- ManTech (Herndon, VA)
- **ManTech** seeks a motivated, career and customer-oriented **Senior Security Operations Center Analyst ** to join our team in the **DC, Maryland, and Virginia (DMV) ... area** . The successful candidate will provide cyber threat analysis and reporting to support SOC and...IDS & IPS, Web security, antispam, etc. + Conduct malware analysis in out of-band environment (static and dynamic),… more
- Tyto Athene (Fort Belvoir, VA)
- …GICSP, GSEC, Security+ CE, or SSCP certification. + DoD 8140 Compliant for CSSP Analyst : Obtain a CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, ... **Description** Tyto Athene is searching for a **Security Operations Center Analyst ** to support the customer Enterprise Cybersecurity Operations Support Team,… more
- TekSynap (Fort Belvoir, VA)
- …+ Host-based Antivirus + Data Loss Prevention (DLP) + Vulnerability Management + Forensics + Malware Analysis + System/Device Hardening + Understanding of ... CE + Cisco Certified Network Associate (CCNA) + COMPTIA Cybersecurity Analyst (CySA+) + Global Information Assurance Certification (GIAC) Global Industriel … more
- Insight Global (Reston, VA)
- Job Description Summary: We are seeking a highly motivated and experienced Cyber Security Specialist to support swing and night shift operations within our 100% ... endpoint and infrastructure-level issues affecting EDR visibility. Conduct digital forensics during incident response by acquiring, preserving, and analyzing… more
- System One (Rockville, MD)
- …incident response, cyber threat hunting, red team exercises, digital forensics , malware analysis, and adversary simulation-ensuring timely response to ... Engineering, 24x7x365 SOC Monitoring and Alert Triage, Incident Response, Digital Forensics , Malware Analysis, Vulnerability Management, Data Protection, Secure… more
- ManTech (Herndon, VA)
- …Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), GIAC Certified Intrusion Analyst ... identified threats. + Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in… more