DB Connect
  • Experience with Splunk performing systems administration, including performing installation, configuration, monitoring system performance and availability, upgrades, and troubleshooting
  • General networking and security troubleshooting (firewalls, routing, NAT, etc.)
  • Splunk architecture/design, implementation, and troubleshooting experience
  • Experience in managing, maintaining, and administering multi-site indexer cluster
  • Proficiency developing log ingestion and aggregation strategies per Splunk best practices
  • Perform integration activities to configure, connect, and pull data with 3rd party software APIs
  • Experience implementing and optimizing Splunk data models
  • Proficient in regular expressions
  • Scripting and development skills (Bash, Python, or PowerShell)
  • Ability to autonomously prioritize and successfully deliver across a portfolio of projects

Desired Skills

  • Experience working among different Cloud Provider environments (Azure, AWS, GCP), particularly for a federal government customer
  • Experience with GitLab or GitHub or other version-control system
  • Experience with Ansible tower and/or writing Ansible playbooks
  • Four (4) years of experience with distributed systems development using REST APIs
  • Four (4) years of experience with database development using ODBC, JDBC, or other database APIs

 

Education Requirement

  • Master’s degree in Computer Science, Engineering, or a related field and a minimum of fifteen (15) years of experience in system administration, database administration, network engineering, software engineering, or software development, with a concentration in Cybersecurity

 

 

Years of Experience Requirement

  • Fifteen (15) years of experience with Linux and Windows system administration or an expert understanding of operating systems and common operating environments
  • Ten (10) years of experience with Splunk in distributed deployments

 

Certification Requirement

At least one of the following certifications:

 

  • CompTIA: CASP
  • SANS:  GCIH, GCWN, GISF, GISP, GSSP, GICSP, GSSP
  • Carnegie Mellon:  SEI
  • ISC2:  CCSP, CISSP, CSSLP, SSCP
  • Cisco:  CCNP, CCNP Security, CCIE Security
  • EC_Council:  CEH, ECSP
  • Microsoft:  MCSE (Server), Azure Administrator Associate, Cybersecurity Architect Expert, Azure Solutions Architect Expert
  • Red Hat:  RHCA, RHCE
  • VMware:  VCA, VCP, VCAP, VCIX, VCDX
  • NetApps:  CIS, CIES, CDAP, CSA
  • Splunk:  Enterprise Certified Architect

 

Location

  • Arlington, VA

 

Security Clearance

  • Ability to obtain an Entry on Duty (EOD) clearance to support this program

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking Blue Team Engineers with experience utilizing offensive tools and techniques to conduct exercises for a government agency that mimic both insider and external threats to operational systems and networks. Activities include but are not limited to network discovery threat detection, forensic support and reporting. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Conduct automated and manual test of information systems using industry best tools, to include vulnerability scans, source code review and web application testing
  • Develop test plans, perform tests and prepare after-action reports for information systems
  • Document tests in accordance with agency regulations and SOPs
  • Contribute to A&A, POA&M vulnerability management, and continuous monitoring efforts by providing trend analysis and briefings
  • Utilize signature-based scanners, data collection tools, and hardware analysis tools to determine the footprint and impact of potential events
  • Conduct SIEM reviews to ensure proper detection and notification of threat events
  • Support vulnerability analysis and mitigation strategies to prevent additional occurrences of threat events

 

Required Skills

  • The candidate should be comfortable researching and understanding a wide variety of information systems and emerging technologies
  • Have a broad knowledge of security methodologies, solutions and best practices
  • Have experience with multiple open source and commercial testing tools; a non-comprehensive list includes Nessus, App Detective, Metasploit, Burp Suite, and nmap
  • Advanced understanding of the strengths and weaknesses of security tools with the ability to select the right tool for the job; ability to configure and troubleshoot tools if necessary
  • Be comfortable using, configuring, troubleshooting, and administrate both Unix/Linux and Microsoft operating systems; extensive systems engineering experience with at least one of these OSs
  • Solid understand of the security policies of Department of Justice and FBI, as well as security guidelines published by the National Institute of Standards (e.g., 800-53 and 800-53a)
  • Have the ability to think critically and creatively; capable of synthesizing and analyzing large amounts of data related to complex systems; ability to articulate thoughts and findings in a concise and comprehensive manner

The ideal candidate must have an expert understanding of at least one of the following technologies and their security vulnerabilities:

