• Associate Security Analyst - SOC

    SHI (Richmond, VA)
    …alerts and events using various security tools and platforms. + Analyzing phishing attempts and social engineering tactics. + Conduct initial analysis of security ... incident management and response processes. Proficiency in identifying and analyzing phishing attempts and social engineering tactics. Other Requirements + Completed… more
    SHI (08/02/25)
    - Related Jobs
  • Red Cyber Operator

    Parsons Corporation (Fort Belvoir, VA)
    …+ Penetration Testing + Antivirus evasion, EDR evasion, offensive infrastructure, phishing and social engineering + Offensive cyber operations **What Required Skills ... (GWAP). + Expertise in antivirus evasion, EDR evasion, offensive infrastructure, phishing and social engineering campaigns, and/or penetration testing of critical… more
    Parsons Corporation (07/18/25)
    - Related Jobs
  • Email Security Expert

    ManTech (Herndon, VA)
    …Expert monitors, analyzes, and enhances email security to protect Networks from phishing , malware, and other cyber threats. They configure and optimize email ... email security solutions to protect email systems from cyber threats, including phishing , malware, and other email-borne attacks + Monitor and analyze email traffic… more
    ManTech (06/03/25)
    - Related Jobs
  • Cybersecurity Officer Lead (Supply Chain & Risk…

    Washington Metropolitan Area Transit Authority (VA)
    …effectiveness (detection, response, remediation of threats), employee training/effectiveness ( phishing , social engineering). + Oversees the cybersecurity components ... of the governance, risk and compliance (GRC) tool. Configures and populates the tool to enable security professionals to document a wide-array of controls. Creates and maintains inherited controls at the direction of the Authorizing Official. Supports audit… more
    Washington Metropolitan Area Transit Authority (08/08/25)
    - Related Jobs
  • Identity, Credential, and Access Management (ICAM)…

    SAIC (Chantilly, VA)
    …processes. 16. Multi-factor Authentication (MFA) Implementation: 17. Implement phishing -resistant MFA methods. 18. Prevent unauthorized access. 19. Credential ... Management: 20. Standardize issuance, management, and revocation processes. 21. Align with industry best practices and regulatory requirements (eg, NIST, FISMA). 22. Collaboration and Integration: 23. Work with internal teams to integrate ICAM technologies… more
    SAIC (08/07/25)
    - Related Jobs
  • Junior / Mid - Nirt SOC Analyst

    System One (Chantilly, VA)
    …vectors such as data exfiltration, DDoS, malware, insider risk, and phishing . + Experience with IT Infrastructure designs, technologies, products, and services. ... This should include knowledge of networking protocols, firewall functionality, host and network intrusion detection systems, operating systems, databases, encryption, load balancing, and other technologies. System One, and its subsidiaries including Joule,… more
    System One (08/03/25)
    - Related Jobs
  • (Cyber) Incident Management Analyst - Hybrid

    Nightwing (Arlington, VA)
    …incidents - Ability to prioritize incidents, investigate and describe tactics used in phishing campaigns, as well as recognize gaps in incident reporting - Knowledge ... of general attack stages (eg, foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) - Skill in recognizing and categorizing types of vulnerabilities and associated… more
    Nightwing (08/01/25)
    - Related Jobs
  • Cyber Incident Manager 3

    ARSIEM (Arlington, VA)
    …incidents + Ability to prioritize incidents, investigate and describe tactics used in phishing campaigns, as well as recognize gaps in incident reporting + Knowledge ... of general attack stages (eg, footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) + Skill in recognizing and categorizing types of vulnerabilities and associated… more
    ARSIEM (07/10/25)
    - Related Jobs
  • Red Cyber Operator

    EM Key Solutions, Inc. (Lorton, VA)
    …(GWAP). + Expertise in antivirus evasion, EDR evasion, offensive infrastructure, phishing and social engineering campaigns, and/or penetration testing of critical ... infrastructure, networking, IoT, and wireless devices. About IFT : Founded in 2022, IFT is a Service-Disabled Veteran-Owned Small Business (SDVOSB) specializing in Chemical, Biological, Radiological, and Nuclear (CBRN) defense, Weapons of Mass Destruction… more
    EM Key Solutions, Inc. (06/24/25)
    - Related Jobs
  • Sr. Penetration Tester

    CACI International (Chantilly, VA)
    …as MitIM, SQLi, covert channels, secure tunneling,pivot, socks proxies, infil/exfil of data, phishing , writing buffer overflows, fuzzing, etc. - ** ** **What You Can ... Expect:** **A culture of integrity.** At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to… more
    CACI International (06/21/25)
    - Related Jobs