Cyber Software Engineer - Incident Response (Contract)Location: Hybrid - 1 day/week onsite in Seattle, WA Duration: 6-month renewable... Read more
Location: Hybrid - 1 day/week onsite in Seattle, WA
 Duration: 6-month renewable contract
 Experience Level: 4+ years
Pay: 75 $/hr - 95 $/hr
We're seeking a Cyber Software Engineer to join our client's Incident Response & Security Engineering team. You'll design, develop, and test secure software and systems that enable rapid detection, response, and recovery from cybersecurity events. This role bridges incident response and secure software engineering, embedding security practices throughout the software development lifecycle (SDLC).
You'll work closely with incident responders, threat analysts, and DevSecOps engineers to automate response workflows, enhance detection tools, and strengthen the organization's security posture.
Key ResponsibilitiesDesign, build, and maintain custom tools and platforms supporting cybersecurity operations and incident response.
Integrate security controls and automation into CI/CD pipelines and the full SDLC.
Develop and test software that collects, processes, and analyzes security telemetry (e.g., from SIEM, EDR, or cloud logs).
Collaborate with IR and SOC teams to translate incident patterns into detection and response logic.
Conduct code reviews and threat modeling to ensure security is considered from design to deployment.
Contribute to post-incident engineering by implementing durable fixes and automating recurring mitigation tasks.
Document designs, code, and procedures to meet compliance and audit requirements.
Required Qualifications4+ years of professional experience in software engineering or DevSecOps.
Strong programming skills in Python, Go, or Java (Python preferred).
Experience building or maintaining security automation, detection, or response tools.
Familiarity with cloud environments (AWS, Azure, or GCP) and secure cloud architectures.
Working knowledge of incident response processes, including triage, containment, and remediation.
Understanding of secure coding practices, vulnerability management, and CI/CD security.
Solid grasp of networking, logging, and security telemetry (Syslog, CloudWatch, Splunk, etc.).
Preferred QualificationsExperience developing software in AWS environments (Lambda, S3, ECS, DynamoDB).
Background with infrastructure-as-code (Terraform, CloudFormation).
Exposure to forensics, malware analysis, or threat hunting tools and data.
Familiarity with container security (Docker, Kubernetes).
Security certifications such as GCIH, GCFA, OSCP, AWS Certified Security, or equivalent.
GCS is acting as an Employment Business in relation to this vacancy.
Read lessJob Title: Vulnerability Management Analyst (Contract) - Qualys SpecialistContract Duration: 12 Months (Possible Extension) Location: Tampa, FL (2... Read more
Contract Duration: 12 Months (Possible Extension)
 Location: Tampa, FL (2 Days a Week On-Site, Remote for Remaining Days)
 Industry: Financial Services
 Start Date: ASAP
We are seeking an experienced Vulnerability Management Analyst with deep expertise in Qualys for a 12-month contract opportunity with a leading financial services client based in Tampa, FL. This role will focus on vulnerability assessment and management, leveraging Qualys as the primary tool to identify, prioritize, and remediate vulnerabilities within the organization's environment.
The ideal candidate will have hands-on experience with Qualys Vulnerability Management, as well as strong knowledge of risk assessment methodologies, remediation strategies, and best practices for vulnerability management in financial services environments.
This is a hybrid role, with 2 days a week on-site in Tampa and the flexibility to work remotely the remaining days.
Responsibilities:Vulnerability Scanning & Assessment: Manage and conduct regular vulnerability scans using Qualys across the enterprise environment (network, systems, endpoints, and cloud infrastructure).
Risk Prioritization: Analyze scan results to prioritize vulnerabilities based on risk impact, business needs, and compliance requirements (such as PCI-DSS, SOX, GDPR, etc.).
Remediation Management: Work closely with internal teams (IT, Network, Security, and Development) to track and ensure timely remediation of identified vulnerabilities.
Qualys Configuration: Configure, tune, and optimize Qualys to ensure effective vulnerability scanning and reporting. Customize scanning profiles to suit different environments and requirements.
Patch Management: Assist in coordination of patch management cycles and ensure vulnerabilities related to unpatched systems are addressed promptly.
Reporting & Documentation: Create and maintain vulnerability reports and dashboards in Qualys for stakeholders at different levels. Document and report on remediation efforts and progress.
Collaboration with Cross-Functional Teams: Collaborate with the security operations, network teams, and IT departments to assess and reduce vulnerabilities that may pose significant risk to the organization.
Compliance Support: Support compliance initiatives and audits by ensuring that vulnerability management aligns with industry regulations and internal security policies.
