Special Skills?

Just because your specialty isn't listed, that doesn't mean we are not interested.

Introduce yourself at:

Join The Team

To provide superior expertise to our customers it takes teams with the ability and resources to get the job done. To accomplish this, we hire the best and brightest in each IT discipline. This way, our customers get maximum value, which is reflected in long-term customer relationships.

You can also check out our jobs on Dice.com

Positions available

Position: PKI Engineer

Description: Systems Engineer in support of the Marine Corps implementation of DoD PKI with near term operational focus on the implementation, management and sustainment of the Marine Enterprise PKI.  Will be directly responsible for the continued implementation of the DoD PKI within the Marine Corps, both NIPR and SIPR, to include enterprise certificate validation infrastructure, directory services and support to deployed forces.  Responsible for implementation of solutions dealing with identity management within the Marine Corps as it relates to use of DoD PKI and CAC.  Ability to apply an enterprise-wide set of disciplines for the planning, analysis, design and construction of information systems on an enterprise-wide basis or across a major sector of the enterprise.  Will perform enterprise wide strategic systems planning, business information planning, business and analysis. Provides technical guidance in software engineering techniques and automated support tools.

Requirements: Expert knowledge in Microsoft Windows 2003/2008 Server, Exchange, ISA, Certificate Authority. Experience in DoD PKI implementation and architecture.

*DoD Security Clearance required

Apply for this position

Position: Identity and Access Management Engineer

Description: Responsible for completing architectural blueprints for the purpose of implementing compliance automation, simplified sign-on, access management, provisioning, and workflow products. At times, the individual may be required to lead an Identity and Access Management implementation team. When not engaged on a project, the IAM architect may perform IAM workshops and/or perform in a pre-sales engineer role. Depending on project situation, the architect may be called upon to be hands-on.

Requirements: Proficient with LDAP, Active Directory, Oracle Internet Directory, and SunOne. Experience in deploying Oracle Identity Management suite or RSA Cleartrust is preferred.   Working knowledge of networking and protocols is required. Desired knowledge of SAML integration and SPML integration. Required marketing skills within being able to communicate the value of Enterprise Architecture and IdAM role-based provisioning to the customer and other IT departments within the organization.

*DoD Security Clearance required

Apply for this position

Position: Lead Software Developer/Engineer

Description: Lead software developer for Conscious Security Inc. Provide all around development services to support the company and its clients to include individual programs.  This position will grow under your leadership to a fully staffed department and service for our clients.   

Requirements: Leadership and the desire to build something new is a must.  Over all understanding and the ability to adjust is more important then specializing in one particular field.  The ability to think on your feet and provide valuable guidance and solutions will be the key to success. 

*DoD Security Clearance desired

Apply for this position

Position: Information Assurance Analyst

Description: Provide IA support to government clients, with a primary emphasis on supporting Certification and Accreditation (C&A) and Red Team efforts. Support the clients IA programs by ensuring that existing and new systems are following industry best practices and specific government policies.

Requirements: Real world experience with the DoD C&A process. An understanding of risk management and the ability to properly convey the "true" threat of the risk to the client.

*DoD Security Clearance desired

Apply for this position

Position: Vulnerability Assessment Engineer

Description: Maintain IAVA patch database, track vulnerabilities and discrepancies coordinate response with client and external organizations, take appropriate corrective actions, Develop plan implement maintain operate manage and propose changes to the clients Vulnerability Assessment systems to include process, technical, administrative, configuration management, property accountability, total life-cycle support, Vulnerability Assessments, scanning protocols, and penetration testing.

Requirements: Proficient with various scanning/hacking tools.   Demonstrate the ability to check systems for more then what shows up on a report. A desire to not to be satisfied with someone else's word that it is secure.

*DoD Security Clearance desired

Apply for this position

Conscious Security is committed to equal employment opportunities in all employment actions to include recruitment, selection and hiring, promotions, terminations, training, and compensation actions without regard to race, color, religion, gender, national orientation, citizenship status, age, marital status, sexual orientation, physical or mental disability, or veteran status. As an Equal Opportunity Affirmative Action Employer, we participate in E-Verify to determine an individual's identity and employment eligibility to work in the United States. E-Verify is a service of DHS and SSA. For future details, please review our E-Verify Posting.

www.conscioussecurity.com | CAGE Code: 4DY30 | DUNS: 165427373