- Tyto Athene (Fort Belvoir, VA)
- …Vulnerability Management (IAVM) and DISA VDP Reviews + Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable ... With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence , Space, National Security, Civilian, Health, and Public Safety clients across the… more
- General Dynamics Information Technology (Fairfax, VA)
- …with the ability to diagnose and resolve complex network issues. + Threat intelligence experience (consumption, presentation, and enforcement of indicators) + ... mission services to every major agency across the US government, defense and intelligence community. Our 30,000 experts extract the power of technology to create… more
- CareFirst (Washington, DC)
- …+ Collaborates with the security community to obtain technical cyber threat intelligence . Researches emerging information security threats, vulnerabilities, and ... their countermeasures. + Leads the implementation of strategies for the detection and reporting of day-to-day security incidents. + Participates in the development of quality assurance policies. **SUPERVISORY RESPONSIBILITY:** Position does not have direct… more
- ManTech (Washington, DC)
- …DoD 8500 series, DoD Cybersecurity Test & Evaluation (T&E), Cyber Threat Intelligence , Navy Cybersafe, Navy Information Assurance /Technical Authority ... Board standards and NAVSEA Enclave policy + Support efforts in cybersecurity for the definition of system security requirements, risk assessments, systems analysis, systems design, cybersecurity T&E, assessment and authorization + Provide cybersecurity Risk… more
- Google (Washington, DC)
- …potential threats to organizational systems and data by gathering and analyzing threat intelligence from sources. This will include conducting vulnerability ... assessments, developing remediation plans, and collaborating with various teams to ensure comprehensive security integration. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment… more
- Lumen (Washington, DC)
- …SIEM, XDR, endpoint protection, cloud security, identity & access management, and threat intelligence . + Technical Skills: Proficient in translating technical ... concepts into clear and engaging marketing content. Strong technical understanding of networking concepts, protocols, and infrastructure. Proficiency in creating technical documentation and marketing materials. + Leadership Skills: Demonstrated ability to lead… more
- SHI (Washington, DC)
- …+ Design and present security operations architectures (SIEM, SOAR, EDR, XDR, threat intelligence ) + Contribute to practice development by identifying areas ... for growth, leading innovation initiatives, and creating and maintaining practice standards + Build and maintain strong relationships with key clients, ensuring high levels of satisfaction and retention through product briefings, demonstrations, knowledge… more
- The MITRE Corporation (Bethesda, MD)
- …Engagement + Cyber Effects and Reverse Engineering + Cyber Forensics + Cyber Threat Intelligence + Operational Technology Engineering and Response + Internet of ... Things (IoT) and Mobile Device Security + Engineering and Architecting Safe, Secure, and Resilient Systems + Cyber Policy Development Basic Qualifications + Must be a full-time student pursuing an accredited degree program in a Cybersecurity, Information… more
- JPMorgan Chase (Mclean, VA)
- …+ Experience in cybersecurity roles and processes such as Incident Response, Threat Intelligence , Penetration Testing, Red Teaming, Risk Management, Cyber ... Engineering, Cyber Architecture, and Data Privacy. + Strong written and verbal communication skills; ability to understand complex problems and present them simply. + Ability to collaborate with high-performing teams, senior leaders, business stakeholders,… more
- Optiv (Herndon, VA)
- …Assist in configuration of correlation searches, dashboard searches, risk modifiers, threat intelligence feeds, workflow actions and Enterprise Security content. ... + Automate issue resolution and compliance reporting to lower time on detection, time on mitigation for security organizations. + Integrate Splunk Mission Control, Splunk Security Orchestration, Automation Response (SOAR), and/or other customer approved… more