Cyber Security Analyst, Senior. IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required. At ManTech International Corporation, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement. Performs security event and in...
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. ...
Northrop Grumman Space Systems (NGSP) is seeking a *Configuration Management **Analyst *in the Payload and Ground Systems Division Engineering organization supporting Integrated National Systems (INS) Business Unit (BU) in our Aurora, CO office. ...
Security Clearance Statement:. This position requires a government security clearance, you must be a US Citizen for consideration. ...
Northrop Grumman Space Systems is seeking a Property/Asset Management Analyst 2/3 to join our team of qualified, diverse individuals. Current DoD Secret level security clearance. Preferred Qualifications: * * Current DoD TS/SCI level security clearance. ...
The Multi-Function Information Systems Analyst assists users with resolving technical issues with applications, connectivity and other IT related issues. The Multi-Function Information Systems Analyst will assist with Information Assurance, performing environmental vulnerability scans, remediation o...
Northrop Grumman Space Systems is seeking an* Industrial Security Analyst (Level Two) or Principal Industrial Security Analyst (Level Three) *to work in our *Aurora, CO* location. Oversee classified security programs and provide expertise in all security functions in accordance with the DoD Special ...
Target Digital Network Analyst (TDNA). CACI is seeking Target Digital Network Analysts (TDNAs) to support core Intelligence Community (IC) missions at multiple locations. As a TDNA, you will be given the opportunity to showcase your SIGINT analysis talent and expertise while supporting missions that...
Cyber Threat Hunt and Pursuit Analyst. Cyber threats are evolving, and perimeter security and automated protection aren’t enough—it’s time to go threat hunting. We’re looking for an experienced Cyber Threat Hunt and Pursuit Analyst who can thi. Experience with reporting IT Security events and incide...
Integrated Operations (IO) Bridge Analyst (Clearance Sponsorship). Security+ or any DoD 8140 IAT certification or must obtain within 90 days. ...
A company is looking for a Workday Security Analyst. ...
Seeking an Epic Security Analyst within 2. Under very limited supervision, this position will administer all aspects of the system security standards and profiles of the Epic system. Monitoring and auditing of security guidelines along with monitoring and auditing changes. Works closely with the Cus...
Key Responsibilities:Develop deep understanding of security processes and procedures to serve as a subject matter expert on cybersecurity activitiesPartner with engineering teams to ensure adherence to product security program during product development phasesCollaborate with internal and external t...
The Analyst, Info Security-Cloud will work to promote and ensure the security of FirstBank's and its customers' data through the rigorous application of tools and skills for the purpose of intrusion/breach prevention, threat hunting, and incident response for cloud focused infrastructure and resourc...
A company is looking for a Sr Forensic Cyber Security Analyst - Remote. Key Responsibilities:Mentor analysts, provide training and guidance through complex incidentsIdentify deficiencies in processes and tools, make corrective recommendations, and drive implementation of solutions and efficienciesMo...
Work directly with other Systems Analysts, Project Managers, Sales, and Engineering resources to help design IT infrastructure supporting Physical Security and Audio Video solutions. The Systems Analyst will be responsible for delivering and maintaining the IT infrastructure that supports these plat...
This role is an InfoSec Analyst for a well-known client of ours. This is a great opportunity for someone with a few years of information security experience as well as cloud experience, specifically AWS. AWS - security knowledge and experience. ...
Security analysts should have experience in security technologies, system configurations, and a deep understanding of security policies and procedures. You will also work to perform risk assessments on current internal systems, as well as assess the security controls of current and proposed vendors ...
Cyber, Cyber analyst, CEH, Sec +, Security plus, CYSA, Linux, Windows, Analyst, Splunk, Colorado, Cleared roles, Cleared, Government, COTS, . Responsibilities for Cyber Security Analyst:. Qualifications for Cyber Security Analyst:. Cyber Security Certification (CEH, CISM, Security Plus, CYSA, Etc. ...
If you are interested in learning more about the Security Analyst opportunity, please submit your resume for consideration. This person will play a lucrative part in the company's information security practice. Monitor security tools and alerts. ...
Info Security Analyst – Cloud. This role is an InfoSec Analyst for a well-known client of ours. This is a great opportunity for someone with a few years of information security experience as well as cloud experience, specifically AWS. AWS – security knowledge and experience. ...
The Information Security Analyst is responsible for protecting the organization's information systems by identifying potential security threats, implementing robust security measures, and continuously monitoring for security breaches. Reporting to the Information Security Officer, the Information Se...
The role of the Sr Analyst - Data Security is to provide the analytical and technical support to advance the objectives of the Maximus Information Security Office - Data Governance and Security program, promote data policies and standards, and enhance the engagement of enterprise Data Owners and Dat...
Bachelor's Degree in Information Security and Assurance, Cyber Security, Computer Science, Software Engineering, Risk Management or maintain multiple security related credentials (Certified Incident Handler (GCIH), EC-Council Certified Incident Handler (ECIH), Certified Information Systems Security ...
Key responsibilities include conducting analyses of the threat environment and threats to the bank, including post incident analysis, applying a multi-faceted situational awareness of cyber security processes to protect against threats, and implementing proactive defensive actions for the security, ...