
Gigamon Network Engineer Job at GuidePoint Security, LLC in Baltimore
GuidePoint Security, LLC, Baltimore, MD, United States
Gigamon Network Engineer
Locations available: JBAB (Bolling AFB), DC; Maryland Square, MD; Reston, VA; Quantico, VA.
An active Top Secret / SCI clearance with willingness to take and pass a polygraph exam is required for consideration for hire for this role. Work is to be performed 100% onsite with our Government Customer.
What You'll Get To Do
In this role the Gigamon Engineer is responsible for deploying, operating, and sustaining the Gigamon Deep Observability Pipeline across DIA-managed enclaves and mission networks, enabling full packet-level visibility to support intelligence community (IC) cybersecurity operations.
This position operates within a classified IC environment and requires close coordination with DIA cybersecurity, network operations, and mission partners. The engineer will support threat detection, anomaly analysis, and sensor grid expansion across high-priority intelligence networks, directly contributing to DIA’s ability to identify and respond to advanced persistent threats (APTs) and insider threats targeting national security systems.
With mentoring, challenging hands‑on problem‑solving, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers.
Roles & Responsibilities
Deploy, configure, and sustain GigaVUE HC-3, T-10, and HD-Series packet brokers; design TAP/SPAN architectures for full traffic visibility across classified and unclassified DIA network segments
Administer GigaVUE Fabric Manager (GFM) for policy management, traffic mapping, and tool load balancing; configure GigaSMART features including deduplication, slicing, masking, and application filtering
Integrate Gigamon outputs with DIA‑operated SIEM, IDS/IPS, and full‑packet capture platforms; ensure all deployments comply with RMF, ICD 503, and applicable DISA STIGs
Deliver enriched traffic feeds to DIA analytics platforms supporting threat hunting, anomaly detection, and APT/insider threat identification; assess and remediate sensor coverage gaps
Support SOC analysts and ISSM/ISSO personnel during incident response with packet‑level data and flow analysis across SIPRNET, JWICS, and coalition network segments
Architect and document Gigamon sensor grid topologies for evolving DIA segments including cross‑domain and coalition environments; lead design reviews, ECPs, and as‑built documentation
Develop SOPs and runbooks; brief findings and risk assessments to DIA government leads; mentor junior engineers on platform operations and IC cybersecurity practices
Required Qualifications
5-7 years of hands‑on experience in network engineering, network security engineering, or a closely related discipline within a DoD or IC environment
Demonstrated experience deploying and operating Gigamon appliances (GigaVUE HC, T‑Series, HD‑Series, or equivalent) in production networks
Experience designing and troubleshooting IP networks including routing protocols (BGP, OSPF), VLANs, spanning tree, and network segmentation
Experience supporting or operating within DoD or IC classified computing environments including SIPRNET, JWICS, or equivalent enclaves
Experience documenting network topologies and maintaining as‑built diagrams and configuration baselines
Proficiency with GigaVUE Fabric Manager (GFM) and Gigamon CLI for appliance configuration and policy management
Knowledge of packet capture and traffic analysis concepts including TAP/SPAN, deduplication, filtering, and flow metadata
Understanding of network security principles including firewalls, IDS/IPS, proxies, and zero‑trust architecture as applied to classified environments
Familiarity with SIEM platforms (Splunk, ArcSight, or equivalent) and how network visibility feeds enhance detection fidelity
Working knowledge of multi‑domain architectures: LAN, WAN, data center, and virtualized/SDN environments
DoD 8570 IAT Level II certification – one or more of the following required:
CompTIA Security+ CE
GIAC Security Essentials (GSEC)
Cisco CyberOps Associate / CCNA Security
CySA+, CND, or SSCP
DoD 8570 CSSP Infrastructure Support certification – must be obtained prior to start date:
Certified Ethical Hacker (CEH)
CompTIA CySA+, CND, or Cloud+
GIAC GICSP or SSCP
CHFI or CFR
Active Top Secret / SCI clearance with a current Counterintelligence (CI) Polygraph – required at time of hire; no exceptions
HS diploma or GED and 7+ years of experience with supporting IT projects and activities, Associate's degree and 5+ years of experience with supporting IT projects and activities, or Bachelor's degree and 3+ years of experience with supporting IT projects and activities
Preferred Qualifications
Gigamon Certified Engineer (GCE) or equivalent Gigamon product certification
Experience supporting DIA, NSA, or other IC agency network operations in a contractor or government role
Experience with DISA STIG implementation and RMF package development for network devices
Familiarity with full‑packet capture platforms (NetScout, Solera, Moloch/Arkime) integrated with Gigamon feeds
Linux OS administration experience (RHEL, CentOS) in support of network security tooling
Experience with SolarWinds NPM/IPAM or similar network management and IP address management platforms
Experience operating within ICD 503, CNSSI 1253, or DIA‑specific cybersecurity policy frameworks
Familiarity with virtualized network environments including VMware NSX, Hyper‑V, or cloud‑based visibility tools
Strong written and verbal communication skills with demonstrated ability to brief technical findings to senior government personnel
Self‑directed work ethic with the ability to manage competing priorities in a high‑tempo, mission‑critical environment
Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.
