In business for more than 53 years, we excel in full-spectrum cyber, data collection & analytics, enterprise IT, systems engineering and software application development solutions that support national and homeland security. SECURITY CLEARANCE REQUIREMENTS:. ...
Through technical management and direction, the Sr Scheduling Data Analyst is mainly responsible for:. You must be able to obtain a DoD Interim Secret Security Clearance prior to starting this position. Security Clearance Statement:. This position requires a government security clearance, you must b...
Cybersecurity Operations Analyst II. TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment, and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA mission. C...
A company is looking for a Security Operations Analyst II. ...
Security+, GIAC Information Security Fundamentals (GISF), ISACA Cybersecurity Fundamentals Certificate, Certified Ethical Hacker (CEH), (ISC)² Systems Security Certified Practitioner (SSCP). You will report to a Cyber Security Manager and will be part of a team of Information Security professionals ...
A company is looking for an IAM & GRC Security Analyst. ...
TS/SCI Vulnerability Assessment Analyst. IAT Level 2 Certification CySA+, GSEC, Security+ CE. Experience conducting vulnerability scans and recognizing vulnerabilities in security systems. Insight Global is looking for a TS/SCI Vulnerability Assessment Analyst in Saint Louis, MO. ...
Key Responsibilities:Conduct security assessments to ensure compliance with policies and standardsImplement security controls and best practices in network and system designsAssist in incident response, investigation, and remediation of security issuesRequired Qualifications:Understanding of enterpr...
Seeking an Epic Security Analyst within 2. Under very limited supervision, this position will administer all aspects of the system security standards and profiles of the Epic system. Monitoring and auditing of security guidelines along with monitoring and auditing changes. Works closely with the Cus...
Your day-to-day responsibilities as an Information Security Risk Management Analyst will include assisting with IT risk management activities including some or all of: the entire IT risk lifecycle, security education and awareness, vulnerability management, third party risk management, policies and ...
Security Analyst to join their Security team. The team is currently working on becoming NIST compliant and is seeking a security analyst to help drive this process. This person will be work with the rest of the security team to evaluate security controls, policies and procedures to identify vulnerab...
The Information Security Office’s (ISO) vision is to realize a culture of security that manages risks, defends against threats, and integrates information security into business and technology. The Global Cyber Security (GCS) Team supports this vision through the detection, analysis, and mitigation ...
The Information Security Office’s (ISO) vision is to realize a culture of security that manages risks, defends against threats, and integrates information security into business and technology. The Global Cyber Security (GCS) Team supports this vision through the detection, analysis, and mitigation ...
The FRAI is a Tier 1 position in the Forensic Review Department.FRAls are responsible for completing non-violent, non-time-sensitive, and less complex reviews.This position requires strong attention to detail and critical/situational thinking skills.Written and verbal communication skills are a must...
QinetiQ US’s dedicated experts in defense, aerospace, security, and related fields all work together to explore new ways of protecting the American Warfighter, Security Forces, and Allies. Being a part of QinetiQ US means being central to the safety and security of the world around us. QinetiQ is lo...
Security/Remediation Analyst (App Sec) <br /> Duration: 6++ Months). Strong knowledge in security standards and practices for both on-premises and AWS environments; CCSP, CISSP, or other cloud-focused application security certifications are a big plus. MUST Have at least one current Certifica...
Security/Remediation Analyst (App Sec) for a client in the STL area. Some of this security analyst responsibilities include:. Investigating security breaches and other cybersecurity incidents. Partnering with security teams to improve data quality in security tools and external reports. ...
Completion of one of the following recognized professional certifications: QSA (Qualified Security Assessor), CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional), SSCP (Systems Security Certified Practitioner), Certified Ethical Hacker (CEH). Co...
The Information Security Office’s (ISO) vision is to realize a culture of security that manages risks, defends against threats, and integrates information security into business and technology. The Global Cyber Security (GCS) Team supports this vision through the detection, analysis, and mitigation ...
Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. ...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. ...
Louis, Missouri Title : Cyber security Testing Analyst Job responsibilities : Experience in Security Testing Actual Devsecops implementation and execution experience Should have implemented Security in CI / CD pipeline. Capable of providing security solutions to the customer for complex security tes...
Management Consulting and Digital Transformation Company is seeking a Vulnerability Assessment Analyst (Mid-level) that will perform assessments of systems and networks within a Government enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or lo...
Completion of one of the following recognized professional certifications: QSA (Qualified Security Assessor), CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional), SSCP (Systems Security Certified Practitioner), Certified Ethical Hacker (CEH). In...