  • Web applications and technologies. Advanced understanding of application programming languages, application servers, Web services, and Web browsers. Candidate should also understand the vulnerabilities related to these technologies, as well as security best practices when using them. Candidate should also be able to use automated assessment tools and manual testing techniques to assess these applications. Familiarity with OWASP testing methodology is also required.
  • Networking technologies. Advanced proficiency with various networking skills and technologies, including (but not limited to) Cisco hardware and IOS, firewalls, IDS and IPSs, packet analysis, and high level network architecture fundamentals.
  • Enterprise solutions, storage and databases. Advanced understanding of relational databases, database management systems, enterprise storage solutions, and security concerns specific to these technologies.
  • Cross domain solutions and trusted operating systems. Advanced experience with a range of Cross Domain Solutions, or CDSs, and advanced understanding of the unique security requirements of CDSs and trusted OSs such as trusted Solaris v8, Solaris v10 with trusted extensions and Security Enhanced Linux.
  • Virtualization technologies. Advanced experience with VMware products, Microsoft virtualization technologies and/or similar technologies.
  • Mainframes. Advanced hardware, OSs, networking, and security best practices

Certification Requirement

  • Must have one of the following certifications: CISSP, ISACA, OSCP, CISA, GPEN or GWAPT, C|EH

Education Requirement

  • Bachelor’s degree or ten (10) years of IT experience

 Location

  • Washington, D.C.

 

Security Clearance

  • Top Secret with SCI eligibility and ability to pass a Counter-Intelligence (CI) polygraph

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Elastic SIEM Cyber Engineer who has experience managing an Elastic Cloud Enterprise & Elasticsearch platform in the federal market. You will be focused on the day-to-day operations and improvement of the ECE cluster utilized as the SIEM function. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Elastic SIEM solution development, integration, platform architecture, and capacity planning in mission-critical environments
  • Deploying additional Elastic clusters using infrastructure as code (Ansible playbooks)
  • Maintain, secure, and upgrade ECE deployments
  • Integrate log and sensor data into ELK
  • Data modeling, query development and optimization, cluster tuning and scaling with a focus on fast search and analytics at scale
  • Streamline cybersecurity tactics, techniques and procedures
  • Create dashboards and reports in ELK
  • Leverage data analytics can machine learning algorithms for cyber operations
  • Provide adoption awareness and training for the ELK SIEM
  • Working with a multi-tenant platform and working with tenants to understand requirements
  • Providing subject matter expertise to assist the rest of the team in their roles

 

Required Skills

  • 4+ years of experience with IT with a focus in Linux sysadmin, databases, containers or cyber operations
  • 3+ years of experience with hands on operations of sizing, monitoring, and management, and open-source tools, including Kafka, Logstash, Beats, Elasticsearch, Kibana and Splunk
  • Knowledge of planning and executing data retention and life cycle management plans
  • Hands-on experience administrating Elasticsearch clusters (10+ Data nodes)
  • Knowledge of information retrieval and/or analytics domain
  • Experience with load balancing, DNS, TLS certificate generation and SAML integration.
  • Experience working with data solutions in a public sector
  • Excel at working directly with customers to gather, prioritize, plan and execute solutions to customer business requirements as it relates to our technologies
  • Familiar with SOC operations, open-source security frameworks, and Linux

Location

  • Alexandria, VA

Security Clearance

  • Must have an active Secret Clearance

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Engineering Assessor who has experience providing Technical Assessments thoroughtout the System Development Lifecycle (SDLC)/ System Engineering Lifecycle (SELC) to ensure a healthy security posture and effective compliance with federal requirements in the federal market. This is a unique opportunity to be involved with a broad range of technologies and to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

  • Assess the security posture of new and emerging technology that is implemented or before being implemented to identify all risks and the security posture of Enterprise IT organization systems
  • Define and enforce policies and guidelines as outlined within NIST SP 800-53, DHS 4300A, DHS 4300B Sensitive Systems Policy
  • Research and provide guidance in the implementation of system specific features and security controls to ensure effective compliance with federal requirements
  • Provide IT security consultation and recommendations to system stakeholders to promote a strong security posture for systems
  • Conduct security assessments throughout the System Development Lifecycle (SDLC)/ System Engineering Lifecycle (SELC) through research, security documentation reviewes, and communication with system stakeholders

 

Desired Skills

  • Strong understanding of the SDLC/ SELC lifecycles and the system security requirements required through each phase and at each gate
  • Expert knowledge of the NIST SP800-60 Risk Management Framework (RMF)
  • Expertise in security engineering and experience with conducting technical risk assessments for large and complex information systems that include a broad range of technologies
  • Proficiency in the application of NIST security controls guidance to Enterprise IT systems and applications
  • Strong technical understanding of IT system, services and application architectures including cloud
  • Excellent spoken and written communication skills, including the ability to speak clearly and distinctly, and to accurately summarize and describe information with correct, precise terminology
  • Ability to work cohesively with a team that includes Enterprise Architects, Security Analysists, and other Security Engineers