Trend Analysis & Continuous Improvement: Monitor vulnerability trends, analyze data for recurring issues, and suggest improvements to the vulnerability management process.
Qualifications:Experience:
3+ years of experience in vulnerability management, with at least 1 year of hands-on experience with Qualys.
Experience in vulnerability scanning, risk assessments, and patch management, preferably in financial services or highly regulated environments.
Technical Skills:
Expertise with Qualys Vulnerability Management and the ability to configure, customize, and optimize scans and reporting.
Familiarity with network security principles, risk assessments, and compliance frameworks (e.g., PCI-DSS, SOX, NIST).
Experience with remediation strategies and patch management tools.
Basic knowledge of networking (e.g., TCP/IP, DNS, HTTP/HTTPS) and operating systems (Windows, Linux, etc.).
Familiarity with SIEM tools and integration with vulnerability management platforms.
GCS is acting as an Employment Business in relation to this vacancy.
Read lessSr Incident ResponderJob Type: Full-time, Contract Contract Duration: 6 Months (Renewable) Location: Remote (US-based) Industry: Telecommunications Start Date:... Read more
Sr Incident Responder
Job Type: Full-time, Contract
 Contract Duration: 6 Months (Renewable)
 Location: Remote (US-based)
 Industry: Telecommunications
 Start Date: ASAP
Job Summary:
We're working with a global enterprise seeking a Senior Incident Responder to join their Cyber Incident Response Team (CIRT). This role plays a critical part in responding to and containing security incidents, performing deep technical analysis, and strengthening incident response capabilities across the business.
You'll be joining a mature, well-resourced cyber function, collaborating with Threat Intel, SOC, and Engineering teams to detect, analyze, and respond to advanced threats in real time.
Key Responsibilities:
Lead investigations of complex cyber incidents involving malware, phishing, lateral movement, and potential data exfiltrationConduct forensic analysis on endpoints, servers, and network traffic using EDR and log analysis toolsWork closely with SOC analysts and Threat Hunters to validate, triage, and contain threatsDevelop and refine incident response playbooks, escalation processes, and threat detection rulesCoordinate response efforts across internal teams and third-party stakeholdersDeliver post-incident reports including root cause, lessons learned, and remediation recommendationsContribute to red/purple teaming efforts and tabletop exercisesProvide mentoring and technical guidance to junior team members
What We're Looking For
5-8+ years in cybersecurity with significant experience in incident response and digital forensicsStrong knowledge of Windows/Linux systems, network protocols, and attack techniques (MITRE ATT&CK)Experience using tools such as CrowdStrike, EnCase, Splunk, Wireshark, Volatility Velociraptor, etc.Familiarity with scripting or automation (Python, PowerShell, or Bash)Excellent written and verbal communication - ability to produce high-quality incident reportsStrong understanding of regulatory/compliance-driven environments (PCI, HIPAA, SOX, etc.)
GCS is acting as an Employment Business in relation to this vacancy.
Read lessSIEM Engineer (SPLUNK)Job Type: Full-time, Contract Contract Duration: 6 Months (Renewable) Location: Remote (US-based) Industry: Telecommunications Start Date:... Read more
SIEM Engineer (SPLUNK)
Job Type: Full-time, Contract
 Contract Duration: 6 Months (Renewable)
 Location: Remote (US-based)
 Industry: Telecommunications
 Start Date: ASAP
We are seeking a SIEM Engineer with expertise in Splunk to join a leading telecommunications customer in the United States for a 6-month renewable contract. This is a fully remote opportunity where you will play a crucial role in designing, implementing, and managing security information and event management (SIEM) systems, with a focus on Splunk.
As a Splunk SIEM Engineer, you will be responsible for configuring and maintaining the Splunk platform, conducting security event monitoring, and ensuring timely response to incidents. You will work closely with the cybersecurity team to enhance the security posture of the organization and contribute to real-time threat detection.
Responsibilities:Splunk Implementation & Configuration: Deploy, configure, and maintain Splunk Enterprise and Splunk Cloud environments for security use cases.
Security Event Monitoring: Use Splunk for security event collection, correlation, and analysis of logs from various sources (network, endpoint, and cloud environments).
Incident Response: Support incident detection, investigation, and response activities. Create alerts and dashboards to identify anomalies and potential threats.
Rule Creation & Tuning: Design, develop, and refine Splunk search queries, use cases, and security alerts to improve event detection and reduce false positives.
Data Normalization & Parsing: Create data inputs, custom log parsers, and manage complex data sources to ensure the proper ingestion of logs into Splunk.
Reporting & Dashboards: Develop and maintain security-related dashboards, visualizations, and reports for stakeholders.
