Cyber Resilience for
Complex Ecosystems

Menu Close
  1. Home
  2. »
  3. Careers
  4. »
  5. Current Openings

Current Openings

Purpose-Driven Careers

For the cyber elite

ShorePoint team members are handpicked for their expertise and for their ability to collaborate, communicate and adapt when our Federal customers face complex and evolving challenges, obstacles and threats.

#JoinTeamShorePoint! Explore our current openings and apply to begin your journey with us.

Open Positions

Elasticsearch Engineer

Who we are:

ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion, and a focus on giving back to our community.

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are looking for a Elasticsearch (Elastic/ELK/ECE) Engineer to join our dynamic, fast-paced team within the public sector. The ideal candidate will not only bring technical expertise but also a passion for learning and growth. The Elasticsearch (Elastic/ELK/ECE) Engineer will have exposure to all facets of Systems Engineering and be encouraged to continuously expand your skill set as the company evolves. This is a unique opportunity to play a key role in a fast-growing company at the forefront of the cybersecurity market.

What you’ll be doing:

  • Collaborate with the Integration and Architecture teams to design, document, build, secure, and maintain Elasticsearch, Logstash, Kibana (and X-Pack) enterprise solutions in both cloud and on-premises environments.
  • Work closely with architects, engineers, and integrators to assess customer requirements and design Elasticsearch Stack solutions that meet data compliance and performance needs.
  • Follow the development lifecycle processes to transition solutions from Dev to Test to Production environments.
  • Participate in Agile sprint meetings, share progress, and ensure that the development aligns with project and customer requirements.
  • Serve as a subject matter expert and trusted advisor, providing guidance and best practice recommendations for Elasticsearch deployments.
  • Configure and maintain Linux-based operating systems (including updates and version upgrades) to support the Elasticsearch platform.
  • Install, configure, and manage Elastic Cloud Enterprise (ECE) solutions, ensuring seamless communication and integration among Elasticsearch components and data sources.
  • Create detailed installation and configuration documentation to support deployment.
  • Secure the solution by implementing TLS, certificates, SSO/PIV authentication, and encryption technologies.
  • Collaborate with the data lifecycle management team to ensure optimal data flow and integrity.
  • Troubleshoot and monitor data flows and the overall health of the Elasticsearch solution to maximize performance and minimize downtime.
  • Provide regular status updates and analysis of alternatives in daily sprint meetings.
  • Build and maintain effective working relationships across departments and teams to coordinate work and deliver results on schedule.

What you need to know:

  • Experience in software development using Java with an IDE (e.g., Eclipse, CodeReady).
  • Proficiency in parsing file formats (e.g., JSON, XML, CSV).
  • Knowledge of SQL Server database design, programming, tuning, and writing SQL queries/procedures.
  • Experience in developing/automating test procedures.
  • Familiarity with REST API web services client development.
  • Experience with release management, build tools (e.g., Maven, Jenkins), and configuration tools (e.g., SVN).
  • Understanding of secure coding practices, including encryption (e.g., certificates, TLS connections).

Must have’s:  

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field or relevant experience in lieu of degree.
  • 2+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must be a U.S. citizen (non-dual citizenship) and eligible to obtain and maintain a security clearance, in compliance with federal contract requirements.

Beneficial to have:  

  • Experience with SAML authentication, familiarity with domain structures, user authentication, and PKI.
  • Experience with Messaging Queues (e.g., RabbitMQ).
  • Experience with Microsoft SQL.
  • Experience with programming and working with regular expressions (XML, Java, JSON, Python, PowerShell, painless, grok).
  • Relevant security certifications a plus: CISSP, CISM, CISA, Security+, CEH.
  • Understanding of interrelationships between critical infrastructure protection and cybersecurity.
  • Knowledge and experience with Assessment & Authorization (A&A) processes in Federal environments, preferably with experience utilizing the NIST Risk Management Framework (RMF).

Where it’s done:

  • Remote (Herndon, VA).

Security Operations Lead (Top Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Security Operations Lead with hands-on experience in information systems security, including disaster recovery, software development and infrastructure protection. This role is responsible for overseeing and implementing security strategies, analyzing vulnerabilities and leading efforts to protect critical data assets. The Security Operations Lead will apply sound judgment, broad technical expertise and creative problem-solving to support enterprise-wide initiatives in a mission-focused environment. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Develop and manage enterprise information systems security programs, including disaster recovery, database protection and secure software development.
  • Analyze security systems and applications to identify vulnerabilities and develop and recommend mitigation strategies.
  • Implement security measures to safeguard against unauthorized data modification, loss, or breaches.
  • Lead the integration of secure software development practices into operations.
  • Support incident response efforts and provide guidance during investigations.
  • Maintain documentation, security controls and compliance procedures across systems.
  • Perform a wide range of technically complex tasks across various domains of cybersecurity.
  • Plan and execute security projects using a combination of established practices and creative approaches.
  • Provide technical direction and mentorship to junior security staff or team members.
  • Collaborate with leadership and typically report to a project leader or manager.

What you need to know:

  • Familiarity with a wide range of security concepts, frameworks and operational procedures.
  • Broad knowledge of IT security operations, software development practices and disaster recovery planning.
  • Ability to apply professional judgment and experience to solve complex technical challenges.
  • Strong problem-solving, decision-making and project planning skills in dynamic environments.
  • Demonstrated creativity and flexibility in executing security strategies.
  • Effective communication and interpersonal skills for cross-functional collaboration.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • Minimum of 6-8 years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Experience developing and managing information systems security programs.
  • Proven ability to analyze systems and applications and develop protective measures.
  • Experience implementing secure software development and protecting enterprise assets.
  • Comfortable performing complex technical tasks across cybersecurity functions.
  • Ability to lead and direct the work of others, including technical staff and analysts.
  • Applicants must currently hold and maintain an active Top Secret clearance.

Beneficial to have:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Fairmont, WV or Boulder, CO).

Tier 1/2 SOC Analysts (Top Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking Tier 1/2 SOC Analysts with a foundational understanding of cybersecurity operations and threat monitoring. This role supports the identification, escalation and response to security incidents while maintaining critical data protection procedures. The Tier 1/2 SOC Analysts will play a key role in the early stages of the security incident lifecycle, supporting continuous monitoring and defense in a mission-driven environment. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Monitor, evaluate and maintain systems and procedures to protect data systems and databases from unauthorized access.
  • Identify and escalate potential threats based on system alerts, user reports or suspicious activity.
  • Respond to reported security violations in accordance with operational protocols.
  • Determine the root cause of detected or reported security breaches.
  • Research and recommend updates to procedures to prevent recurring security violations.
  • Assist in educating users on security policies, procedures and best practices.
  • Document incidents, findings and actions in security tracking systems.
  • Support higher-tier analysts in investigation, containment and remediation tasks.

