About this role
DESCRIPTION
Join a team where innovation meets mission. Our AI, cloud, cyber, and modernization solutions save agencies thousands of hours, safeguard national security, and strengthen health and humanitarian missions worldwide. With 1,700+ team members, 1,500+ AI/data experts, and 100+ prime contracts, we deliver at scale and with purpose.
We’ve been recognized as a Top Workplace by the Washington Post for six straight years and named to the Inc. 5000 Fastest Growing Private Companies 13 of the past 14 years. Credence is a welcoming home for those looking to grow and contribute to positive change. We encourage all employees to expand beyond their boundaries, dive into important world-changing Federal challenges.
POSITION SUMMARY
Credence has an immediate need for a mid-level Cybersecurity Engineering professional to support government cybersecurity oversight and the onboarding of new tools for government customers. In this role, you will lead a security team responsible for daily Security Operations (SecOps) activities, including proactive threat hunting, continuous monitoring and analysis of security alerts, vulnerability management across both on-premises and cloud environments, and formal reporting to the program management office and government stakeholders. Additionally, the qualified candidate will provide oversight of certification and accreditation (C&A) activities for existing technologies as well as new tools and platforms introduced into the target environment, ensuring alignment with federal cybersecurity and compliance requirements.
RESPONSIBILITIES
Ensure the architecture and design of cloud-hosted IT systems are secure and meet DoD requirementsReview Cloud security policy and provide recommendations for improvement to enhance the security posture within the cloud as well as the ability to meet protection, detection, monitoring, and response requirements for systems and dataApply knowledge of current advances in cloud security engineering and cloud security threats to provide support for the deployment of programs and applicationsProvide input to programs throughout the process of deployment to ensure systems meet DoD compliance requirementsProvide guidance to assessment staff in the performance of Cybersecurity Vulnerability Assessments as related to cloud hosting environmentsLead and mentor a cybersecurity team by providing technical leadership, strategic direction, and day-to-day management of security operations in support of mission and program objectivesExecute certification and accreditation (C&A) activities, including detailed review and validation of security artifacts within Governance, Risk, and Compliance (GRC) tools to ensure compliance with applicable federal frameworks and policiesManage, prioritize, and oversee cybersecurity incidents, findings, and remediation activities, ensuring timely investigation, escalation, resolution, and reporting in accordance with established SLAs and program requirementsAssess and evaluate novel and emerging technologies for security compliance, risk posture, and operational suitability prior to deployment within government environmentsEnsure compliance with vulnerability management processes by overseeing continuous scanning, analysis, prioritization, remediation, and verification across on-premises systems and cloud-based infrastructureReview, track, and execute Plans of Action & Milestones (POA&M), coordinating with engineering teams, system owners, and government stakeholders to mitigate risk and close findings within required timelinesProvide technical guidance and oversight for cloud security implementations, including secure architecture design, control inheritance, boundary definitions, and integration with enterprise security toolingSupport the implementation and maturation of Zero Trust tenants and architectures, ensuring alignment with federal Zero Trust principles, reference architectures, and agency-specific guidanceProvide ongoing analysis and guidance on the evolving cyber threat landscape, including adversary tactics, techniques, and procedures (TTP), to support proactive defense and risk-based decision-makingThreat AnalysisConduct continuous threat analysis to identify, classify, and prioritize risks using frameworks such as MITRE ATT&CK, STRIDE, and Kill ChainTranslate threat intelligence into actionable engineering requirements and controlsPerform threat modeling on new architectures, systems, and featuresArtificial Intelligence (AI)Develop, deploy, and maintain AI/ML‑powered threat detection models to identify anomalies, malware, and intrusion attemptsIntegrate AI‑driven technologies into SIEM/SOAR platforms to enhance automated investigation and response workflowsAnalyze large, complex datasets to train, tune, and optimize models for threat classification and behavioral detectionBuild and support behavior‑based monitoring systems using AI for user activity, network traffic, and endpoint telemetryConduct model testing, validation, and adversarial robustness assessments to ensure resilience against evasion techniquesAutomate alert triage, event correlation, and log analysis using AI‑enabled pipelines and scriptingGather, preprocess, and label cybersecurity data used to train ML models and improve detection capabilitiesEvaluate generative AI tools for secure code review, vulnerability scanning, and configuration analysisImplement AI governance and model‑monitoring practices, ensuring compliance with security and ethical guidelinesCollaborate with security analysts, data scientists, and engineering teams to embed AI capabilities into existing security solutionsRequirements
