- Leidos (Alexandria, VA)
- …of security architecture, system hardening, vulnerability management, and intrusion detection /prevention + **Level II:** + Bachelor's degree (IT-related field ... proficiency in security architecture, system hardening, vulnerability management, and intrusion detection /prevention Come break things (in a good way). Then build… more
- Lumen (Richmond, VA)
- …attacker tools, techniques, and procedures (TTPs) with a goal of automating detection . -Work with cyber operators, when requested, to conduct in-depth investigations ... on cyber threat activity and provide mitigation guidance. -Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana -Build and maintain trust relationships with other intelligence teams, law… more
- Nightwing (Sterling, VA)
- …enterprise and determine possible causes of alerts - Provide timely detection , identification, and alerting of possible attacks/intrusions, anomalous activities, and ... misuse activities and distinguish these incidents and events from benign activities - Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity - Analyze identified malicious activity to determine… more
- Huntington Ingalls Industries (Alexandria, VA)
- …access control systems, surveillance technologies, perimeter protection, and intrusion detection . * Conduct comprehensive risk assessments and vulnerability analyses ... of facilities, infrastructure, and operations. * Collaborate with Facility Security Officers (FSOs), IT security, and executive leadership to ensure a holistic and compliant security posture. Lead audits and inspections; prepare mitigation plans and corrective… more
- Global Dimensions (Quantico, VA)
- …including OPIR, Moving Target Indicator (MTI), Photogrammetry, and Light Imaging Detection and Ranging (LIDAR). + Offer technical analytical expertise in support ... of the USMC National Geospatial-Intelligence Program-funded Full Spectrum GEOINT (FSG) analysis and production program. + Provide recommendations for operational GEOINT architectures and FSG guidance to analysts, operators, and managers on processes,… more
- Tyto Athene (Ashburn, VA)
- …advanced threats. + Conduct host- and network-based forensics, including intrusion detection , incident response, and malware analysis. + Develop, refine, and support ... security content such as signatures, detection rules, and other defensive measures. + Create scripts...7 years' experience as a Tier III senior cybersecurity analyst performing intelligence analysis, collection management, and technical analysis.… more
- Tyto Athene (Ashburn, VA)
- …intrusions, malware, and suspicious activity. + Develop and refine threat detection content, including custom signatures, rules, and advanced analytics. + Interpret ... of experience as a Tier III Cyber Threat Hunt Analyst conducting advanced threat hunting and forensic analysis. +...domains including: + Host and network forensics + Intrusion detection and analysis + Malware identification and reverse engineering… more
- Amazon (Arlington, VA)
- …a team of world class security practitioners and develop novel threat detection and mitigation strategies. Our Threat Hunting team hunts for adversarial activity ... will evaluate threat actor tactics, techniques, and procedures (TTPs) for threat detection opportunities. - You will design, develop, and deploy early-stage threat … more
- William C Brown Inc (Springfield, VA)
- …and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security ... Documents tickets and analysis to a level of detail sufficient to reconstruct the analyst 's analysis, to include but not limited to the steps taken, timelines, and… more
- Tyto Athene (Ashburn, VA)
- …and lessons learned to identify improvement opportunities + Develop or tune detection rules or signatures to improve the effectiveness of security monitoring and ... including: + Host-based and network-based monitoring + Insider threat detection tools + Host-based forensic tools + SIEM platforms...Systems Security Professional + GCFA - GIAC Certified Forensic Analyst + GCFE - GIAC Certified Forensic Examiner +… more