What you need to know:

  • Basic understanding of network security, intrusion detection and threat monitoring.
  • Familiarity with security tools such as SIEM, endpoint protection, or log analysis platforms.
  • Ability to follow standard operating procedures and escalation protocols.
  • Strong attention to detail and accuracy in documenting findings.
  • Clear communication skills and the ability to collaborate within a team environment.
  • Willingness to learn and grow within a structured SOC setting.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • Minimum of 2-4 years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Proven ability to monitor and evaluate system activity and identify potential threats.
  • Experience responding to security violations and assisting with procedural improvements.
  • Ability to determine root causes of security issues and recommend preventative actions.
  • Applicants must currently hold and maintain an active Top Secret clearance.

Beneficial to have:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Fairmont, WV).

Tier 3 Cyber Threat/Intel Analyst (Top Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion, and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Tier 3 Cyber Threat/Intel Analyst with deep expertise in identifying, analyzing, and responding to advanced cyber threats. This role plays a critical part in protecting data systems and digital assets by evaluating threat intelligence, investigating incidents, and recommending proactive defense measures. The Tier 3 Cyber Threat/Intel Analyst will work across teams to strengthen incident response and threat detection capabilities in support of mission-critical environments. This is a unique opportunity to shape the growth, development, and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Monitor, evaluate, and maintain systems and procedures to protect data systems and databases from unauthorized access.
  • Identify potential threats and respond to reported security violations.
  • Determine the causes of security breaches through analysis and investigation.
  • Research and recommend updates to security procedures to prevent future incidents.
  • Assist in educating users on security policies, best practices, and incident response processes.
  • Support internal efforts to improve operational security posture through documentation and procedural updates.

What you need to know:

  • Understanding of information security concepts, including data protection, access controls, and threat response.
  • Familiarity with basic incident response workflows and security monitoring practices.
  • Ability to interpret technical findings and communicate them clearly to relevant stakeholders.
  • Analytical mindset with attention to detail and the ability to detect and assess suspicious activity.
  • Effective written and verbal communication skills.
  • Comfortable working independently and collaboratively in a team environment.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • Minimum of 5–7 years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Demonstrated ability to monitor systems and respond to reported security violations.
  • Experience researching and implementing procedural updates to improve security.
  • Ability to identify root causes of security breaches and recommend mitigation steps.
  • Applicants must currently hold and maintain an active Top Secret clearance.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Fairmont, WV).

Cloud Security Engineer (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Cloud Security Engineer for a potential opportunity with deep cybersecurity expertise and automation capabilities to strengthen the security posture across Azure, VMware VCF and on-premise infrastructure. This role supports Zero Trust and DevSecOps initiatives, enforces compliance and streamlines operations through secure architecture design, automation and advanced threat detection. The Cloud Security Engineer will play a critical role in securing cloud environments, supporting authorization efforts and integrating security throughout the development lifecycle. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Serve as subject matter expert (SME) for cloud security incidents, coordinating with Cyber Operations and Security Control Assessor teams.
  • Integrate security scanning tools into CI/CD pipelines (e.g., Gitlab, SonarQube, Trivy).
  • Support and enhance Zero Trust architecture implementations, including Conditional Access, Privileged Identity Management (PIM) and Identity Governance.
  • Perform cloud compliance checks aligned with DoD and FedRAMP baselines (NIST 800-53, RMF).
  • Monitor and manage cloud-native SIEM tools (e.g., Azure Sentinel, SPLUNK) and log analytics for threat detection and operational insights.
  • Automate security and operational tasks through scripting and platform-native automation tools (e.g., Logic Apps, PowerShell, Python).
  • Contribute to risk assessments, Authorization to Operate (ATO) documentation and policy enforcement strategies.
  • Assist with token management, certificate renewal automation and credential lifecycle tasks.
  • Support performance monitoring, system patching and endpoint protection across the cloud landscape.

What you need to know:

  • Strong understanding of secure cloud architecture, Zero Trust principles and identity governance.
  • Proficiency in integrating security tools into CI/CD pipelines and automating security workflows.
  • Hands-on experience with cloud-native SIEM platforms and log analytics.
  • Ability to support ATO documentation, compliance activities and enforcement of security policies.
  • Skilled in scripting for security automation using platform-native tools and languages.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • 5+ years of experience in:
    • Cybersecurity Expertise and Automation.
    • Designing and implementing automated operations across IL2/IL3 / IL4 environments using tools like Azure Policy, VMWARE Auria and Gitlab.
    • Experience in Microsoft Azure, including security and identity management.
    • Develop and manage Infrastructure as Code (IaC) for repeatable, secure cloud deployments using Terraform, Bicep or ARM templates.
    • Proficient with IaC tools (Terraform, Bicep) and automation scripting (PowerShell, Python).
    • DoD cybersecurity frameworks (RMF, NIST 800-53, STIGs).
    • Experience with CI/CD pipelines, Gitlab and security integration.
    • Strong understanding of networking, firewalls and role-based access control (RBAC).
    • Analyzing logs and security alerts and develop proactive countermeasures.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • Master’s degree in Cybersecurity, Information Systems or a related technical discipline.
  • Experience with cloud security architectures in AWS and Azure.
  • Proficiency with containerization and orchestration technologies such as Docker and Kubernetes.
  • Knowledge of DevSecOps best practices.

Where it’s done:

  • Onsite (Washington, D.C.)

System Administrator (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a System Administrator for a potential opportunity with hands-on experience in managing and securing enterprise IT environments. This role is responsible for ensuring the stability, security and efficiency of systems and networks across both physical and virtual infrastructures. The System Administrator will install and configure systems, manage cloud and on-premise environments and respond to performance and security issues. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Install and configure operating systems (Windows, Linux) and related software.
  • Set up hardware including servers, networking devices and storage solutions.
  • Administer and maintain physical and virtual servers (e.g., file servers, application servers).
  • Proficient understanding of Active Directory, DNS and DHCP.
  • Configure and manage network devices such as routers, switches, firewalls and VPNs.
  • Implement and manage backup systems and disaster recovery plans.
  • Monitor system performance and track server health, uptime and resource utilization.
  • Troubleshoot hardware, software and network issues.
  • Maintain documentation of system configurations, changes and updates.
  • Ensure compliance with applicable industry regulations and security standards.

What you need to know:

  • Ability to manage complex, hybrid environments spanning physical, virtual, and cloud systems.
  • Skilled in diagnosing and resolving system and network performance issues.
  • Familiarity with compliance requirements and industry-standard security practices.
  • Strong documentation habits for system configurations, changes, and updates.
  • Effective communication and collaboration skills to support cross-functional teams.

