- Amentum (Fort Meade, MD)
- Amentum is seeking **Exploitation Analysts 1-4 (EA)** to use information collected from a variety sources (eg, intrusion detection systems, firewalls, network ... traffic logs, and host system logs) to identify potential vulnerabilities, respond to...intelligence consumers. + Utilize network or system administration. **Exploitation Analysts 1** Minimum Requirements: + Must be a US… more
- Nightwing (Sterling, VA)
- …MDE, or Trellix Proficiency with two or more of the following tools: Host forensics software (EnCase, FTK, X-Ways, Sleuth Kit/Autopsy) SIFT Volatility KAPE ... 3 incident response, and immediate investigation and resolution using host -based, cloud-based and network-based cybersecurity analysis capabilities. Team personnel… more
- CACI International (San Antonio, TX)
- …cyber missions and protect their enterprises against cyber threats. CACI is seeking Exploitation Analysts (EAs) of all skill levels for a variety of roles to support ... core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this… more
- Nightwing (Sterling, VA)
- …of breaches and develop mitigation/remediation plans. Nightwing is seeking Network Forensics Cybersecurity Analysts to support this critical customer mission. ... assist with the restoration of services. Nightwing is seeking a Cloud Forensics Analyst to support this critical customer mission. Nightwing business provides… more
- CACI International (Wahiawa, HI)
- …against cyber threats. CACI is seeking experienced Computer Network Defense Analysts (CNDAs) to support core Intelligence Community (IC) missions through our ... Next Generation Analysts portfolio. Our national security depends on technology as...(eg, intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to… more
- ADM (Erlanger, KY)
- …exploitation, penetration testing concepts + Strong experience with information security, host - and network-based forensics , monitoring, detection, and incident ... under general supervision, provides support to leaders and cyber security analysts by consuming, analyzing, and reporting tactical, operational, and strategic threat… more
- Meta (New York, NY)
- …TTP identification, and detection engineering. You'll work alongside Security Analysts , Software Engineers and Offensive Security Engineers to identify critical ... 4. Perform analysis against logs from a variety of sources (eg, individual host logs, network traffic logs) to identify potential threats and detection ideas 5.… more
- MTA (New York, NY)
- …and next generation firewalls, machine and human behavior learning tools, host -based security system, security event and incident monitoring systems, virtual, ... response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary + Conducts security monitoring and intrusion… more
- CACI International (Wahiawa, HI)
- …protect their enterprises against cyber threats. CACI is seeking Digital Network Exploitation Analysts (DNEAs) of all skill levels for a variety of roles to support ... core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this… more
- CACI International (Fort Meade, MD)
- …leverage deep expertise in network security, penetration testing, and digital forensics to identify, analyze, and exploit vulnerabilities in adversary systems. You ... intelligence-driven methodologies into operational missions. This includes mentoring cyber analysts and operators, building and maintaining key partnerships, and… more