- Parsons Corporation (Springfield, VA)
- …from Enterprise Incident Response Events. + Conducting liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other relevant ... errors, processes and activities are conducted within established timeframes, and analysts are trained in and follow current standard operating procedures. **What… more
- General Dynamics Information Technology (Tampa, FL)
- …waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... on a Cyber Security Analyst joining our team of analysts , stationed in diverse CONUS and OCONUS locations tasked...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. + Identify… more
- IntelliDyne (Falls Church, VA)
- …strategic direction. + Coordinate with division leads and directors for investigations, insider threat , and research. + Conduct analysis and provide ... Exempt Responsibilities: + Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies. + Manage large,… more
- Warner Bros. Discovery (New York, NY)
- …and external intellectual property (IP) theft, attacks/intrusions, computer abuse, and insider threat investigations. + Possess skills to collect, process, ... partner closely with the Legal, People and Culture, GICS security engineers/ analysts and cyber incident commanders, leading incident investigations and providing… more
- Meta (New York, NY)
- …designing systems used for responding to both external and insider threats 18. Experience analyzing network and host-based security events 19. Knowledge ... are seeking a Security Engineer who specializes in designing and implementing new systems and tools to enhance the security of Meta's products and infrastructure.… more
- TEKsystems (Irvine, CA)
- …Deploy, configure, and maintain SentinelOne EDR across enterprise endpoints. * Threat detection and response: Monitor alerts, investigate suspicious activity, and ... streamline detection and response workflows. * Collaboration: Work closely with SOC analysts , IT teams, and leadership to contain and mitigate threats. * Reporting:… more