Must have’s:

  • Bachelor’s degree.
  • 3+ years of experience as a System Administrator or similar role, including:
    • Managing systems and server roles, hardware and operating systems (Windows, Linux).
    • Azure cloud services and SaaS solutions.
    • Virtualization platforms such as VMware or Hyper-V.
    • Networking, firewalls, VPNs, vLANs and enterprise security tools (e.g., Cisco, Meraki).
    • Implementing and managing backup and disaster recovery solutions.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • Master’s degree in Cybersecurity, Information Systems or a related technical discipline.
  • Experience with cloud security architectures in AWS and Azure.
  • Proficiency with containerization and orchestration tools such as Docker and Kubernetes.
  • Knowledge of DevSecOps practices.

Where it’s done:

  • Onsite (Washington, D.C. or Las Vegas, NV).

SOC Level 2 Analyst (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a SOC Level 2 Analyst for a potential opportunity to provide advanced monitoring, triage and response within a 24/7 Security Operations Center (SOC) environment. This role plays a key part in identifying and investigating security incidents, advising on mitigation and improving monitoring content and procedures. The SOC Level 2 Analyst will have hands-on experience with security technologies and be ready to contribute to threat detection, content development and continuous service improvement in a fast-paced operational setting. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing systems, telephone calls and chat sessions.
  • Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
  • Escalate potential security incidents to client personnel, implement countermeasures in response to others and recommend operational improvements.
  • Keep accurate incident notes in the case management system.
  • Maintain awareness of the client’s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence and recent security incidents.
  • Provide advanced analysis of the results of the monitoring solutions, assess escalated outputs and alerts from Level 1 Analysts.
  • Perform web hunting for new patterns/activities.
  • Advise on content development and testing.
  • Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
  • Ensure that all identified events are promptly validated and thoroughly investigated.
  • Provide end-to-end event analysis, incident detection and manage escalations using documented procedures.
  • Devise and document new procedures and runbooks/playbooks as directed.
  • Maintain monthly Service Level Agreements (SLAs).
  • Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.
  • Assist the Cyber Hunting team with advanced investigations as needed.
  • Provide malware analysis (executables, scripts, documents) to determine indicators of compromise and create signatures for future detection of similar samples.
  • Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
  • Perform peer reviews and consultations with Level 1 Analysts regarding potential security incidents.
  • Serve as a subject matter expert in at least one security-related area (e.g., specific malware solution, Python programming, etc.).
  • Provide shift status and metric reporting as well as support weekly operations calls.

What you need to know:

  • Strong understanding of SOC operations, incident response workflows and monitoring tools.
  • Experience with malware behavior analysis and identification of indicators of compromise.
  • Familiarity with APT tactics, techniques and procedures.
  • Knowledge of security technologies such as SIEM, EDR, IDS/IPS and WAF.
  • Understanding of networking fundamentals, protocols (TCP/IP, DNS, HTTP) and infrastructure devices.
  • Awareness of security architecture principles and common defensive tools.

Must have’s:

  • Bachelor’s degree.
  • 2+ years of working in a SOC or similar security operations environment, including 1+ years of experience in security technologies such as:
    • Security Information and Event Management (SIEM).
    • IDS/IPS, DLP, Endpoint Detection and Response (EDR).
    • Web Application Firewall (WAF), anti-virus and sandboxing solutions.
    • Host- and network-based firewalls, threat intelligence platforms or penetration testing tools.
  • One or more of the following certifications:
    • (ISC)2 Certified Information Security Professional (CISSP)
    • GIAC Certified Intrusion Analyst (GCIA)
    • GIAC Continuous Monitoring (GMON)
    • Certified Ethical Hacker (CEH) or equivalent.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Must have the ability to work shifts on a rotating basis for 24/7 support of clients.
  • Travel up to 15%, on average, based on the work you do and the clients and industries/sectors you serve.
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • A strong desire to understand the what as well as the why and the how of security incidents.
  • Knowledge of Advanced Persistent Threats (APT) tactics, techniques and procedures.
  • Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
  • Understanding of common network infrastructure devices such as routers and switches.
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.
  • Basic knowledge in system security architecture and security solutions.

Where it’s done:

  • Onsite (Las Vegas, NV).

Journeyman Cybersecurity Engineer – Splunk (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Journeyman Cybersecurity Engineer – Splunk for a potential opportunity to support the design, deployment, and maintenance of cybersecurity infrastructure and tools. The ideal candidate will possess a strong understanding of network and system security, demonstrated experience with Splunk, and a solid foundation in scripting and automation. The Journeyman Cybersecurity Engineer – Splunk plays a key part in enhancing threat detection, improving incident response, and supporting continuous security improvements. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Design, implement, and maintain security infrastructure.
  • Deploy security tools and technologies.
  • Troubleshoot security issues.
  • Integrate Splunk with other cybersecurity tools and data sources.
  • Create dashboards, reports, and alerts to support security operations.
  • Perform log analysis to identify potential security incidents.
  • Collaborate with cross-functional teams to improve security posture.

What you need to know:

  • Strong understanding of network and system security.
  • Proficiency in scripting and automation.
  • Experience with security tools and technologies, including Splunk.
  • Familiarity with log management and SIEM best practices.
  • Understanding of incident response processes and threat detection techniques.
  • Ability to interpret and apply cybersecurity frameworks and standards.
  • Experience working in fast-paced, mission-driven environments.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • 6+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Hands-on experience configuring, managing, and troubleshooting Splunk in enterprise environments.
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Washington D.C.)

Journeyman Cyber Vulnerability Analyst (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Journeyman Cyber Vulnerability Analyst for a potential opportunity to support ongoing vulnerability management efforts across critical systems. This role is responsible for conducting vulnerability scans, analyzing results and working with stakeholders to coordinate timely remediation. The Journeyman Cyber Vulnerability Analyst will bring a solid foundation in vulnerability assessment tools, a strong understanding of common exploits and proven organizational skills to effectively manage and prioritize multiple efforts. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Conduct vulnerability assessments and scans.
  • Analyze vulnerability reports and prioritizing risks.
  • Coordinate with other teams to patch and mitigate vulnerabilities.
  • Develop vulnerability management policies and procedures.
  • Create and maintaining documentation for vulnerability management processes.
  • Assist in the development of metrics and dashboards to track remediation progress.
  • Support compliance efforts by mapping vulnerabilities to applicable standards and frameworks.

What you need to know:

  • Strong understanding of vulnerability scanning and assessment tools.
  • Knowledge of common vulnerabilities and exploits.
  • Ability to analyze complex technical information.
  • Strong organizational and time management skills.
  • Understanding of patch management processes and system hardening practices.
  • Experience working with enterprise vulnerability assessment platforms.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • 4+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Hands-on experience with enterprise vulnerability assessment tools and platforms.
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Washington, D.C.)

Journeyman Incident Response (IR) Analyst (Q Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Journeyman Incident Response (IR) Analyst for a potential opportunity to support enterprise-level cybersecurity operations. The ideal candidate will have a strong foundation in security operations, log analysis, and threat detection, with the ability to act quickly and methodically in high-pressure situations. The IR Analyst will play a key role in monitoring, identifying, analyzing, and responding to security incidents across critical systems. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.