Education Requirement

  • Bachelors degree in related field

Years of Experience Requirement

  • 5+ years designing and implementing network, systems, and security solutions

Certification Requirement

  • Technical Certification (one or more of the following), CISSP, CCNP, MCSE

Location

  • Fairfax, VA

Security Clearance

  • Must be a U.S. Citizen

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Baseline Engineer who has experience building security baseline configuration guidelines for various technologies within the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

Develop and implement security solutions in alignment with security strategy. Maintain an awareness of market and technology trends to bring best of breed solutions to the client. Apply leading-edge principles, theories, and concepts and contribute to the development of new principles and concepts. Work on unusually complex problems and provide highly innovative solutions. Work closely with government stakeholders in understanding the vision and direction of the information technology program and decompose this architecture and associated use cases into discrete components that can be addressed from a cybersecurity engineering standpoint. Understand proposed and in-place architectures at a level that enables the identification and understanding of possible security risks and propose solutions for risk mitigation.

 

Required Skills

  • Experience with creating, reviewing and customizing general security configuration baselines including DoD, STIGs, and CIS Benchmarks
  • Experience with translating the low-level security baseline requirements into high-level FISMA and NIST requirements and client-specific security policies
  • Experience working with the NIST 800 Special Publication series guidance related to risk management and security control implementation, including 800-30,800-37, 800-53, 800-60, 800-63, 800-115, or 800-137
  • Experience with one or more of the following technologies: Networking, including CISCO, Juniper, or Palo Alto, operating systems, including Windows Server, Redhat, or Linux, cloud services, including AWS, Azure, Salesforce, Okta, O365, or ServiceNow, or Mobile Technologies, including iOS or Xen Mobile
  • Knowledge of the National Vulnerability Database (NVD) and Common Vulnerability Enumeration (CVE)

Desired Skills

  • Experience with designing, building, and implementing automation tools, including Ansible, Chef, or Puppet
  • Experience with Infrastructure as Code tools, including Cloud Formations or Terraform
  • Experience with container platforms, including OpenShift
  • Experience with chaos engineering and blue or green deployments
  • Experience with Serverless, including Lambda, API Gateway, Step Functions, and SAM
  • Experience with application performance analysis and monitoring, including ELK
  • Experience with an Agile release methodology

Education Requirement

  • BA or BS degree in Information Security, Computer Engineering, Information Systems, Telecommunications, or Technology

Years of Experience Requirement

  • A minimum of five (5) to eight (8) years of relevant work experience in the area of network security engineering or security operations, including hands-on experience with security tools and devices such as Apcon, A10 load balancers, FireEye

Certification Requirement

  • Maintain at least one current professional certification. Acceptable certifications include: Any SANS GIAC Security certifications (Administration, Software, Forensics, or GSE Expert), ISC2 CISSP, or any security systems vendor administration-level certifications. AWS Certified Solutions Architect or Developer Certification. CCNA, MSCE, RHCSA, EBSA or ECSS Certification

Location

  • Washington, DC

Security Clearance

  •  Must be a U.S. Citizen

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a DevOps Engineer who has experience developing and managing the automated build system, automated deployment system, continuous integration environment, and continuous test environment for a suite of open source/COTS product configurations and custom code in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 Roles and Responsibilities

  • Work closely with Configuration Management Analysts and the Release Train Engineer to automate build/test/deploy processes from Dev->Test->Staging
  • Deploying, integrating, and managing source control (Git/GitHub), continuous build/delivery (Jenkins), software quality tools (SonarQube), artifact hosting (Nexus), issue management (Jira), documentation/ collaboration (Confluence), automated testing (Selenium), and deployment of solutions (Open Source Java solutions and COTs configuration files)

 Required Skills

  • Expertise automating build/test/deploy processes
  • Expertise in scripting deployments using bash scripting or similar
  • Expertise with identification of controlled artifacts (configuration items) and implementation of standard CM control processes
  • Experience with configuration management tools and technologies
  • Expertise integrating Content Management systems and/or Wikis with SCM (for example JIRA integration with Confluence)
  • Experience in system architecture and engineering disciplines
  • Efficiently manage AWS resources to control costs
  • Experience with he cyber security domain to include: governance and risk management, compliance, business continuity and disaster recovery, encryption, software development security, access control, network security / secure architecture, and security operation
  • Excellent problem-solving ability and strong work ethic that is proactive and self-motivated
  • Experience in product release planning and associated deliverable tracking

