As a Senior Cyber Threat Analyst with our Intel Division, you will identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities. BlueHalo is a...
We are ranked as one of Computerworld 's Top Places to Work in IT 5 years running, and we are seeking a Cyber and Information Systems Security Analyst that. As a Cyber and Information Systems Security Analyst/ISSO, you will. Are you passionate about cybersecurity operations and policy?. You will joi...
Provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Provide enterprise-wide cybersecurity, threat anal...
Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make...
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. In-depth knowledge of network and application protocols, cyber vulnerabilities and exp...
Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make...
Clear Ridge Defense is seeking TS/SCI cleared professionals to serve as Cyber Security Fusion Analysts in Fort Meade, MD. Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense...
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. In-depth knowledge of network and application protocols, cyber vulnerabilities and exp...
Plex Solutions, LLC is looking for an Expert level Cyber Security Analyst to work in the Chantilly, VA area to work on exciting cybersecurity work. ...
Education Details: Computer Science, Cyber Security, Information Technology, or related field. Knowledge of cyber security related risk management techniques. The Third-Party Risk Analyst will be responsible for collaborating with internal and external vendor teams to assess, monitor, and manage ris...
Cyber Security Analyst to join their rapidly growing team!. ...
Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make...
Description Are you searching for challenging and impactful work supporting Highly Classified networks? Are you passionate about cybersecurity operations and policy? If so, we're looking for someone like you to apply and join our team at APL! We are ranked as one of Computerworld 's Top Places to Wo...
The Android Computer Network Operations (CNO) Developer will work on an exciting program developing cyber tools, techniques and integrated effects in an effort to improve national security. We maintain a team of cybersecurity experts committed to protecting complicated data and distribution systems ...
Provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Provide enterprise-wide cybersecurity, threat anal...
The Lead CyberSecurity Analyst is responsible for the monitoring, detection, and analysis of security threats against the distributed enterprise network. The selected candidate should have proven experience and the ability to leverage Computer Network Defense/Blue Team (CND) analyst toolsets to dete...
The Cyber Incident Response Analyst is responsible for responding to both existing and emerging threats, as well as identifying attacker tools, tactics, and procedures by analyzing data from a variety of sources and tools. Through a strong understanding of attacker behavior, participates in and mana...
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. In-depth knowledge of network and application protocols, cyber vulnerabilities and exp...
Background in cyber offensive and defensive cyber methodologies. U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. In addition, it may also include eng...
Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. In-depth knowledge of network and application protocols, cyber vulnerabilities and exp...