More jobs:
Network Security Engineer; Secret Clearance Security Clearance
Job in
San Diego, San Diego County, California, 92101, USA
Listed on 2026-03-14
Listing for:
Zachary Piper Solutions, LLC
Full Time
position Listed on 2026-03-14
Job specializations:
-
Engineering
Cybersecurity, Systems Engineer, IT Specialist -
IT/Tech
Cybersecurity, Systems Engineer, IT Specialist
Job Description & How to Apply Below
Zachary Piper Solutions is seeking a Network Security Engineer to support Naval Intelligence Warfare Command in San Diego, CA. The customer is seeking an individual with expertise across red team operations and networking to support a Research, Development, Test, and Evaluation network by assessing the current state of services and infrastructure supporting the command. Clearance:
Secret required
Location:
San Diego, CA (100% on-site) This job opens for applications on 3/13/2026. Applications for this job will be accepted for at least 30 days from the posting date Responsibilities of the Network Security Specialist:
* Conduct penetration testing across diverse applications using tools such as Burp Suite.
* Perform proof-of-concept evaluations on emerging exploits to assess potential vulnerabilities within supported networks.
* Maintain and monitor signature-based scanning tools to ensure continuous and reliable operation.
* Draft, review, and maintain Standard Operating Procedures (SOPs) and Proofs of Concept (POCs) to standardize processes, accelerate solution validation, and support audits.
* Administer, harden, and patch Windows and Linux servers, workstations, and network appliances in production and lab environments.
* Support network services (DNS, DHCP, NTP, VPN) and assist with routine configuration/maintenance of switches and routers.
* Automate common Linux tasks using Bash and Python; write reusable scripts for monitoring, backups, and configuration checks.
* Conduct vulnerability discovery, triage, and remediation tracking across servers, workstations, applications, and network devices.
* Perform authenticated/unauthenticated web application assessments using Burp Suite (Proxy, Repeater, Intruder, Scanner).
* Analyze network traffic flow across OSI layers; identify misconfigurations, bottlenecks, and security gaps.
* Document network diagrams, data flows, and trust boundaries; propose segmentation and ACL improvements.
Qualifications of the Network Security Specialist:
* Bachelors degree in related discipline and 3+ years of related experience
* Active Secret clearance required
* One of the following certifications(CySA+, Sec+CE, GSEC, GIAC) AND MCSA, Linux+ or equivalent environment certification
* Experience administering Linux/Windows servers
* Experience as a network administrator, familiar with OSI network model and traffic flow
* Scripting experience using Power Shell, Bash, Python
* Experience with virtual machines (vSphere, Virtual Box, KVM)
* Knowledge of Burp Suite security tools and Kali Linux tools (nMap, TCPDump, Wireshark)
Compensation for the Network Security Specialist:
* Total compensation based on experience level - $110,000-$120,000+
** based on degree and total years of experience*
* * Full Benefits: PTO/Holidays, Cigna Medical, Dental, and Vision, 401k with ADP
* Long-term program
* Contract stability and mobility through Zachary Piper Solutions
#LI-MK1 #LI-Onsite /sci, top secret/sci, opentowork, hiring, w2, onsite, firewalls, cisco, Navy, Marine corp, Army, DoD, secret, topsecret, top secret, exploit development, threat emulation, adversary simulation, network hardening, firewall configuration, intrusion detection, intrusion prevention, SIEM monitoring, incident response, packet analysis, traffic inspection, access control management, identity and access management, Windows Server administration, Linux administration, domain security, Active Directory security, GPO enforcement, network segmentation, router and switch configuration, ACL management, VPN security, encryption protocols, TCP/IP analysis, OSI model expertise, Wireshark packet capture, nmap scanning, reconnaissance techniques, privilege escalation, lateral movement analysis, log analysis, endpoint security, cloud security fundamentals, security automation, Bash scripting, Power Shell scripting, Python scripting, vulnerability remediation, security compliance, STIG implementation, SOC collaboration, threat intelligence integration, security policy enforcement, risk mitigation, exploit validation, secure configuration baselines.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×