What you’ll be doing:

  • Monitoring security systems and analyzing alerts to identify potential incidents.
  • Investigating security events and determining root cause and impact.
  • Coordinating incident response actions across technical teams.
  • Developing and maintaining incident response documentation and playbooks.
  • Participating in after-action reviews and reporting to improve response efforts.
  • Supporting the development and refinement of detection and response capabilities.
  • Maintaining awareness of emerging threats and vulnerabilities.

What you need to know:

  • Strong understanding of security operations and incident response processes.
  • Experience analyzing logs, alerts, and other security data sources.
  • Familiarity with cybersecurity frameworks and response best practices.
  • Ability to work under pressure and respond effectively to high-impact incidents.
  • Proficiency in using security tools, SIEM platforms, and endpoint detection systems.
  • Strong analytical and critical thinking skills.
  • Clear and concise verbal and written communication skills.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • 4+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Solid understanding of incident response lifecycle and ability to lead or support all phases, including detection, containment, eradication, recovery, and lessons learned
  • Applicants must currently hold and maintain an active DOE Q or equivalent DoD Top Secret clearance.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Las Vegas, NV).

Data Pipeline Technical Lead

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Data Pipeline Technical Lead with hands-on technical leadership experience in designing, implementing and operating mission-critical data pipeline infrastructure for cybersecurity programs. The ideal candidate excels at facilitating complex technical discussions, breaking down ambiguous requirements into actionable work and guiding a large, diverse engineering team toward successful delivery. The Data Pipeline Technical Lead role operates in a fast-paced Agile environment and requires a strong mix of strategic planning and tactical problem-solving. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Lead architectural design discussions and perform comprehensive design reviews for data pipeline solutions.
  • Conduct peer reviews of code commits, configurations and automation scripts across Kafka, DevSecOps and development teams.
  • Guide data target analysis and support data mapping/modeling initiatives.
  • Perform analysis of alternatives to support complex technical decisions.
  • Facilitate epic decomposition and story development within Agile planning cycles.
  • Provide technical direction for full end-to-end data pipeline solutions.
  • Manage 17–19 direct reports, including Kafka engineers, developers, DevSecOps engineers and SRE staff.
  • Facilitate daily standups, sprint ceremonies, backlog refinement sessions and other Agile meetings for a 26+ person team.
  • Participate in program-wide technical leads meetings and customer stakeholder sessions.
  • Identify and resolve cross-team dependencies and technical blockers.
  • Provide mentorship to team leads and senior engineers across multiple technical disciplines.
  • Interface regularly with customer stakeholders on technical approaches and program direction.
  • Coordinate with other technical teams across the larger program ecosystem.
  • Participate in SAFe PI planning cycles and Agile ceremonies.
  • Facilitate ad-hoc technical decision meetings and design sessions.

What you need to know:

  • Design, optimize and maintain secure, scalable data pipelines in mission-critical environments.
  • Apply streaming technologies such as Kafka to support real-time cybersecurity data ingestion and processing.
  • Implement containerized and automated deployments using infrastructure-as-code in cloud-native environments.
  • Develop and manage data modeling, transformation logic and governance strategies for large-scale cybersecurity datasets.
  • Execute Agile and SAFe methodologies across large, cross-functional engineering teams.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related technical field.
  • 10+ years of technical experience in data engineering, software development or related technical fields including 5+ years leading technical teams of 8 or more engineers.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Expert-level Python development experience with focus on data pipeline applications.
  • Solutions architecture expertise in data engineering and pipeline design.
  • Data mapping and modeling proficiency for complex cybersecurity datasets.
  • Confluent Kafka platform expertise, including distributed streaming architecture, data governance frameworks, schema evolution strategies and enterprise-grade cluster management.
  • Kubernetes/AWS EKS experience for containerized deployments.
  • Infrastructure automation using Ansible, Python scripting and shell scripting.
  • Experience with containerization technologies including Docker and Docker Compose.
  • AWS cloud services experience in enterprise environments.
  • Experience with SAFe/Agile methodologies and ceremony facilitation.
  • Strong decomposition skills for complex technical epics and requirements.
  • Proven ability to mentor senior engineers and technical specialists.
  • Experience managing diverse technical disciplines, including infrastructure, development, DevSecOps and SRE.
  • Applicants must be a U.S. citizen and eligible to obtain and maintain a security clearance, in compliance with federal contract requirements.

Beneficial to have the following:

  • Experience with the Elastic Stack and related technologies, including Elastic APM.
  • Federal contracting or government sector experience.
  • Background in cybersecurity data processing or SIEM technologies.
  • Experience with large-scale data pipeline architectures.
  • Familiarity with CISA frameworks or federal cybersecurity programs.
  • Industry-recognized certifications.

Where it’s done:

  • Remote (Herndon, VA) must live within 50 miles of Washington, DC and attend onsite SAFe PI planning sessions two days per quarter.

SME Architect

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a SME Architect with deep subject matter expert (SME) in modern cryptography, Zero Trust Architecture (ZTA) and Post-Quantum Cryptography (PQC). The ideal candidate will play a key role in shaping enterprise cryptographic strategy by designing, implementing and validating solutions that strengthen security across the enterprise. The SME Architect role requires anticipating security needs, aligning with federal cybersecurity standards and guiding stakeholders on strategies that ensure secure adoption of PQC and ZTA capabilities. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Serve as a SME in designing and implementing enterprise cryptographic solutions.
  • Identify security gaps, define requirements and establish appropriate security controls for applications, systems and processes.
  • Collaborate with stakeholders to develop roadmaps and strategies that integrate cryptographic services and enterprise security capabilities.
  • Baseline configurations, validate implementation success and ensure ongoing compliance with ZTA and cryptographic standards.
  • Develop cybersecurity policies that align with the CISA ZTA Maturity Model and NIST guidance.

What you need to know:

  • Strong expertise in cryptographic architecture, design and deployment.
  • Knowledge of ZTA models, NIST cryptographic standards and federal cybersecurity frameworks.
  • Familiarity with FedRAMP-authorized security products.
  • Ability to translate enterprise security requirements into scalable architecture solutions.
  • Skilled in policy creation, requirements development and stakeholder communication.

Must have’s:

  • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Technology, Engineering or 4+ additional years of enterprise cybersecurity and architecture experience in lieu of degree.
  • CISSP certification plus one or more of the following: ECES (EC-Council Certified Encryption Specialist), Forrester Zero Trust certification, CISSP-ISSAP (Information Systems Security Architecture Professional) or firewall OEM certification (e.g., CCNP Security, Palo Alto PCNSE).
  • 4+ years of experience in cybersecurity architecture with 1+ year focused to cryptographic design and implementation.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Experience designing and implementing cryptographic solutions for federal environments.
  • Ability to define and deliver cryptographic modernization requirements aligned with Zero Trust Architecture (ZTA) principles, NIST standards and CISA ZTA Maturity Model.
  • Hands-on experience implementing and validating ZTA-aligned and FedRAMP-approved cryptographic solutions.
  • Applicants must be a U.S. citizen in compliance with federal contract requirements.

