• Threat Hunt Intelligence Analyst - Black…

    Lumen (Montgomery, AL)
    …This position will work alongside advanced security researchers, data engineers, and malware reverse engineers, and help mentor analysts, engineers, and data ... Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots. This is a close-knit,… more
    Lumen (05/09/25)
    - Related Jobs
  • Cyber Capability Developer/Programmer…

    BAE Systems (Huntsville, AL)
    **Job Description** BAE Systems is looking for a Cyber Capability Developer/Programmer Analyst Senior to join a strong team supporting our government customer. As a ... your skills and grow in your career. The Cyber Capability Developer/Programmer Analyst Senior will: + Possess professional experience related to cyber intrusions and… more
    BAE Systems (04/24/25)
    - Related Jobs
  • Cyber Capability Developer/Programmer…

    BAE Systems (Huntsville, AL)
    **Job Description** BAE Systems is looking for a Cyber Capability Developer/Programmer Analyst Subject Matter Expert (SME) to join a strong team supporting our ... your skills and grow in your career. The Cyber Capability Developer/Programmer Analyst SME will: + Possess professional experience related to cyber intrusions and… more
    BAE Systems (04/24/25)
    - Related Jobs
  • Security Operations Center (SOC) Analyst

    COLSA Corporation (Huntsville, AL)
    …to detection strategies. + Strong foundation in host- and network-based forensics, malware analysis, or reverse engineering. Applicant selected will be subject ... is seeking a highly motivated and technically skilled SOC Analyst to support a dynamic Watch Floor Team. This...mitigating cyber threats in enterprise environments. As a SOC Analyst , you will be on the front lines of… more
    COLSA Corporation (05/04/25)
    - Related Jobs
  • Cyber Capability Developer

    Aetos Systems, Inc. (Huntsville, AL)
    …analysis of technical data, and a strong applied knowledge of forensic, network, and malware analysis. The ideal candidate will have a proven track record of working ... include: + Analyzing cyber threat data, including malicious software reverse engineering, network traffic analysis, memory forensics, and disk forensics… more
    Aetos Systems, Inc. (04/25/25)
    - Related Jobs