Collaboration: Work closely with security analysts, network engineers, and other cross-functional teams to ensure seamless operations and threat intelligence sharing.
Documentation & Best Practices: Maintain comprehensive documentation for configuration, policies, procedures, and knowledge sharing.
Qualifications:Experience:
3+ years of hands-on experience with Splunk deployment, configuration, and administration in a production environment.
Proven experience in the telecommunications industry or similar complex, high-traffic environments.
Strong background in SIEM (Security Information and Event Management) with the ability to build effective detection and alerting mechanisms.
Technical Skills:
Splunk (Enterprise & Cloud)
Splunk Query Language (SPL) for building complex queries and dashboards.
Experience with log management and security event correlation.
Familiarity with security frameworks such as NIST, ISO 27001, and others.
Knowledge of network security principles, intrusion detection systems (IDS), firewalls, and cloud-based security solutions.
Experience integrating various data sources into Splunk (e.g., syslog, network devices, firewalls, cloud platforms).
Scripting knowledge (e.g., Python, Bash, PowerShell) for automation tasks is a plus.
GCS is acting as an Employment Business in relation to this vacancy.
Read lessSenior Embedded Engineer Denver, CO (hybrid)If you're a seasoned embedded systems expert with a passion for broadband technologies... Read more
Senior Embedded Engineer 
Denver, CO (hybrid)
If you're a seasoned embedded systems expert with a passion for broadband technologies and customer collaboration? Join us in shaping the future of connectivity!
We are looking for a Senior Embedded Engineer to support a two-phase product lifecycle involving DOCSIS 3.1 cable modems and RDK-B-based gateways. 
This is a customer-facing, onsite role with top most client in Denver, CO (hybrid)-ideal for someone who thrives in a hands-on, high-impact environment.
🔍 What You'll Do:
Support large-scale DOCSIS 3.1 modem deployments (Broadcom ECOS stack)
Transition to RDK-B gateway platforms
Triage and debug firmware, network, and backend issues
Collaborate daily with development team or engineers
Analyze logs, run SNMP queries, and support SIP/voice provisioning
🧠 What You Bring:
10+ years in broadband CPE or embedded systems
Deep DOCSIS 3.1 protocol knowledge
Experience with Broadcom stacks, ECOS middleware, and RDK-B
Strong Linux and debugging skills
Excellent communication and customer-facing experience
🎯 Top Skills:
DOCSIS 3.1 Protocol Expertise
Embedded Linux & Broadcom Stack Debugging
Customer-Facing Communication & Triage
If you're ready to take ownership, solve complex problems, and work directly with one of the top broadband client in the U.S., we want to hear from you!
Please share your resume at [email protected] and if you are not looking for new opportunities would request you to share with your community so that they can apply for jobs.
GCS is acting as an Employment Business in relation to this vacancy.
Read lessWe are looking for a Senior Data Scientist to join the AIOps team. In this role, you'll focus... Read more
We are looking for a Senior Data Scientist to join the AIOps team. In this role, you'll focus on applying machine learning and data science techniques to large-scale monitoring and alerting data-ensuring smooth, reliable video streaming experiences for millions of users.
This position is ideal for someone with a strong foundation in machine learning, and time series analysis, particularly in the context of IT operations, logs, and system performance data.
Key Responsibilities:Analyze large-scale monitoring data (logs, alerts, metrics) to identify system anomalies and predict issues.Build and deploy ML models (regression, classification, clustering) to improve alert accuracy and reduce noise.Perform time series analysis for proactive incident forecasting and event correlation.Work closely with IT Ops and DevOps teams to improve observability and operational response.Utilize Python or R to connect to various backend databases and work with raw data sources.Translate complex technical data into actionable insights for engineering and business teamsRequired Experience:5+ years of professional experience as a Data Scientist3+ years with direct AIOps experienceStrong proficiency in Python or R.Expertise in machine learning (regression, classification, clustering).Solid background in anomaly detection, time series analysis, and monitoring data.Experience working with infrastructure data (logs, alerts, system metrics).Ability to work with multiple database types and perform backend data analysis.Familiarity with AIOps tools and SRE/observability concepts.Nice to Have:Experience in video streaming or media platforms (e.g., understanding of buffering, video playback issues, etc.).Knowledge of AIOps platforms (e.g., New Relic, Prometheus).Experience with NLP for log analysis.Background in deep learning or predictive maintenance models.
This role is 100% remote
Apply now with your resume or email us directly at [email protected]
GCS is acting as an Employment Business in relation to this vacancy.
Read lessfor the following search criteria