- CACI International (St. Louis, MO)
- …stakeholders and other Contract Services; * Provides adversary attribution; * Performs malware analysis and signature development; * Coordinate with CSOC Tier 1 and ... 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. **Qualifications:** _Required:_ * Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) * Active TS/SCI, ability to obtain a polygraph * DoDD 8140.01… more
- The Boeing Company (Albuquerque, NM)
- …and capabilities of threats (eg protocol exploits, identity spoofing, malware injection techniques, application layer vulnerabilities). + Knowledge of emerging ... computing and information technology areas to manage advanced research computing technology proposals, projects and resources. + Knowledge of system security domains (eg, information assurance, anti-tamper, intrusion detection, software protection, software… more
- The MITRE Corporation (Huntsville, AL)
- …Safety + Crypto and Trust + Cyber Adversary Emulation + Cyber Analytics and Malware + Cyber Assessments + Cyber Deception and Adversary Engagement + Cyber Effects ... and Reverse Engineering + Cyber Forensics + Cyber Resiliency + Cyber Safety + Cyber Strategy and Governance + Cyber Supply Chain + Cyber Threat Intelligence + Defensive Cyber Operations + Enterprise Security Architecture + Identity, Credentialing, and Access… more
- Leidos (Odenton, MD)
- …and improvement of CNO Community capabilities with analytics and tools for CNE, Malware Analysis, and sensor improvement. You will have the opportunity to apply your ... knowledge of data modeling, large language models (LLM), and qualitative and quantitative techniques to normalize, analyze, and visualize RF, PERFORMA, and other SIGINT data in a large-scale data processing environment using technologies such as Spark, cloud… more
- The Boeing Company (Herndon, VA)
- …and access controls, to protect the system from unauthorized access, malware , and other security threats. + Analyze system performance, identify bottlenecks, ... and implement optimizations to improve overall system efficiency and responsiveness. + Maintain accurate documentation of system configurations, procedures, and troubleshooting steps, as well as generate reports on system performance, security, and compliance.… more
- Motion Recruitment Partners (Arlington, VA)
- …and fine-tune tools including IDS/IPS, URL filtering, App Control, AV, and malware detection systems * Participate in after-hours work when required for incidents, ... upgrades, or scheduled maintenance **Required Skills & Experience:** * 5+ years in IT, cybersecurity, or related technical domains * 4+ years managing and configuring enterprise-scale firewalls (Palo Alto preferred) * 1+ year supporting F5 BIG-IP platforms… more
- Synectic Solutions Inc (Tucson, AZ)
- …respond to IAVAs and IAVBs + Deploy, update and operate HBSS, A/V and anti- malware solutions. + Execute scans of incoming and outgoing media, perform data transfers ... and complete related documentation. + Provision and maintain Microsoft Windows workstations and laptops according to existing standards, including creation and distribution of system images + Perform user account creation and activation, password resets,… more
- Zscaler (San Jose, CA)
- …experience design + Deep understanding of Proxy Architecture, HTTP, DNS, SSL, Malware Detection, IPS, Advanced Threat Protection, Sandboxing, and endpoint security + ... Prior hands-on inbound product management experience, preferably at top industry security or networking vendors **What Will Make You Stand Out (Preferred Qualifications)** + Bachelor's degree in Computer Science, Engineering, or a related field; a Master's or… more
- Central Hudson Gas & Electric Corporation (Poughkeepsie, NY)
- …+ In-depth knowledge of security operations, including SIEM, SOAR, EDR, IDS/IPS, malware analysis, email security, and endpoint protection + Demonstrated ability to ... develop, tune, and optimize use cases for alerting in a SIEM platform + Proficiency in threat hunting techniques and methodologies to proactively identify and mitigate potential threats + Proven hands-on experience in working collaboratively with an Incident… more
- GCI Communication Corp (Anchorage, AK)
- …(standard and non-standard) hardware and software support issues to include Virus/Spyware/ Malware clean-up and remediation. + Experience with Apple OS and iOS ... app support, upgrades, and general troubleshooting. Assisting with the JAMF environment to include installations, configurations, and recovery solutions. + Create and maintain current Desktop Services SOPs (Standard Operation Procedures), and regularly update… more