- Exeter Government Services, LLC (Nellis Air Force Base, NV)
- …administration operations in support of the Cyber Security Operations Center for malware , spyware, Trojans, or unauthorized software that gets detected on any device ... on the domain. Responsibilities include: Mid/Senior-level experience in a full range of IT security principles, including: a. Concepts, practices, products and services (including system software, database software and immediate access storage technology) b.… more
- KBR (Sioux Falls, SD)
- …systems. + Experience with Amazon cloud hosting platforms, VMware virtualization, and malware analysis. Special Requirements + Three years of continuous US residency ... for issuance of a Government Security credential. + Ability to obtain and maintain a national agency check and background investigation for facility access and user accounts. Equivalent education and/or experience will be considered. KBR partners with several… more
- System One (Huntsville, AL)
- …threat environments. Has applied knowledge related to forensic, network, and malware analysis. Experience working in team environments for software development. ... Analyzes cyber threat data to include malicious software reverse engineering, network traffic analysis, memory forensics, disk forensics, etc. Perform static and dynamic analysis of known malicious and unknown binary files, reverse engineering of compiled… more
- University of Colorado (Colorado Springs, CO)
- …forensics and cryptographic multiparty computation + Software security including malware analysis, software supply chain security, deployment and maintenance + ... System security including vulnerability analysis and cloud computing security + Network security including SDN and NFV security + Component security or device security including reverse engineering and security platform architecture + Formal methods and… more
- CGI Technologies and Solutions, Inc. (Arlington, VA)
- …in incident response activities, including investigating security incidents, analyzing malware , and implementing forensic analysis. **Required qualifications to be ... successful in this role:** * Education and/or Experience: Bachelor's degree and/or 5 to 8 years of experience * Security Clearance: Candidates must possess an active TS/SCI clearance with polygraph * Technical Expertise: Strong knowledge of security… more
- System One (Melbourne, FL)
- …troubleshooting Proofpoint PPS/TAP secure mail gateways (DMARC / DKIM / SPF, malware & impersonation defense, smart host connectors, DLP, encryption). + Supporting ... Microsoft 365 (Exchange Online, SharePoint Online, OneDrive, Teams) and Azure IaaS/PaaS resources for resilient collaboration and messaging. Responsibilities: + Active Directory Engineering - Administer multi-site, multi forest AD DS; design replication,… more
- ADM (Erlanger, KY)
- …threat actors, threat actor tools and techniques, motivations of threat actors, and malware , etc. The SCTIA will need to use intelligence processes and tools to ... work all of this threat information to develop intelligence products that are useful to leadership and cyber security analysts in the security operations center, incident responders, hunt teams, vulnerability management, etc. The SCTIA will need to build and… more
- Nightwing (Sterling, VA)
- …with security tools and technologies (eg, firewalls, intrusion detection systems, anti- malware software). + Knowledge of operating systems and their security ... configurations. + Familiarity with security protocols and standards (eg, NIST Framework, ISO 27001). + Ability to identify and assess security vulnerabilities. + Strong problem-solving and analytical skills. + Excellent communication and interpersonal skills.… more
- Truist (Wilson, NC)
- …+ Encryption and key management technologies; + Endpoint Protection (includes malware ); + Data Loss Protection technologies 6. Experience with peripheral component ... interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding **Highly Preferred Qualifications & Experience** + Broad knowledge across a wide range security and technology… more
- City National Bank (Newark, DE)
- …ad hoc rule implementation; research and respond to escalated fraud claims; malware alerts; review of department audit reports and other support activities defined ... by management. This position requires subject matter expertise on all system platform functionalities used by the fraud team, as well as deep understanding of Regulations E and Z. Responsible for building and maintaining relationships with internal and… more