 Desired Skills

  • Git or similar distributed repository technology preferred
  • Experience integrating with an Active Directory
  • Familiarity with DoD STIGs, SRGs, etc

 Education and Years of Experience Requirement

  • Bachelor’s (IT or relevant STEM degree) with 5 – 7 yrs of experience, or a Masters and 3 to 5 yrs of experience

 Certification Requirement

  • Relevant AWS Certification(s)
  • SAFe DevOps Certification

 Location

  •   Fairfax, VA

Security Clearance

  • Must be clearable to DHS EOD

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking Cybersecurity Engineers who have strong familiarity providing Cybersecurity assessment services utilizing a multitude of cyber tools, proven methodologies and industry best practices in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market. This position provides the opportunity to travel to client sites both locally and nationally.

 

Roles and Responsibilities

As part of the Cyber Assessments team, provide cybersecurity scanning and testing services, threat intelligence integration to provide cybersecurity customers with findings and information that informs the risk management and decision-making processes.

 

Required Skills 

  • Knowledge of host identification and exploitation of vulnerabilities
  • Knowledge of phishing procedures
  • Knowledge of script writing and crafting of payloads
  • Knowledge of database operations and system/network administration
  • In-depth knowledge and understanding of operation of assessment tools (including but not limited to Metasploit, Nmap, Burp Suite, Powersploit, and Cobalt Strike)
  • Ability to operate in a critical fashion in dynamic environments
  • Knowledge of FISMA and NIST 800 series standards
  • In-depth knowledge of network mapping, vulnerability scanning, penetration testing, and Web Application testing
  • In-depth knowledge of the procedures of Phishing Assessments, Wireless
  • Assessments, Operating System Security Assessments, and Database Assessments
  • Coordinates assessment equipment, including ensuring images on assessment equipment are up to date, equipment transport, setup and tear-down of equipment on-site, and general maintenance
  • Operates assessment tools, under the direction of the Government, the IT
  • Security Expert Level II, and NCATS Assessment Standard Operating Procedures
  • Assists the IT Security Expert Level II with development of documentation and reporting for coordination of Assessment report in accordance with the appropriate report template at the direction of the Government

Education Requirement

  • Bachelor’s Degree in related field

Years of Experience Requirement 

  • Minimum of 2 years operational experience

Certification Requirement

  • At least one of the following: OSCP, OSCE, GPEN, GXPN, or equivalent

Location 

  • Arlington, VA

Security Clearance

  • All personnel must have at least a PUBLIC TRUST clearance and pass a DHS background check

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Tenable Security Engineer who has experience operating and maintaining Tenable security suite for purposes of managing security configuration settings against defined security hardening guidance and on compliance status in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Required skills

  • Experience with maintaining, optimizing, and troubleshooting the Tenable solution currently deployed in a UNIX environment, including Tenable.sc, Tenable.io, NNM, LCE, Nessus Manager, Agents, and Scanner
  • Experience with deploying, configuring, and maintaining Nessus agents in an enterprise environment, including the application of best practices for schedules and integration with Tenable.sc
  • Experience with supporting upgrades of Tenable.sc, Nessus Manager, Nessus scanners, LCE, and PVS
  • Experience with performing security compliance and vulnerability assessments specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS
  • Experience with configuring authentication methods, including PIV, SAML and LDAP, and development of role-based access controls (RBAC)
  • Experience with performing enterprise-wide networking scanning, agent scan, container, including credential scan of UNIX, Windows, Network devices, and VMware
  • Ability to provide design and architectural guidance for tool capabilities during technical stakeholder meetings
  • Ability to prepare and maintain solution documentation, including security, configuration, and CONOPS

Desired skills 

  • Experience with using Tenable APIs, integrating tenable products and automating daily activities
  • Experience with creating dynamic asset, dashboards, and reports
  • Experience with administering Windows and UNIX in an enterprise environment
  • Experience with using security tools and technologies, including Domain Naming Service (DNS), Active Directory (AD), Windows PowerShell, Windows credential stores, Microsoft Certificate Authority, Python, REST, JSON, SOAP, Shell Scripting, TCP stack, and Wireshark

Education Requirement 

  • BA or BS Degree

Certification Requirement

  • SANS GIAC or CISSP Certification (Preferred)

Location

  • Washington, D.C

Security Clearance

  • Must be a U.S. Citizen and have the ability to obtain a security clearance

Applicants have rights under Federal Employment Laws. For more information please see:

Family and Medical Leave Act (FMLA) Poster

Equal Employment Opportunity (EEO) Poster

Employee Polygraph Protection Act (EPPA) Poster