Gray Tier Technologies, LLC

HQ
Alexandria, Virginia, USA
Total Offices: 3
18 Total Employees
Year Founded: 2015

Similar Companies Hiring

Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
Software • Infrastructure as a Service (IaaS) • Cloud • Artificial Intelligence
2 Offices
53 Employees
Software • News + Entertainment • Marketing Tech • Generative AI • Enterprise Web • Digital Media • Consumer Web
2 Offices
14 Employees
Jobs at Gray Tier Technologies, LLC

Search the 48 jobs at Gray Tier Technologies, LLC

22 Hours Ago
Alexandria, VA, USA
Security • Software • Cybersecurity
The Sr. Splunk Developer will design and implement reports and dashboards within Splunk to monitor and visualize the health and performance of multiple applications. Responsibilities include creating automated data visualization services, triggering alerts for anomalous activities, and utilizing various security tools to assess compliance and security controls.
Security • Software • Cybersecurity
The VAT Analyst will assist with vulnerability management compliance, execute vulnerability scans, conduct assessments of IT systems, research current vulnerabilities, support incident response functions, and author security advisories.
Security • Software • Cybersecurity
The Senior Penetration Tester at DHS will develop and support pen testing resources for public facing sites and critical assets. Responsibilities include establishing a comprehensive pen testing program, hands-on pen testing, and recommending solutions for findings from tests. Requires strong incident detection and response skills.
Security • Software • Cybersecurity
Gray Tier Technologies seeks a Penetration Tester to assess and mitigate security vulnerabilities for the Department of Homeland Security. Responsibilities include performing cloud, internal, external, web app, physical pentests, conducting vulnerability assessments, and incident response as necessary. Requires a Bachelor's degree and extensive pentesting experience, particularly with cloud technologies like AWS, Kubernetes, and Docker.
Security • Software • Cybersecurity
The Cyber Threat Analyst will utilize advanced technologies for incident detection and response, conduct log analysis, recognize APT activity, and develop tools to enhance investigations. The role involves leading incident responses, mentoring junior staff, and communicating findings to stakeholders. Strong problem-solving and relationship-building skills are essential.
Security • Software • Cybersecurity
The Detection Engineer will enhance detection capabilities by identifying gaps, creating and tuning signatures, supporting incident response, developing metrics, and authoring automation scripts. They will also recommend new tools and technologies for network visibility.
Security • Software • Cybersecurity
The Windows Systems Administrator will manage and optimize information management systems, supervise other system administrators, conduct performance analyses, increase efficiency through automation, and provide user training. Familiarity with SharePoint applications and backend services is necessary.
Security • Software • Cybersecurity
The Sr. Applications and SharePoint Developer will provide IT support to the National Security Council, primarily focusing on SharePoint development and maintenance. Responsibilities include designing and creating custom workflows, managing integrated systems, and ensuring compliance with security standards. The role requires expertise in various programming languages and development methodologies, with an emphasis on collaborative work within agile teams.
Security • Software • Cybersecurity
The Full Stack Developer will provide IT support to the National Security Council, focusing on application development in C#, and maintaining both custom and third-party applications. Responsibilities include operational support, strategic planning for SharePoint, serving as a Tier 2 technical resource, and implementing new capabilities within the organization.
Security • Software • Cybersecurity
The All Source Intelligence Analyst will support intelligence operations by conducting open source research, developing briefings for senior government officials, and leveraging their intelligence expertise to assist Army units at various operational and strategic levels.
7 Days Ago
Crystal City, TX, USA
Security • Software • Cybersecurity
The Splunk Engineer will be responsible for managing Splunk Enterprise components, writing reports and dashboards, ingesting new data sources, and providing architectural diagrams. The role requires close collaboration with scrum teams and expertise in various automation tools, scripting languages, and cloud services.
Security • Software • Cybersecurity
The SIEM Engineer will lead SOAR activities within the Security Operations Center, ensuring SIEM availability and administrative oversight. Responsibilities include developing and implementing solutions for SOAR capabilities, enhancing operational processes, and coordinating with stakeholders to improve tool usage and governance.
7 Days Ago
Springfield, IL, USA
Security • Software • Cybersecurity
The Penetration Tester will conduct penetration testing on web applications, networks, APIs, and cloud platforms for DHS. Responsibilities include utilizing various tools for security assessments and providing expert guidance on best practices. The role requires a deep understanding of pen testing methodologies and the ability to support a managed penetration testing team.
Security • Software • Cybersecurity
The Palo Alto Engineer will enhance the security posture of Firewalls and Load Balancers, provide Tier 3 support, maintain hardware and software components, conduct monthly firewall assessments, generate traffic utilization reports, and advise on the management of Palo Alto devices. The role requires active participation in work groups, adherence to DOD policies, and a top-secret security clearance.
7 Days Ago
Springfield, IL, USA
Security • Software • Cybersecurity
The Security Control Assessor will conduct in-depth security control assessments for National Security Systems, produce detailed cybersecurity risk recommendations, develop security policies and documentation, conduct vulnerability scans, and participate in security meetings to support NSS initiatives. The role requires experience with NIST RMF and CNSS policies, cybersecurity tools, and risk analysis.
Security • Software • Cybersecurity
The Expert Data Scientist/Imagery Analyst will support Intelligence customers by leveraging extensive experience in Geospatial Information Systems, analyzing imagery, and producing detailed intelligence reports. Responsibilities include tasking and processing imagery data, collaborating with various organizations, and conducting multi-GEOINT research to support national defense and security missions.
Security • Software • Cybersecurity
The Veritas Systems Administrator is responsible for the operations and maintenance of the Veritas NetBackup application, ensuring compliance with DOD cybersecurity standards. Key duties include monitoring backup jobs, performing disaster recovery, managing backup policies, troubleshooting, and maintaining documentation. Experience in virtualized environments and cloud operations is required.
Security • Software • Cybersecurity
Seeking a software engineer to perform as one of the primary software test engineers for the development and integration phase of SDLC. Responsibilities include managing projects, consulting with clients, testing software functionality, overseeing project performance, working with 3rd party vendors, providing project management support, researching emerging technologies, and more.
7 Days Ago
Arlington, TX, USA
Security • Software • Cybersecurity
Design and develop efficient and reusable reports, dashboards, and visualization services using Splunk. Monitor and ensure compliance status with cyber security directives. Create security rules and alerts for threat detections. Requires Bachelor's degree and Active Top Secret security clearance.
Security • Software • Cybersecurity
The SOC Analyst Tier 1 will perform cyber threat intelligence analysis, conduct network traffic analysis, and provide support during incident response and threat hunting activities.