- Leidos (Whitehall, OH)
- …elements for effective threat detection, analysis, and mitigation as a SOC Security Analyst . + Education and experience requirements: + Level I: Bachelor's ... become available. **About the Role:** As a Cyber Security Analyst , you'll be on the front lines, defending Department...may be considered in lieu of a degree. + Level II: Bachelor's degree and 3 + years… more
- UIC Government Services and the Bowhead Family of Companies (Wright Patterson AFB, OH)
- **Overview** Bowhead is seeking a Cybersecurity Intrusion Detection Analyst to join our team in Wright Patterson AFB, OH. The Cybersecurity Intrusion Detection ... Analyst utilizes data collected from a variety of cyber...susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security… more
- Robert Half (Cincinnati, OH)
- JOB REQUISITION Americas Delivery Center - Financial Crimes Compliance Analyst LOCATION AMERICAS DELIVERY CENTER ADDITIONAL LOCATION(S) JOB DESCRIPTION You Belong ... We Care. We Collaborate. We Deliver . At every level , we champion leaders who live our values of...You Protiviti 's Americas Delivery Center is seeking an Analyst to join our financial crimes compliance competency .… more
- Northrop Grumman (Beavercreek, OH)
- …processes and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are an expert with ... closed. _This is an Information Systems Security Manager (ISSM) level opportunity. If you are ready to solve complex...to **Special Programs** as a condition of employment + 3 + years SAP RMF experience + Previously experience as… more
- Leidos (Whitehall, OH)
- …OH; or Hill AFB, UT on their on-site days. The Cyber Security Analyst /AWS Detection Engineer develops SIEM/SOAR capabilities to support the team's Cyber Security ... and threat reports to determine detection improvement opportunities. + Provide analyst training opportunities using test environments and emulations of malicious… more