- Global Dimensions (Fort Meade, MD)
- …with exciting opportunities in language/culture, training/education/instruction, IT, cyber security , and intelligence (analysts, CI, HUMINT, SIGINT, etc.). Global ... Dimensions is seeking a Senior All-Source Analyst (Production/MIDB) for a position at Fort Meade, near...assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional… more
- Marriott (Bethesda, MD)
- … security concepts: DOS, DNS Spoofing, ARP Poisoning, Firewalls, Intrusion Detection, Segmentation . Basic understanding of Vulnerability and Patch Management ... Type** Management This is a temporary position. Perform certification of Security Control attestations and evaluate the implementation of controls to support… more
- Exelon (Owings Mills, MD)
- …of education and work experience. + One or more of the following: GIAC Certified Intrusion Analyst GCIA, GIAC Certified Incident Handler GCIH + Knowledge of how ... daily basis. Communicate regularly with SOC Manager to provide updates on Security Monitoring posture. Designs, develops and implements cyber security … more
- Lincoln Financial (Annapolis, MD)
- …collects data and context necessary to initiate IR response. In addition, the analyst will be responsible for maintaining multiple security technologies for ... **The Role at a Glance** This position continuously monitors the alert queue; investigates security alerts; monitors health of security sensors and endpoints;… more
- ARSIEM (Annapolis Junction, MD)
- …impact on every client you work with. ARSIEM is currently looking for a Windows Security Researcher 3 . The positions will support one of our Government clients in ... Annapolis Junction, MD. Responsibilities + Perform security research against Windows technologies. + Demonstrate the latest...validate, deploy) + + Labor Category Requirements - CNO Analyst /Programmer 3 + Bachelor's degree and six (6) years… more
- Amentum (Fort Meade, MD)
- …Analysts 1-4 (CNDA) to use information collected from a variety sources (eg, intrusion detection systems, firewalls, network traffic logs, and host system logs) to ... it all. + Develop increasing expertise in networking protocols and architectures, cloud security , Internet of Things protocols, and advanced network security . +… more