- KBR (Colorado Springs, CO)
- …in Colorado Springs, CO. Active TS/SCI clearance required. The Cyber Security SME (IA) IT Security Analyst provides Information Assurance/Cybersecurity ... Title: Cyber Security SME (IA) KBR's National...software, sensors, and network perimeters-including incident response, compliance reporting, vulnerability assessment, logging, RMF support, and CSSP coordination. +… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- … security posture through proactive monitoring, analysis, and implementation of cutting-edge security solutions. Cyber Network Analyst 1 | Salary: ... systems from cyber threats. + Conduct regular vulnerability assessments and security audits to identify... security improvements. What we are looking for Cyber Network Analyst 1 - 2 years… more
- DCCA (Chantilly, VA)
- …a strong, competitive compensation and benefits package. Visit our website at: www.dcca.com . Cyber Security Analyst CANDIDATES MUST HAVE AN ACTIVE TS/SCI w/ ... Cyber Security Architect Location Chantilly, VA...leaders. Desired Skills : * Demonstrated experience with offensive security practices. * Demonstrated experience with vulnerability … more
- General Dynamics Information Technology (Rockville, MD)
- …**Job Description:** Seize your opportunity to make a personal impact as a Sr. Cyber Security Analyst supporting our HHS HRSA customer onsite. GDIT ... IS AN ONSITE POSITION** **Responsibilities:** + As a Sr. Cyber Security Analyst with hands-on...perform hands on testing. + Possesses experience with communicating vulnerability results and risk posture to stakeholders. + Possess… more
- University of Southern California (Los Angeles, CA)
- …Cyber Defense concepts, (eg, incident response, security monitoring, cyber threat intelligence, attack surface and vulnerability management). + ... leadership to the table. POSITION SUMMARY As the Lead Analyst , Attack Surface Management (ASM) you will be an...Defense concepts, (eg, incident response, security monitoring, cyber threat intelligence, attack surface and vulnerability … more
- General Dynamics Information Technology (Fort Bragg, NC)
- …Yes **Job Description:** **Job Description** Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means ... At GDIT, people are our differentiator. As an Information Security Analyst , you will help ensure today...scanning, Data Loss Prevention (DLP). + Tracks and handles cyber security incidents/events from initial detection to… more
- Intuit (Mountain View, CA)
- …our products continue to resonate with 50 million consumers around the globe. Our cyber security internship roles provide a unique opportunity to gain hands-on ... systems, encryption, or even joining our Red Team. + Security Analyst : build your skills in compliance,...vulnerability scanners to SIEM platforms. + Investigate emerging cyber threats and attack techniques. + Help create and… more
- BAE Systems (Washington, DC)
- …maintaining advanced security measures to protect the program environment from cyber threats. Conducts security assessments, vulnerability scanning, and ... **Job Description** BAE Systems is seeking a ** Cyber Security Specialist** to join our...work experience. One of the following certifications: CompTIA Cybersecurity Analyst (CySA ), CompTIA Security , GIAC.… more
- Imagine One Technology & Management (Lexington Park, MD)
- …+ NEC 742A Network Security Vulnerability Technician + NEC H10A Basic Cyber Analyst /Operator + NETW 4001 Security Plus + SSC 6209-Network Operations ... Imagine One Technology & Management is currently seeking an **Information Security Analyst ** "contingent" on award of the associated work to the Imagine One… more
- DarkStar Intelligence LLC (Fort Meade, MD)
- …+ Cyber Defense Operator with purple team exposure + Security Architect with hands-on operational experience Compensation & Benefits Salary Range: $200,000 ... Sr. Cyber Defense Architect Location: Fort Meade, MD |...and Splunk engineering to build, evaluate, and strengthen enterprise security from the kernel to the application layer. This… more