PingWind

HQ
Annandale, Virginia, USA
142 Total Employees
Year Founded: 2012

Similar Companies Hiring

Security • Sales • Information Technology • Cybersecurity • Automation
6 Offices
357 Employees
Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees
Jobs at PingWind

Search the 52 jobs at PingWind

Recently posted jobs

8 Hours Ago
USA
Remote
Information Technology • Consulting
Lead a team in planning, configuring, migrating, and enhancing the MEDCHART system within a Government-selected Cloud hosting facility. Develop and execute cloud strategies aligned with Government objectives, design cloud infrastructure solutions, ensure scalability and reliability, and collaborate with stakeholders and software developers for optimized cloud applications.
2 Days Ago
Hawaii, USA
Information Technology • Consulting
Provide second-tier technical support to end-users for various systems and hardware, troubleshoot issues, recommend system modifications, and enhance support documentation. Collaborate with the team and interact with network services and development teams to restore service and address core problems efficiently.
2 Days Ago
Martinsburg, WV, USA
Information Technology • Consulting
The CIR Tier II Analyst is responsible for real-time monitoring and triage of cybersecurity alerts, leading investigations of incidents, collaborating with cross-functional teams, and maintaining documentation. The role requires tuning alerts for efficiency, leveraging SOAR platforms, and mentoring junior staff while staying updated on cybersecurity trends.
Information Technology • Consulting
The Training and Certification Coordinator in Cybersecurity is responsible for developing and managing training programs and certification initiatives. This includes identifying training needs, creating materials, managing certification processes, and ensuring compliance with industry standards, while promoting cybersecurity awareness within the organization.
2 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The STIG Compliance Specialist is responsible for ensuring that the organization's IT systems comply with DoD security standards by conducting compliance assessments, implementing security controls, and maintaining documentation according to STIG requirements. This role involves collaboration with IT and development teams, identifying vulnerabilities, and preparing compliance reports.
3 Days Ago
Hines, IL, USA
Information Technology • Consulting
The CIR Tier II Analyst is responsible for real-time monitoring, triage of security alerts, incident analysis, and documentation in cybersecurity. The role involves participating in investigations of incidents and improving response capabilities, working collaboratively with cross-functional teams to enhance the efficacy of security measures and technologies.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The Software Assurance Analyst at PingWind ensures the security of software applications by conducting assessments, reviewing code for vulnerabilities, and working with development teams to implement secure coding practices. Responsibilities include security testing, vulnerability management, and compliance with security policies. The role requires strong experience in software assurance and security methodologies.
Information Technology • Consulting
The Senior STIG Compliance Specialist is responsible for ensuring IT systems adhere to DoD security standards. This role involves conducting compliance assessments, implementing security controls, and providing strategic guidance on STIG compliance while leading junior staff and maintaining detailed documentation of compliance activities.
Information Technology • Consulting
The Senior Information Assurance Engineer at PingWind is responsible for ensuring the security of information systems through the development and implementation of assurance strategies, conducting risk assessments, managing security measures, ensuring compliance with regulations, and leading incident response activities.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The Incident Response Specialist manages security incidents, identifying, investigating, and mitigating threats. This role involves monitoring alerts, analyzing logs and traffic for security incidents, coordinating with cybersecurity teams, and documenting findings to protect organizational assets.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
As an Information Assurance Engineer, you will ensure the security of information systems, monitor devices for intrusions, analyze network security data, document system security incidents, and conduct security assessments and vulnerability scans.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The Log Analyst Specialist monitors, analyzes, and interprets log data to identify potential security threats, working closely with cybersecurity professionals. Responsibilities include monitoring various security systems, investigating anomalies, responding to incidents, and ensuring compliance with industry standards.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The Program Manager will oversee cybersecurity services for the Army Research Laboratory, leading contractor employees, ensuring high-quality service delivery, and managing complex cybersecurity projects. Responsibilities include risk management, reporting, and maintaining relationships with IT teams.
3 Days Ago
Adelphi, MD, USA
Information Technology • Consulting
The Vulnerability Manager will perform thorough vulnerability analysis and reporting, collaborate with IT teams for effective vulnerability management, conduct risk analysis, ensure compliance with cybersecurity policies, and maintain relationships with end-users. They will support the Army Research Laboratory's mission through innovative R&D resources.
6 Days Ago
USA
Remote
Information Technology • Consulting
The Automation Quality Assurance Engineer at PingWind will lead the execution of manual and automated testing to ensure the quality of SaaS/PaaS solutions. Responsibilities include designing and executing test cases, maintaining automated test scripts using Provar, and fostering collaboration with development teams to enhance testing processes and automation capabilities.
Information Technology • Consulting
The APEX Application Developer will design, develop, and maintain custom Oracle applications using Oracle APEX, SQL, and PLSQL, ensuring compliance with security standards. Responsibilities include performing requirements analysis, creating dynamic reports, and maintaining documentation for IT services supporting the US Army Contracting Command.
10 Days Ago
Fort Jackson, Columbia, SC, USA
Information Technology • Consulting
The IT Support Specialist will analyze and define network requirements, maintain network architecture, diagnose network issues, and ensure compliance with security policies while providing IT support to staff and soldiers at Fort Jackson.
Information Technology • Consulting
The Senior Salesforce Developer will develop applications on the Salesforce platform, lead integrations with Mulesoft, refine business requirements, architect data solutions, and participate in the development lifecycle including testing and deployment while adhering to Salesforce standards.
Information Technology • Consulting
The Digital Media/Graphics Designer Specialist will support the Army Contracting Command by creating visual concepts and layouts for a variety of media. Responsibilities include developing graphics for advertisements, brochures, corporate reports, and digital content for social media and websites, ensuring alignment with specific promotional needs.
Information Technology • Consulting
The Information Assurance Technology Specialist will provide system and application administration including continuous monitoring, account management, and system configuration for IT services supporting the US Army Contracting Command. Responsibilities include configuring ACAS Scanners, assisting with ISSO tasks, conducting system hardening, and developing recommendations for technological enhancements.