Must possess IT-I Critical Sensitive security clearance/ Tier 5 (T5) with the ability to maintain eligibility throughout employmentBachelor’s degree in Computer Science, Information Technology, Business, or a related field, with relevant professional experience considered in lieu of formal education where appropriate5+ years of progressive experience in cybersecurity, including demonstrated success supporting or leading security operations, compliance initiatives, and complex enterprise security implementationsProven expertise with GRC platforms such as eMASS, Archer, ArcAngel, or similar tools, including experience managing security controls, compliance artifacts, assessments, and authorization packagesAt least two (2) years of experience achieving ATOs in a cloud environment (e.g., OCI, AWS, GCP, Azure)At least five (5) years of experience achieving ATOs for compartment DoD IT systemsMust possess a current Cloud certification (e.g., OCI, AWS, GCP, Azure)Extensive knowledge of FedRAMP assessment methodologyProven experience working with OCI and enterprise DoD ITStrong hands-on experience with cybersecurity operations, including incident response, threat detection, vulnerability management, and continuous monitoring in regulated or government environmentsExperience working within the Software Development Life Cycle (SDLC), including integration of security controls, documentation, and risk management activities across all phases of developmentFamiliarity with Agile and DevSecOps methodologies, and the ability to collaborate effectively with engineering, operations, and program management teamsSolid understanding of enterprise cybersecurity architectures, security control implementation, access control models, and data protection principles in on-premises, cloud, and hybrid environmentsExcellent problem-solving, analytical, and communication skills, with the ability to translate complex technical and risk concepts into clear, actionable guidance for non-technical stakeholdersDemonstrated ability to work independently and collaboratively in a fast-paced, mission-driven environment while managing competing priorities and maintaining attention to detailThreat AnalysisAbility to conduct threat modeling using frameworks such as MITRE ATT&CK, STRIDE, PASTA, or Kill ChainSkilled in identifying, categorizing, and prioritizing threats across systems, applications, and architecturesExperience analyzing adversary TTPs and developing attack pathsAbility to translate threat intelligence into security requirements, mitigations, and engineering controlsStrong capability to assess threat likelihood, severity, and business impactExperience applying threat analysis within architecture reviews, design sessions, and security assessmentsProficiency with threat modeling tools (e.g., Microsoft Threat Modeling Tool, IriusRisk, ThreatModeler)Strong written communication skills for producing threat assessment reports and documentationAbility to lead or actively contribute to cross‑functional threat modeling discussionsCommitment to tracking emerging threats and integrating them into ongoing engineering processesArtificial Intelligence (AI)Strong understanding of machine‑learning fundamentals, including classification, clustering, anomaly detection, and feature engineeringExperience with AI/ML frameworks such as TensorFlow, PyTorch, Scikit‑learn, Keras, or similar toolsSolid knowledge of cybersecurity principles, threat models, malware behavior, and attack techniquesExperience implementing or managing AI‑based security platforms (e.g., CrowdStrike, Darktrace, Microsoft Security Copilot, Microsoft Sentinel)Ability to evaluate and interpret model performance metrics (precision, recall, F1 score, ROC‑AUC, etc.)Familiarity with adversarial machine learning and techniques used by attackers to bypass AI modelsStrong Python scripting skills for automation, data analysis, and ML model developmentExperience working with big data and log‑analytics platforms (e.g., Splunk, Elastic Stack, Kafka)Demonstrated ability to automate security processes using AI models or scripting workflowsUnderstanding of AI risk management, governance, and compliance frameworks, such as NIST AI RMF Benefits
Health Care Plan (Medical, Dental & Vision)Retirement Plan (401k, IRA)Life Insurance (Basic, Voluntary & AD&D)Paid Time Off (Vacation, Sick & Public Holidays)Family Leave (Maternity, Paternity)Short Term & Long Term DisabilityTraining & DevelopmentWork From HomeFree Food & SnacksWellness Resources
