- CACI International (Fort Meade, MD)
- …evolve and proliferate at a rapid pace, CACI is at the forefront of cyber network operations (CNO) and enabling information superiority. We help our customers ... Computer Network Defense Analyst (CNDA) Job Category: Information Technology Time Type:...cyber professionals. **Responsibilities:** As a Computer Network Defense Analyst (CNDA), you will: + Use information collected from… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and ... Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to...active TS/SCI security clearance will be required. Project Management Analyst 1 | Salary: $55,967.00 - 79,953.00 Project Management… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and ... Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to...active TS/SCI security clearance will be required. Business Process Analyst 1 | Salary: $55,883.00 - $74,000.00 Business Process… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and ... Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to...an active TS/SCI security clearance will be required. Financial Analyst 1 | Salary: $55,402.00 - 75,000.00 Financial … more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and ... Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to...an active TS/SCI security clearance will be required. Configuration Analyst 1 | Salary: $54,669.00 - $78,099.00 Configuration … more
- Huntington Ingalls Industries (Springfield, VA)
- …electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and ... Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to...active TS/SCI security clearance will be required. Industrial Security Analyst 1 - $59,023 -84,318 Industrial Security Analyst… more
- TekSynap (Fort Belvoir, VA)
- …II and CSSP Analyst Certifications (DoD 8140) **Overview** We are seeking a Cyber Security Analyst to join our Prime Contract with the Defense Threat ... cause, operational impact, and to enable rapid remediation and/or mitigation of cyber threats within the Enterprise Network through the investigation process. +… more
- CACI International (Fort Meade, MD)
- …evolve and proliferate at a rapid pace, CACI is at the forefront of cyber network operations (CNO) and enabling information superiority. We help our customers ... team of cyber professionals. **Responsibilities:** As a Digital Network Exploitation Analyst , you will: + Evaluate target opportunities using all source data to… more
- Meta (Washington, DC)
- **Summary:** Meta is seeking a Security Analyst to join the Global Security Operations team. The Analyst will serve on the front lines of Meta's Security ... that we encounter at Meta scale. **Required Skills:** Security Analyst - SDR Security Operations Responsibilities: 1....Science or related technical field, or equivalent experience in cyber security 11. 5+ years of professional experience in… more
- Cayuse Holdings (Arlington, VA)
- **Overview** The Case Management Analyst (CMA) supports the client's cyber incident report case management and workflows, as well as for the overarching process ... of ingesting, triaging, assigning, tracking, and closing cyber incidents reported. Cases are assigned to the client's components to work with affected entities and… more