- SMX (Fort Belvoir, VA)
- Data Analyst (4177) (TS/SCI) (Ft. Belvoir, VA)at SMX(View all jobs) (https://www.smxtech.com/careers/) Fort Belvoir, VA SMX is seeking a **Data Analyst ** to ... and situational awareness to cybersecurity analysts and stakeholders. The Data Analyst shall utilize the GISA Governance Board determined Security Information and… more
- ManTech (Herndon, VA)
- **ManTech** seeks a motivated, career and customer-oriented **Cyber Security Forensics Analyst ** to join our team in the DC, Maryland, and Virginia (Northern) **DMV ... . In this role you will be responsible for conducting advanced digital forensics investigations, analyzing cyber threats, and developing strategies to mitigate… more
- SMX (Fort Belvoir, VA)
- Vulnerability Analyst (4274) (TS/SCI) (Ft. Belvoir, VA)at SMX(View all jobs) (https://www.smxtech.com/careers/) Fort Belvoir, VA SMX is seeking a **Vulnerability ... Analyst ** to perform regular vulnerability assessments and scans of...Research and report on new threats, attack vectors, and exploitation methods, demonstrating a thorough understanding of cyber threat… more
- Leidos (Alexandria, VA)
- …cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). + ... **Description** Leidos' Digital Modernization sector is seeking SOC Analysts to...starting. + Must be able to obtain DoD 8570 CSSP- Analyst certification (such as CEH, CySA+, GCIA, etc.) within… more
- Leidos (Ashburn, VA)
- …have at minimum ONE of the following certifications: + CompTIA Cyber Security Analyst (CySA+) + CompTIA Linux Network Professional (CLNP) + CompTIA Pentest+ ... **Description** The Leidos Digital Modernization Team is seeking a Incident Response...+ GWEB - Web Application Defender + GNFA - Network Forensic Analyst + GMON - Continuous… more
- General Dynamics Information Technology (Chantilly, VA)
- …of related experience **US Citizenship Required:** Yes **Job Description:** Database Analyst Advisor A qualified Data Exploiter reviews, manipulates, triages, and ... operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will… more