- Applied Research Solutions (Dayton, OH)
- …for Cloud, and Microsoft Sentinel, to perform vulnerability scanning, log correlation, threat hunting, and compliance reporting. The analyst will also contribute ... **Description** ARS is seeking a skilled cloud vulnerability analyst to assist in the monitoring and security hardening of a DevSecOps cloud environment to align… more
- Walmart (Bentonville, AR)
- …monitoring). + Partner with Data Science and Engineering to translate threat patterns into detection logic + (models/heuristics), automation, dashboards, ... a safe, high quality Marketplace. **Role Overview** The Emerging Threats Analyst II supports Walmart Marketplace's Emerging Threats program by identifying,… more
- Southern Company (Birmingham, AL)
- **SCS Cybersecurity** **Vulnerability Exploitation Analyst ** **Job Description** At Southern Company, our core objective is to ensure safe and reliable computing ... Overview:** Southern Company is seeking a passionate Vulnerability Exploitation Analyst to join our Cybersecurity organization. This technical, hands-on role… more
- Lockheed Martin (Hanover, MD)
- **Description:** **The Work:** We are seeking a Packet / Protocol Analyst to join Lockheed Martin Cyber & Intelligence\. * Provide end‑to‑end lifecycle analysis ... modernization by leveraging containerization, cloud‑native data‑flows, and AI/ML‑enhanced anomaly detection to surface protocol‑level threats faster and at scale\.… more
- Koniag Government Services (Baltimore, MD)
- Tuknik Government Services, a Koniag Government Services company, is seeking a SOC Analyst to support TGS and our government customer in Baltimore, MD. This position ... a Koniag Government Services company, is seeking a SOC Analyst to support TGS and our government customer in...in the agency's CISA Report and investigate Open Source Threat Intelligence for the agency. The role may also… more
- Amentum (Wahiawa, HI)
- Amentum has a great opportunity for a **Cyber Intelligence Analyst ** to support the Cyber Group ONE Command, located in Wahiawa, HI. The Cyber Intelligence ... Analyst will be a key member of our team,...member of our team, responsible for analyzing complex cyber threat data, producing actionable intelligence, and supporting cyber operations.… more
- Adapt Forward (North Charleston, SC)
- …you will be responsible for leading complex incident responses, conducting proactive threat hunting, and enhancing detection capabilities within a Cybersecurity ... Cyber Security Analyst III, DCO Watch Analyst Tier...and ensuring comprehensive resolution and reporting + Conduct proactive threat hunting to identify advanced threats and vulnerabilities within… more
- Leidos (Whitehall, OH)
- …the OSI model, defense-in-depth security principles, and common security elements for effective threat detection , analysis, and mitigation as a SOC Security ... become available. **About the Role:** As a Cyber Security Analyst , you'll be on the front lines, defending Department...security operations team, responsible for: + Analyzing real-time cyber threat intelligence to stay ahead of emerging threats. +… more
- Huntington Ingalls Industries (Columbia, MD)
- …Q-Radar, ELK). + SOARs (eg, Sentinel, CORTEX, X-SOAR). + Developing and deploying threat detection signatures and detecting host and network-based intrusions. + ... the interview process. Job Description Enlighten is looking for a Cyber Hunt Analyst with Data Science experience to apply strong cyber security, Defensive Cyber… more
- Adapt Forward (North Charleston, SC)
- …Operations (DCO) Watch Analysts and other teams to ensure timely and effective threat detection , adhering to CJCSM 6510.01B reporting requirements and supporting ... Cyber Security Analyst III, Detection Engineer Cloud SME...threats and cloud infrastructure(eg containers like Kubernetes, Docker etc)Analyze threat intelligence to create and refine detection … more