Where it’s done:

  • Hybrid (Washington, DC).

Senior Cyber Support Developer (TS/SCI w/ Poly)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Senior Cyber Support Developer with expertise in ServiceNow development and integration. The ideal candidate will design, develop and implement ServiceNow solutions that address business requirements while ensuring high-quality, secure and maintainable code. The Sr. Cyber Support Developer role requires strong technical knowledge, hands-on software development experience and the ability to collaborate effectively with stakeholders to deliver scalable solutions in a mission-driven environment. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Develop ServiceNow solutions and enhancements using core platform capabilities.
  • Develops the applications including configuration, report development and data migration as required.
  • Identify and implement best-practice solutions to meet client requirements.
  • Perform unit testing and resolve code defects.
  • Migrate code changes into the production environment.
  • Assist with technical design activities and prepare supporting documentation.
  • Collaborate with internal stakeholders and team members to build ServiceNow solutions aligned with business needs.

What you need to know:

  • Strong knowledge of ServiceNow development.
  • Experience with one or more scripting languages.
  • Understanding of software development lifecycle practices including testing, migration and documentation.
  • Familiarity with secure coding practices and compliance requirements in federal environments.
  • Ability to troubleshoot, problem-solve and deliver scalable technical solutions.

Must have’s:

  • Bachelor’s degree or 4+ additional years of software development experience in lieu of degree.
  • DoD 8570 certification meeting IAT Level II requirements (e.g., CCNA-Security, CySA+ GICSP, GSEC, Security+ or SSCP) or ability to obtain within six (6) months of hire.
  • 5+ years of software development experience, including 2+ years on large and complex development projects.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Experience developing Service Catalog and ServiceNow workflows.
  • Experience with at least one scripting language (Ruby, Python, Perl, Bash or JavaScript).
  • Applicants must currently hold and maintain an active TS/SCI clearance with Polygraph.

Beneficial to have:

  • Certified ServiceNow Administrator (CSA).

Where it’s done:

  • Onsite (Denver, CO).

SOC Consolidation Lead (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a SOC Consolidation Lead to guide enterprise-wide stakeholder engagement and develop standardized, scalable intake processes. This role requires mastery of SOC consolidation strategies, thought leadership in cybersecurity, and the ability to resolve highly complex technical and organizational problems. The SOC Consolidation Lead position demands expert knowledge of advanced technologies and the vision to shape enterprise SOC modernization efforts while mentoring the next generation of technical staff. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Lead stakeholder engagement to ensure effective collaboration across enterprise cybersecurity operations.
  • Develop standardized, scalable intake processes to unify SOC integration efforts.
  • Provide thought leadership in SOC consolidation, contributing to enterprise modernization initiatives.
  • Resolve undefined, multi-dimensional technical problems requiring advanced conceptualization.
  • Collaborate with internal and external experts to design innovative solutions and methodologies.
  • Mentor and coach junior staff, developing the next generation of SOC professionals.
  • Serve as a recognized authority within the field, contributing to the advancement of cybersecurity knowledge.
  • Drive the adoption of practices that enhance enterprise SOC efficiency, scalability, and resilience.

What you need to know:

  • Expertise in SOC consolidation strategies, intake process development, and stakeholder engagement.
  • Deep understanding of enterprise cybersecurity operations and modernization challenges.
  • Proven ability to resolve complex, undefined problems using advanced technical concepts.
  • Recognized thought leadership within the cybersecurity community.
  • Skilled in mentoring and guiding junior staff in advanced technical practices.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 15+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret clearance.

Beneficial to have the following:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

SOC Consolidation Specialist (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a SOC Consolidation Specialist to support enterprise cybersecurity modernization efforts. This role will serve as an alternate stakeholder engagement lead and alternate incident commander, while also designing and supporting data-driven reporting. The SOC Consolidation Specialist position requires deep expertise in SOC consolidation, strong technical leadership, and the ability to resolve complex, multi-dimensional problems that impact enterprise operations. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Serve as alternate stakeholder engagement lead, ensuring effective communication and coordination with enterprise teams.
  • Act as alternate incident commander to unify incident response when required.
  • Support the design and development of data-driven reporting to improve decision-making.
  • Contribute to SOC consolidation initiatives that streamline operations and enhance cybersecurity effectiveness.
  • Resolve highly complex, multi-dimensional problems requiring advanced technical depth and conceptualization.
  • Develop cutting-edge solutions in collaboration with subject matter experts and technical leaders.
  • Mentor and coach junior technical staff to strengthen organizational expertise.
  • Advance the body of knowledge in SOC operations through innovative approaches and methodologies.

What you need to know:

  • Expertise in SOC consolidation, operations, and enterprise-level cybersecurity integration.
  • Strong background in stakeholder engagement and incident response leadership.
  • Experience with designing and applying data-driven reporting solutions.
  • Ability to solve undefined and complex technical problems with innovative approaches.
  • Skilled in mentoring and guiding junior staff in technical assignments.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 12+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret clearance.

Beneficial to have the following:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Cyber Specialist III (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Cyber Specialist III to provide advanced technical support and direction within secure enterprise environments. This individual will take on complex cybersecurity challenges, help guide technical activities and collaborate with stakeholders to strengthen endpoint security, vulnerability management and compliance monitoring. The Cyber Specialist III role requires deep expertise, problem-solving skills and the ability to contribute to enterprise-level security improvements. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Provide advanced technical support and direction for endpoint security and compliance activities.
  • Guide and coordinate the work of junior cybersecurity staff to ensure consistency and quality.
  • Perform and review vulnerability scans, compliance checks and security assessments.
  • Collaborate with system owners and security teams to address findings and support remediation.
  • Ensure endpoint configurations align with established security baselines and standards.
  • Develop solutions to technical problems requiring deep analysis and subject matter expertise.
  • Contribute to continuous improvement of cybersecurity monitoring, detection and reporting.
  • Share knowledge and mentor less experienced technical staff.

What you need to know:

  • Strong knowledge of endpoint detection and response (EDR) tools and practices.
  • Experience with vulnerability management, compliance scanning and remediation support.
  • Familiarity with federal security configuration standards and automated assessment tools.
  • Ability to solve complex technical issues using advanced principles and concepts.
  • Experience mentoring or guiding junior staff in technical assignments.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 7+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret Clearance.

