Skip to content
  Friday 12 December 2025
Trending
June 14, 2025Beware: Discord Invite Hijacking Leads to Crypto Wallet Theft July 8, 2024Cybersecurity Threat Senior Analyst- 3rd shift, onsite May 2, 2024Cybersecurity Consulting Manager – FedRAMP Services September 11, 2024CISA Adds Four Known Exploited Vulnerabilities to Catalog May 19, 2025CTEM: The Top Choice for CISOs in 2025! March 14, 2024Cybersecurity Operations Defense Analyst December 6, 2023AI Has the Ability to Manage Credit Card Cybersecurity Risks March 6, 2024VMware Releases Security Patches for Vulnerabilities in ESXi, Workstation, and Fusion September 8, 2025Intern – Cybersecurity (Hybrid: Onsite & Remote) March 13, 2025CISA Adds Two Known Exploited Vulnerabilities to Catalog
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Planner
Careers

Cybersecurity Planner

SecuredyouadmSecuredyouadm—May 26, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cybersecurity Operations Engineer

October 27, 2023

Cybersecurity Intern

May 2, 2024

manager, cybersecurity CSOC

August 3, 2025

Senior Data Protection Cybersecurity Engineer

January 1, 2025

Maximus is seeking a highly skilled Cyber Planner to support mission-critical cybersecurity operations for our Homeland Security Customer. This role requires expertise in developing, executing, and refining cyber plans, ensuring alignment with operational objectives, and collaborating with cross-functional teams to enhance cybersecurity readiness.This is an on-site position that requires a Secret Clearance.Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS057, T3, Band 6Job-Specific Essential Duties and Requirements:– Develop, maintain, and execute cybersecurity operational plans, strategies, and policies to support mission requirements.– Coordinate cyber operations planning efforts with internal teams, government agencies, and external stakeholders to enhance cyber resilience.– Conduct risk assessments, vulnerability analyses, and threat modeling to proactively address cyber threats.– Support incident response planning and develop contingency plans for cyber incidents.– Utilize cybersecurity frameworks such as NIST, DoD RMF, and MITRE ATT&CK to guide planning and execution.– Prepare and present briefings, white papers, and reports to leadership on cyber threats, response strategies, and operational planning.– Work with intelligence analysts and security teams to integrate threat intelligence into cyber planning activities.– Ensure compliance with cybersecurity regulations and best practices.– Support tabletop exercises and training programs to enhance cyber readiness.Job-Specific Minimum Requirements:– Active Secret clearance.– Due to federal requirements, all candidates must be US Citizens without Dual Citizenship to another country.– This is an on-site position at a government facility.– Requires presence on-site five days per week in Annapolis Junction, MD.– Candidates must reside within a commutable distance.– Participation in a rotational on-call schedule for emergency page-outs is required.– 8 + years of experience in cyber operations, cybersecurity planning, or related fields.– At least 4 years must include technical writing, preferably related to security.– Strong understanding of cybersecurity policies, frameworks, and risk management practices (e.g., NIST 800-53, DoD RMF).– Experience with cyber incident response, threat analysis, and operational planning.
– Proficiency in developing and implementing cybersecurity strategies and contingency plans.
– Strong written and verbal communication skills, with the ability to present complex technical concepts to leadership.Preferred Skills and Qualifications:– Experience in DoD, DHS, or Intelligence Community (IC) cyber operations.– Certifications such as: CISSP, CISM, CISA, CEH, or PMP.– Familiarity with cyber wargaming, red teaming, and cyber defense exercises.– Experience with cloud security, network defense, or emerging cyber technologies.#techjobs #clearance #APPCASTDTO #MT430Minimum RequirementsTCS057, T3, Band 6EEO StatementMaximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.Pay TransparencyMaximus compensation is based on various factors including but not limited to job location, a candidate’s education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus’s total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant’s salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cybersecurity Services Manager
Senior RMF/ISSO Cybersecurity Engineer
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Information System Security Officer (ISSO) L3

December 11, 20250
Careers

Cybersecurity SME

December 11, 20250
Careers

Cybersecurity Engineer

December 11, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

OpenPLC_V3 | CISA

December 12, 20250
Threat Advisories

Siemens Energy Services | CISA

December 12, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 12, 20250
Threat Advisories

Varex Imaging Panoramic Dental Imaging Software

December 12, 20250
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

December 12, 20250
Threat Advisories

Siemens SINEMA Remote Connect Server

December 12, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • OpenPLC_V3 | CISA
  • Siemens Energy Services | CISA
  • Johnson Controls iSTAR | CISA
  • Varex Imaging Panoramic Dental Imaging Software
  • CISA Adds One Known Exploited Vulnerability to Catalog

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures