Back to Search Results

Cybersecurity Engineer

Post Date

Mar 13, 2026

Location

Radford,
Virginia

ZIP/Postal Code

24141
US
May 15, 2026 Insight Global

Job Type

Contract

Category

Computer Engineering

Req #

RIC-2cbbc96e-0be4-4432-9258-166335e9bb76

Pay Rate

$56 - $70 (hourly estimate)

Job Description

Insight Global is seeking a Cybersecurity Engineer supporting a Federal Government Project for the DoD. This project is a containerized, Kubernetes-based, multitenant hosting environment for hosting Army enterprise and tactical applications. They are utilizing Kubernetes and potentially Red Hat OpenShift to implement a cloud-native, software-defined infrastructure across multiple global sites . The client provides value-added common and managed services built on top of the Kubernetes foundation that hosted Army applications will require. The client is a managed service provider (MSP) and hosting services provider for Army applications.

Position Duties:
• Deploy, configure, and manage cybersecurity tools for Kubernetes environments, including vulnerability scanners, runtime security tools, and compliance frameworks.
• Administer and oversee Kubernetes-native security tools, such as ACA S(Nessus), AESS(Army Endpoint Security System), Kube-Bench, Kube-Hunter, and Falco, to ensure cluster security and compliance .
• Implement and monitor Role-Based Access Control (RBAC) policies and Pod Security Standards (PSS) to enforce least privilege and workload isolation.
• Harden Kubernetes clusters and containerized workloads using industry best practices and DoD Security Technical Implementation Guides (STIGs).
• Perform regular container image scanning using tools like Trivy, Clair, or Anchore to identify vulnerabilities in container images.
• Conduct Infrastructure as Code (IaC) scanning for Kubernetes manifests, Helm charts, and Terraform scripts using tools like Checkov, KubeLinter, or Polaris.
• Ensure compliance with DoD RMF by using tools like Kube-Bench and OpenSCAP.
• Deploy, configure, and manage Security Information and Event Management (SIEM) solutions, such as Splunk or Elasticsearch, to monitor Kubernetes clusters and containerized workloads.
• Develop and integrate rules, queries, and dashboards to detect and respond to security incidents in real time.
• Monitor runtime security using tools like Falco, Sysdig Secure, or Aqua Security to detect anomalous behavior in containers and Kubernetes clusters.
• Collaborate with the Cyber Incident Response Team to investigate and remediate security incidents.
• Integrate security tools into the CI/CD pipeline to automate security scans for code, container images, and IaC configurations.
• Work with DevOps teams to implement security gates in the pipeline, ensuring that only secure and compliant workloads are deployed.
• Automate routine administrative tasks using tools like Ansible, Terraform, or scripting languages (e.g., Python, Bash).
• Collaborate with internal and external teams, including developers, Kubernetes administrators, and Army Cybersecurity Service Providers, to ensure security requirements are met.
• Review and respond to Army Cyber Tasking Orders (CTOs), ensuring timely implementation of required changes.
• Create and maintain documentation for security configurations and standard processes.
• Provide regular reports on the security posture of the Kubernetes environment, including vulnerability assessments and compliance status.
• Responsible for assessment of threats and vulnerabilities to organizational computing assets and developing/integrating rules, queries, and filtering techniques to produce meaningful risk analysis for responses.
• Coordinate with PL ALTESS team to ensure all devices and components report all relevant logs to the SIEM solution and perform troubleshooting of non-reporting assets.
• Work with a team to review Army Cyber Tasking Orders (CTOs), determine applicability and response, and incorporate required changes.
• Review proposed SIEM configuration changes for security impact.
• Interact with Army Cyber Security Service Providers and customer ISSOs/ISSMs on a regular basis.

The target pay rate for this position is between $55-70/hr and is based on years of experience and qualifications.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Required Skills & Experience

Required Skills:
• Expertise in securing Kubernetes clusters and containerized workloads.
• Experience with Kubernetes-native security tools, such as Kube-Bench, Kube-Hunter, Falco, or similar.
• Proficiency in container image scanning tools (e.g., Trivy, Clair, Anchore) and VM scanning tools like ACAS and AESS.
• Knowledge of Infrastructure as Code (IaC) scanning tools (e.g., Checkov, KubeLinter, Polaris).
• Experience with runtime security tools (e.g., Falco, Sysdig Secure, Aqua Security).
• Familiarity with DevSecOps frameworks and integrating security tools into CI/CD pipelines.
• Experience implementing and monitoring RBAC, Pod Security Standards (PSS), and network policies in Kubernetes.
• Familiarity with compliance frameworks such as CIS Benchmarks, NIST 800-53, and PCI DSS.
• Experience implementing, tuning, and monitoring SIEM solutions (e.g., Splunk, Elasticsearch).
• Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.
• Proficiency in automation tools like Ansible, Terraform, and scripting languages (e.g., Python, Bash).

Desired Skills:
• Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM).
• Basic understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A).


Required Certifications:
· DoD 8140 Cybersecurity ISSM (722 role or similar)
§ Resource must possess Baseline certification as defined in DoD Instruction 8570.01-M (generally Security+ CE).
· Must have (or obtain within 6 months of hire) a computing environment certification as defined in DoD 8570.01-M, such as:
§ Certified Kubernetes Security Specialist (CKS)
§ Certified Kubernetes Administrator (CKA)
§ Red Hat Certified Specialist in OpenShift Administration
§ Cloud Native Security Certification (CNSC)
§ GIAC Kubernetes and Cloud Security (GCKS)
§ AWS Certified Security – Specialty
§ Microsoft Certified: Azure Security Engineer Associate
§ Any other related certification to the role of this position

Clearance Required:
• DoD Secret

Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.