Beneficial to have the following:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Tier 2 Analyst (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Tier 2 Analyst to support enterprise SOC operations by reviewing and responding to escalated tickets from Tier 1. This role applies working knowledge of cybersecurity to improve incident detection, analyze threat intelligence and support both classified and unclassified environments. The Tier 2 Analyst position requires the ability to work under limited supervision while applying technical expertise to moderately complex problems. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Review and respond to tickets escalated from Tier 1 analysts.
  • Analyze and apply cyber threat intelligence to support detection and response.
  • Support incident detection and analysis across unclassified and classified environments.
  • Investigate alerts and anomalies, escalating to Tier 3 when necessary.
  • Apply technical knowledge to resolve problems of moderate scope and complexity.
  • Document findings and contribute to incident reports.
  • Collaborate with peers to improve detection workflows and escalation processes.
  • Support continuous improvement of SOC processes and procedures.

What you need to know:

  • Working knowledge of cybersecurity principles, SOC operations and incident response.
  • Familiarity with cyber threat intelligence and its application in SOC workflows.
  • Experience investigating alerts and supporting incident detection.
  • Ability to resolve moderately complex technical issues with limited supervision.
  • Understanding of both classified and unclassified operational environments.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 3+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret clearance.

Beneficial to have the following:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Tier 3 Analyst (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Tier 3 Analyst with deep expertise in cybersecurity operations. This role provides advanced support for issues escalated from Tier 2, investigates anomalies in vulnerability data and ensures effective response across both classified and unclassified environments. The Tier 3 Analyst position requires expert technical knowledge, creativity in developing solutions and the ability to address complex problems impacting multiple disciplines. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Receive and respond to complex issues escalated from Tier 2 analysts.
  • Review vulnerability data reports to identify anomalies requiring investigation.
  • Provide expert support for both classified and unclassified environments.
  • Develop and implement solutions for undefined and complex technical issues.
  • Investigate and analyze cybersecurity incidents to ensure accurate resolution.
  • Employ ingenuity and advanced technical expertise to design new solutions and approaches.
  • Collaborate with cross-functional teams to enhance SOC effectiveness.
  • Contribute to advancing technical standards, methods and processes.

What you need to know:

  • Expertise in cybersecurity analysis and incident response at an enterprise scale.
  • Strong background in reviewing and analyzing vulnerability data.
  • Experience supporting classified and unclassified operational environments.
  • Ability to solve complex technical problems using advanced principles and concepts.
  • Skilled in developing innovative solutions that improve SOC operations.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 7+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret clearance.

Beneficial to have the following:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Cyber Engineer (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Cyber Engineer to design, implement and manage cybersecurity solutions that support the enterprise SOC approach. This role ensures engineering alignment with SOC operations while continuously updating and tuning detection signatures. The Cyber Engineer position requires strong technical expertise in developing secure systems, piloting new technologies and providing engineering support for SOC modernization. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Design, implement and manage cybersecurity solutions in support of enterprise SOC operations.
  • Continuously update and tune detection signatures to enhance threat detection.
  • Research and pilot new cybersecurity technologies to improve defensive capabilities.
  • Investigate solution issues and recommend improvements.
  • Ensure cybersecurity solutions comply with organizational policies and guidelines.
  • Configure and validate secure systems, testing products to identify weaknesses.
  • Collaborate with stakeholders to translate business and security requirements into technical designs.
  • Develop engineering documentation, standards and policies to support enterprise operations.
  • Develop mitigations in response to security incidents and evolving threats.
  • Promote cybersecurity awareness across the enterprise.

What you need to know:

  • Expertise in designing, implementing and managing cybersecurity solutions.
  • Knowledge of detection signature tuning, monitoring and threat mitigation.
  • Experience with system configuration, validation and security testing.
  • Familiarity with enterprise SOC operations and engineering integration.
  • Strong ability to translate business and security requirements into technical designs.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 7+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must currently hold and maintain an active Secret clearance.

Beneficial to have:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Senior Information Systems Security Officer (ISSO)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individual technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement, etc.

Who we’re looking for:

We are seeking a Senior Information Systems Security Officer (ISSO) with deep hands-on experience supporting the Risk Management Framework (RMF) lifecycle. The ideal candidate will bring expertise in applying federal security policies, directives and compliance standards while guiding systems through authorization and continuous monitoring. The Sr. ISSO role is critical to ensuring systems remain secure, compliant and fully authorized to operate. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Provide subject matter expertise to ensure compliance with Treasury, DHS and NIST cybersecurity policies and frameworks.
  • Support the implementation, assessment and sustainment of security controls aligned with the NIST RMF (SP 800-37).
  • Maintain and update required security documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), Plans of Action and Milestones (POA&Ms) and continuous monitoring artifacts.
  • Review and analyze vulnerability and compliance scan results and work with system owners to track and coordinate remediation.
  • Support system owners in achieving and maintaining Authorization to Operate (ATO) status.
  • Apply knowledge of FS-191, CNSSI 1253, operational directives and NIST SP 800-53 Rev 4 & Rev 5 controls.
  • Develop and deliver compliance reports to demonstrate control effectiveness and overall system cybersecurity posture.
  • Collaborate with system owners, ISSMs and internal/external partners to strengthen risk reduction and resilience.
  • Contribute to process improvements that align with OIG FISMA Metrics Level 4 (Managed and Measurable).

What you need to know:

  • Strong knowledge of NIST RMF (SP 800-37), NIST SP 800-53 Rev 4 & Rev 5, CNSSI 1253, FS-191 and operational directives.
  • Hands-on experience with vulnerability scanning tools and interpreting scan results.
  • Demonstrated expertise in developing and maintaining security authorization packages and compliance documentation.
  • Experience implementing and sustaining information assurance (IA) controls in federal environments.
  • Strong understanding of continuous monitoring practices and reporting requirements.

Must have’s:

  • Bachelor’s degree or additional 4+ years of relevant experience or years of relevant experience in lieu of degree.
  • 8+ years of experience maintaining the operational security posture for an information system or program as an ISSO or ISSM.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must be a U.S. citizen in compliance with federal contract.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Vulnerability Management Engineer