#J-18808-Ljbffr
Locations available: JBAB (Bolling AFB), DC; Maryland Square, MD; Reston, VA; Quantico, VA.
An active Top Secret / SCI clearance with willingness to take and pass a polygraph exam is required for consideration for hire for this role. Work is to be performed 100% onsite with our Government Customer.
What You'll Get To Do
In this role the Gigamon Engineer is responsible for deploying, operating, and sustaining the Gigamon Deep Observability Pipeline across DIA-managed enclaves and mission networks, enabling full packet-level visibility to support intelligence community (IC) cybersecurity operations.
This position operates within a classified IC environment and requires close coordination with DIA cybersecurity, network operations, and mission partners. The engineer will support threat detection, anomaly analysis, and sensor grid expansion across high-priority intelligence networks, directly contributing to DIA’s ability to identify and respond to advanced persistent threats (APTs) and insider threats targeting national security systems.
With mentoring, challenging hands‑on problem‑solving, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers.
Roles & Responsibilities
Deploy, configure, and sustain GigaVUE HC-3, T-10, and HD-Series packet brokers; design TAP/SPAN architectures for full traffic visibility across classified and unclassified DIA network segments
Administer GigaVUE Fabric Manager (GFM) for policy management, traffic mapping, and tool load balancing; configure GigaSMART features including deduplication, slicing, masking, and application filtering
Integrate Gigamon outputs with DIA‑operated SIEM, IDS/IPS, and full‑packet capture platforms; ensure all deployments comply with RMF, ICD 503, and applicable DISA STIGs
Deliver enriched traffic feeds to DIA analytics platforms supporting threat hunting, anomaly detection, and APT/insider threat identification; assess and remediate sensor coverage gaps
Support SOC analysts and ISSM/ISSO personnel during incident response with packet‑level data and flow analysis across SIPRNET, JWICS, and coalition network segments
Architect and document Gigamon sensor grid topologies for evolving DIA segments including cross‑domain and coalition environments; lead design reviews, ECPs, and as‑built documentation
Develop SOPs and runbooks; brief findings and risk assessments to DIA government leads; mentor junior engineers on platform operations and IC cybersecurity practices
Required Qualifications
5-7 years of hands‑on experience in network engineering, network security engineering, or a closely related discipline within a DoD or IC environment
Demonstrated experience deploying and operating Gigamon appliances (GigaVUE HC, T‑Series, HD‑Series, or equivalent) in production networks
Experience designing and troubleshooting IP networks including routing protocols (BGP, OSPF), VLANs, spanning tree, and network segmentation
Experience supporting or operating within DoD or IC classified computing environments including SIPRNET, JWICS, or equivalent enclaves
Experience documenting network topologies and maintaining as‑built diagrams and configuration baselines
Proficiency with GigaVUE Fabric Manager (GFM) and Gigamon CLI for appliance configuration and policy management
Knowledge of packet capture and traffic analysis concepts including TAP/SPAN, deduplication, filtering, and flow metadata
Understanding of network security principles including firewalls, IDS/IPS, proxies, and zero‑trust architecture as applied to classified environments
Familiarity with SIEM platforms (Splunk, ArcSight, or equivalent) and how network visibility feeds enhance detection fidelity
Working knowledge of multi‑domain architectures: LAN, WAN, data center, and virtualized/SDN environments
DoD 8570 IAT Level II certification – one or more of the following required:
CompTIA Security+ CE
GIAC Security Essentials (GSEC)
Cisco CyberOps Associate / CCNA Security
CySA+, CND, or SSCP
DoD 8570 CSSP Infrastructure Support certification – must be obtained prior to start date:
Certified Ethical Hacker (CEH)
CompTIA CySA+, CND, or Cloud+
GIAC GICSP or SSCP
CHFI or CFR
Active Top Secret / SCI clearance with a current Counterintelligence (CI) Polygraph – required at time of hire; no exceptions
HS diploma or GED and 7+ years of experience with supporting IT projects and activities, Associate's degree and 5+ years of experience with supporting IT projects and activities, or Bachelor's degree and 3+ years of experience with supporting IT projects and activities
Preferred Qualifications
Gigamon Certified Engineer (GCE) or equivalent Gigamon product certification
Experience supporting DIA, NSA, or other IC agency network operations in a contractor or government role
Experience with DISA STIG implementation and RMF package development for network devices
Familiarity with full‑packet capture platforms (NetScout, Solera, Moloch/Arkime) integrated with Gigamon feeds
Linux OS administration experience (RHEL, CentOS) in support of network security tooling
Experience with SolarWinds NPM/IPAM or similar network management and IP address management platforms
Experience operating within ICD 503, CNSSI 1253, or DIA‑specific cybersecurity policy frameworks
Familiarity with virtualized network environments including VMware NSX, Hyper‑V, or cloud‑based visibility tools
Strong written and verbal communication skills with demonstrated ability to brief technical findings to senior government personnel
Self‑directed work ethic with the ability to manage competing priorities in a high‑tempo, mission‑critical environment
Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.
#J-18808-Ljbffr