- Tyto Athene (Ashburn, VA)
- …enhance the organization's IT security posture. **Desired:** + CISSP - Certified Information Systems Security Professional + GCFA - GIAC Certified ... forensics + Intrusion detection and incident response + Malware analysis + Security content development (signatures, rules, etc.) + Cyber threat intelligence… more
- Carnegie Mellon University (Pittsburgh, PA)
- …Management Professional (preferred) Certified Enterprise Risk Manager (preferred) Certified Information Systems Security Professional (preferred) Certified ... - mastery of risk management concepts, cyber security best practices and standards, information ... Information Security Manager (preferred) Certified Information Systems Auditor (preferred) **Other:** You will… more
- Carnegie Mellon University (Pittsburgh, PA)
- …Management Professional (preferred) Certified Enterprise Risk Manager (preferred) Certified Information Systems Security Professional (preferred) Certified ... - mastery of risk management concepts, cyber security best practices and standards, information ... Information Security Manager (preferred) Certified Information Systems Auditor (preferred) **Other:** You will… more
- AGEATIA TECHNOLOGY CONSULTANCY SERVICES INC. (Milwaukee, WI)
- …methodologies. Stay current with industry trends, tools, and best practices in cyber threat intelligence. Support security assessments, penetration testing, and ... Job Description Job Description Job Summary We are seeking a skilled Cyber Threat Intelligence Analyst to identify, analyze, and attribute cyber threats… more
- ALTA IT Services (Washington, DC)
- …knowledge of computer systems and networks with cyber threat information to assess the client's security posture Conducts intelligence analysis to assess ... and intelligence reports to leadership Qualifications: Bachelor's with 8+ years of cyber security experience (or commensurate experience) 7 years of security … more
- Tyto Athene (Ashburn, VA)
- …findings to senior leadership and stakeholders. **Desired:** + CISSP - Certified Information Systems Security Professional + Certified Ethical Hacker ... incidents + Utilize security tools to analyze, investigate, and triage security alerts + Lead and execute advanced cyber threat hunting operations… more
- Battelle Memorial Institute (Columbus, OH)
- …selection, design, implementation, and optimization of novel mathematical techniques applied to cyber security problems + Support the latest team's research and ... hard mathematical problems that arise from physical and software systems . Daily activities include algorithm implementation and customization and...development programs + Work closely with cyber security experts and engineers to develop… more
- ERCOT (Austin, TX)
- …a project leadership role. ADDITIONAL JOB DUTIES + Develops the ERCOT Cyber security Architecture Strategy + Serves as the information security subject ... achieve the functional requirements of business initiatives as the technical expert on information security architecture + Works on the most complex issues where… more
- Akira Technologies Inc. (Norfolk, VA)
- …systems , including malware triage, log correlation, and timeline reconstruction. Investigate security incidents using MITRE ATT&CK and Cyber Kill Chain ... analysis, or incident response. Strong knowledge of Windows and Linux operating systems , network traffic analysis, and security monitoring. Experience working… more
- Tyto Athene (Ashburn, VA)
- …availability (CIA triad) principles and best practices. **Desired:** + CISSP - Certified Information Systems Security Professional + GCFA - GIAC Certified ... **Description** Tyto Athene is searching for a ** Cyber Defense Forensics Lead** to support a law...analysis and investigation of high-priority cybersecurity incidents + Utilize security tools to analyze, investigate, and triage security… more