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Vulnerability Management Engineer to support vulnerability management and remediation efforts in a complex cybersecurity environment. The ideal candidate will have strong technical skills, experience with vulnerability disclosure platforms and expertise in vulnerability scanning and remediation. The Vulnerability Management Engineer will provide technical support, generate reports and recommend improvements to the vulnerability management (VM) program. This is a unique opportunity to contribute to the growth and culture of a fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Develop and maintain Standard Operating Procedures (SOPs), playbooks and process documents related to vulnerability management.
  • Use the Microsoft Office Suite to generate reports and presentations for internal and external stakeholders.
  • Perform scheduled vulnerability scans across production, disaster recovery and test/development environments, as well as ad-hoc scans to support troubleshooting.
  • Support the verification, remediation and closure of vulnerabilities, ensuring timely resolution.
  • Manage and secure cloud environments, including SaaS platforms like Azure and Oracle, as well as Infrastructure as a Service (IaaS) environment.
  • Administer and manage vulnerability scanning tools (e.g., Tenable Nessus, DBProtect, WebInspect, Acunetix) and automate the integration of scan results into ServiceNow.
  • Troubleshoot scanning issues and agent failures with system administrators to improve scan coverage and accuracy.
  • Utilize ServiceNow GRC, Security Operations (SecOps) and the Vulnerability Response Module for effective vulnerability management.
  • Automate processes to correlate scan results with asset data, create analytics and develop dashboards for reporting.
  • Design, customize and maintain dashboards in Tenable.sc and ServiceNow to provide actionable insights on vulnerability trends, compliance metrics and remediation progress.
  • Ensure successful deployment and maintenance of updated audit files and feeds in Tenable.sc to support accurate scanning.
  • Generate and deliver recurring vulnerability reports by tool/platform (e.g. Tenable.sc, WebInspect, DbProtect) for ISSOs and other stakeholders.
  • Validate and document false positives, collecting artifacts and evidence to ensure accurate risk assessment and reporting.
  • Collaborate with ISSOs, system engineers and administrators to review findings, strategize remediation and confirm resolution of vulnerabilities.
  • Collaborate with the Incident Response (IR) team to support vulnerability-related incidents during business hours.

What you need to know:

  • Strong understanding of vulnerability management processes.
  • Proficiency in Microsoft Office tools (Word, PowerPoint, Excel) for documentation and reporting.
  • Hands-on experience with running and managing vulnerability scans using industry-standard tools.
  • Experience with automation tools and dashboards to streamline vulnerability management and reporting processes.
  • Familiarity with ServiceNow and vulnerability response processes.
  • Understanding of cloud-based platforms and IaaS environments.

Must have’s:

  • Bachelor’s degree or 4+ additional years of experience in lieu of degree.
  • 8+ years of experience configuring vulnerability assessment tools, performing scans, researching and analyzing vulnerabilities, providing corrective actions and reporting results.
  • Hands-on experience with vulnerability scanning tools such as Tenable Nessus, DBProtect, WebInspect, Qualys and Acunetix.
  • Understanding of IaaS.
  • Proficiency with ServiceNow GRC module, SecOps and the Vulnerability Response Module.
  • Familiarity with cloud platforms such as Azure and Oracle.
  • Ability to support IR during office hours.
  • Applicants must be a U.S. citizen and eligible to obtain and maintain a security clearance, in compliance with federal contract requirements.

Where it’s done:

  • Onsite (Washington, DC).

GenAI Product Engineer

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a GenAI Product Engineer to design, build and evaluate Generative AI solutions across cloud environments. The ideal candidate will combine technical depth in AI architecture, Python development and cloud infrastructure with strong product engineering skills. The GenAI Product Engineer role supports the ongoing development and management of AI Hub technical initiatives and drives innovation in Generative AI Proofs of Concept (PoCs). This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Design and develop solution architectures for Generative AI Proofs of Concept (PoCs).
  • Gather and document functional and business requirements to guide AI PoC development.
  • Lead development activities, testing and evaluation of AI PoCs to ensure scalability and performance.
  • Develop, test and maintain APIs and integration components for AI applications.
  • Build and deploy AI services in cloud environments.
  • Use Git and DevOps pipelines to streamline version control, CI/CD and model deployment.
  • Design, optimize and query SQL and NoSQL.
  • Develop and maintain front-end applications using modern JavaScript frameworks.
  • Ensure security, performance and scalability of deployed AI services.
  • Collaborate with cross-functional teams to translate ideas into deployable solutions.
  • Stay current with emerging AI technologies and contribute to internal innovation efforts.

What you need to know:

  • Strong understanding of Generative AI concepts.
  • Ability to evaluate AI architecture choices for scalability, performance and maintainability.
  • Knowledge of best practices for integrating AI models into production systems.
  • Understanding of secure coding, data handling and model deployment principles.

Must have’s:

  • 5+ years of relevant experience. Associate’s degree substitute 2 years of experience; Bachelor’s degree substitute 3 years of experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Proficiency in Python programming language.
  • Experience with Generative AI, including Large Language Models (LLMs), Retrieval-Augmented Generation (RAG) and Vector Databases.
  • Familiarity with cloud platforms, preferably Google Cloud Platform.
  • Knowledge of DevOps practices and tools such as Git.
  • Experience with SQL databases like Firestore, Firebase or BigQuery.
  • Front-end development skills, with experience in React (preferred), HTML, JavaScript, Angular, Vue.js, Svelte, Ember.js or similar frameworks.
  • Experience building APIs and integrating AI models into applications.
  • Applicants must be a U.S. citizen in compliance with federal contract requirements.

Beneficial to have:

  • Industry relevant certifications.

Where it’s done:

  • Remote (Herndon, VA).

Power BI Cybersecurity Data Analyst

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking an Power BI Cybersecurity Data Analyst with expertise in Power BI and a foundational background in cybersecurity. This individual will play a critical role in enhancing FISMA reporting and analytics capabilities for a federal agency. The Power BI Cybersecurity Data Analyst role involves developing dashboards, visualizing cybersecurity metrics and supporting compliance monitoring and strategic planning efforts. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Support the aggregation and normalization of cybersecurity performance metrics and FISMA data from various sources.
  • Develop and maintain dashboards using Power BI (and similar tools) to track compliance status, performance indicators and control effectiveness.
  • Ensure data accuracy and timeliness through automation, data validation and quality assurance processes.
  • Assist in the development and documentation of FISMA reporting requirements in alignment with OMB, DHS and Treasury mandates.
  • Collaborate with cybersecurity stakeholders to define data needs and translate them into actionable reporting solutions.
  • Support quarterly and annual FISMA reporting by compiling, analyzing and visualizing cybersecurity metrics.
  • Provide ad hoc data analysis and technical support for projects related to cybersecurity compliance and risk posture.
  • Participate in the design and optimization of data pipelines and data models for cybersecurity analytics.
  • Create reusable templates, visuals and analytical models for consistent reporting across business units.
  • Assist in integrating FISMA reporting with broader Governance, Risk and Compliance (GRC) frameworks and tools.

What you need to know:

  • Proficiency in Power BI for dashboard development, data modeling and visualizations.
  • Knowledge of FISMA requirements and cybersecurity compliance frameworks.
  • Experience with data integration, transformation and validation techniques.
  • Familiarity with cloud and on-premises data environments.
  • Ability to communicate technical findings clearly to both technical and non-technical stakeholders.

Must have’s:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field or 4 years of additional experience in lieu of a degree.
  • 5+ years of experience providing cybersecurity operations or consulting support.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Demonstrated experience developing and maintaining interactive dashboards and reports using Power BI in support of cybersecurity or compliance programs.
  • Must be a U.S. citizen in compliance with federal contract requirements.

Beneficial to have the following:

  • Industry recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Cyber Analytics Developer (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Cyber Analytics Developer to enhance threat detection and response capabilities within enterprise SOC operations. This role focuses on optimizing data analytics and building advanced analytics and custom detection solutions. The Cyber Analytics Developer position requires deep technical expertise, creativity in developing innovative approaches and the ability to address complex, multi-dimensional problems. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Enhance threat detection and response capabilities through advanced analytics solutions.
  • Optimize data analytics workflows to improve accuracy and efficiency of SOC operations.
  • Build and implement custom detection capabilities tailored to evolving threats.
  • Resolve undefined and complex technical problems requiring advanced conceptualization.
  • Collaborate with experts to design and apply cutting-edge methodologies and tools.
  • Develop innovative solutions that strengthen enterprise cybersecurity operations.
  • Mentor and coach junior staff in analytics development and advanced detection methods.
  • Contribute to the advancement of knowledge in cyber analytics and detection practices.

What you need to know:

  • Expertise in cyber analytics, detection engineering and custom rule development.
  • Strong knowledge of optimizing data analytics for threat detection and response.
  • Experience building advanced analytics and detection workflows for enterprise SOCs.
  • Ability to solve complex problems using advanced technical principles and concepts.
  • Skilled in mentoring and guiding junior technical staff.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 12+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must hold and maintain an active Secret clearance.

Beneficial to have:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Senior Malware/Forensics Analyst (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Senior Malware/Forensics Analyst with extensive expertise in advanced technical domains. This individual contributor will develop solutions for undefined and complex technical issues that impact multiple areas or disciplines. The Sr. Malware/Forensics Analyst will employ ingenuity and creativity to deliver innovative systems and approaches while applying expert knowledge of advanced technical principles, theories and concepts. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Analyze and investigate malware, digital artifacts and forensic evidence.
  • Develop and apply advanced methodologies to address complex and undefined technical challenges.
  • Perform forensic examinations on systems, applications and networks to identify indicators of compromise.
  • Document technical findings and provide detailed reports to stakeholders.
  • Recommend improvements to processes and procedures based on forensic analysis.
  • Collaborate with peers and cross-functional teams to resolve multi-disciplinary technical problems.
  • Apply creativity and technical expertise to develop new solutions and approaches

What you need to know:

  • Expert-level knowledge of malware analysis and digital forensics principles.
  • Ability to identify, interpret and report on digital evidence from diverse sources.
  • Strong understanding of complex system behaviors and potential attack vectors.
  • Experience in conceptualizing and applying advanced technical theories and methodologies.
  • Strong analytical, problem-solving and communication skills

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 10+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must hold and maintain an active Secret Clearance.

Beneficial to have:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Threat Hunter (Secret Clearance)

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.  

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking a Threat Hunter to lead stakeholder engagement and develop standardized, scalable intake processes that strengthen enterprise SOC operations. This role requires deep expertise in cyber threat hunting, advanced analytics and the ability to resolve complex, undefined problems. The Threat Hunter position combines technical leadership with innovative solution development and mentoring of junior staff. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.

What you’ll be doing:

  • Lead stakeholder engagement to enhance communication and collaboration across enterprise cybersecurity operations.
  • Develop and implement standardized, scalable intake processes to streamline SOC integration.
  • Conduct proactive threat hunting activities to detect advanced adversary tactics, techniques and procedures.
  • Apply advanced analytics to identify anomalies and uncover emerging threats.
  • Resolve highly complex and multi-dimensional technical problems with innovative solutions.
  • Collaborate with other experts to design and apply cutting-edge methodologies and tools.
  • Mentor and coach junior staff in advanced technical practices.
  • Contribute to the advancement of enterprise cybersecurity knowledge and threat hunting practices.

What you need to know:

  • Expertise in cyber threat hunting, detection methodologies and adversary tactics.
  • Strong background in stakeholder engagement and intake process development.
  • Experience designing scalable processes that enhance SOC operations.
  • Ability to conceptualize and solve complex, undefined problems across multiple disciplines.
  • Skilled in mentoring and guiding junior technical staff.

Must have’s:

  • Bachelor’s degree or 3+ additional years of relevant experience in lieu of degree.
  • 12+ years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must hold and maintain an active Secret Clearance.

Beneficial to have:

  • Industry-recognized certifications.

Where it’s done:

  • Onsite (Washington, DC).

Integration Engineer/Developer

Who we are:

ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.

The Perks:

As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.

Who we’re looking for:

We are seeking an Integration Engineer/Developer who has experience providing support in a dynamic, fast-paced environment within the public sector. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. The Integration Engineer/Developer will have the opportunity to be exposed to all aspects of support to a federal client and will be encouraged to grow as the organization expands. 

What you’ll be doing:

  • Integrate multiple Commercial Off the Shelf (COTS) and open-source products, software configuration packages and custom code to work together to operate as a single solution, tailored to meet customer requirements.
  • Work as part of an agile development team to conduct systems design, analysis and development of the solution.
  • Create data pipelines and implement ETL processes for both stream processing (such as tool and sensor log data) and batch processing (such as daily vulnerability updates), integrating functionality between applications, leveraging APIs and scripting languages (Python preferred).
  • Conduct data modeling, hands on configuration, tuning and operating of distributed data storage stacks, with a focus on Elasticsearch and Kafka.
  • Query data to include aggregations, calculations and producing metrics from data.
  • Design and implement data visualizations.
  • Engage in all agile ceremonies including backlog grooming, demos and retrospectives.

What you need to know:

  • Demonstrated experience writing well-structured code and applications using coding best practices to deliver enterprise applications.
  • Proven experience in developing robust, scalable data pipelines and integrations.
  • Solid understanding of application architecture and interfaces as well as experience with data modeling.
  • Expertise in working with streaming data and implementing real-time data processing solutions.
  • Ability to develop and deploy in containerized environments (Docker, Kubernetes).
  • Experience with open-source tools including Kafka, Logstash, Beats, Elasticsearch, Kibana, or Splunk.

Must have’s:  

  • Minimum of 5-7 years of relevant experience.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Strong written and verbal communication skills.
  • Strong documentation skills.
  • Experience leveraging data processing technologies such as Apache Kafka and Elasticsearch.
  • Skilled problem-solver with strong ability to troubleshoot complex data pipeline issues.
  • Ability to work with cross functional teams.
  • Applicants must be a U.S. citizen in compliance with federal contract requirements.

Beneficial to have:

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.
  • Industry related certifications.
  • Experience with cloud platforms (AWS, Azure, GCP).
  • Familiarity with cybersecurity concepts and tools.
  • Experience with real-time data processing frameworks (e.g., Apache Flink, Apache Spark).

Where it’s done:

  • Remote (Herndon, VA). 

Applicants have rights under Federal Employment Laws. For more information please see: