• IT systems Manager

    US Courts (Memphis, TN)
    …systems that provide hardware/software inventory, patch management, endpoint malware protection, network vulnerability scanning, perimeter protection, intrusion ... prevention/detection, and event correlation. Perform other related duties as required. Requirements Conditions of Employment Applicants must be a US citizen or eligible to work in the United States. The Federal Financial Reform Act requires direct deposit of… more
    US Courts (12/20/25)
    - Related Jobs
  • Security Threat Engineer I

    HCA Healthcare (Nashville, TN)
    …Response (EDR) + Sandboxing + Virtual Machines + Netflow analysis + Malware Repositories + Threat Intelligence + Deception Stack o Intrusion Detection/Prevention ... System (IDS/IPS) + Security Orchestration Automation Response (SOAR) + Phishing Triage + User Behavior Analytics (UBA) + Email Hygiene and Filtering + Experience interfacing with peer support teams (Security Engineering, Vulnerability and Patching Teams,… more
    HCA Healthcare (12/20/25)
    - Related Jobs
  • Senior Cyber Blue Team Lead / Analyst

    Applied Research Associates, Inc. (Fort Belvoir, VA)
    …Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, and/or shell scripting + Hands-on experience ... with network monitoring and packet inspection tools + Demonstrated experience with Linux environments (Red Hat, CentOS, Ubuntu) + Programming experience (Perl, Python, C, etc.) **Desired Qualifications** + Team and project leadership/management experience +… more
    Applied Research Associates, Inc. (12/20/25)
    - Related Jobs
  • Detection & Response Security Engineer, Threat…

    Meta (New York, NY)
    …with incident responders on incident investigations 17. Familiarity with malware analysis or network traffic analysis 18. Familiarity with nation-state, ... sophisticated criminal, or supply chain threats 19. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 20. Experience in one or more query languages such as SQL 21. Experience… more
    Meta (12/20/25)
    - Related Jobs
  • Security Analyst - SDR Security Operations

    Meta (New York, NY)
    …Analyst in a large and regulated organization 22. Experience handling and triaging malware 23. Experience driving changes to processes and tools that scale across a ... global security operations team 24. Experience working in a 24x7 operational environment, and a track record of defining, implementing and measuring success of operational programs **Public Compensation:** $137,000/year to $196,000/year + bonus + equity +… more
    Meta (12/20/25)
    - Related Jobs
  • Information Security Engineer

    University of Utah (Salt Lake City, UT)
    …servers, and cloud environments to identify the root cause of breaches, malware infections, or other security issues. + Provide security evaluations and guidance ... regarding new technologies or processes. + Assist in legal discovery, evidence acquisition, and preservation. + Support the Security Operations Center ( SOC ) with tools, data, and guidance. + Stay up-to-date concerning emerging threats, vulnerabilities, and… more
    University of Utah (12/20/25)
    - Related Jobs
  • Cyber Blue Team Analyst

    Applied Research Associates, Inc. (Fort Belvoir, VA)
    …Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, and/or shell scripting + Hands-on experience ... with network monitoring and packet inspection tools + Programming experience (Perl, Python, C, etc.) **Desired Qualifications** + Knowledge, skills, and ability to operate the advanced cyber analytical toolkit and perform required assessments + Working… more
    Applied Research Associates, Inc. (12/20/25)
    - Related Jobs
  • Assistant Professor of Computer Science (Cyber…

    Texas A&M University System (Laredo, TX)
    …sub-areas include digital, network, or memory forensics; mobile device forensics; malware analysis; and digital evidence forensics. Experience in cryptography and ... interdisciplinary collaboration is a plus. We offer competitive salaries and a benefits package including health insurance, retirement benefits, and life insurance. Additional pay is available for summer teaching. Financial support for professional development… more
    Texas A&M University System (12/19/25)
    - Related Jobs
  • Security Engineer

    TEKsystems (Scottsdale, AZ)
    …email protection, log correlation * Proven ability to investigate and contain malware , phishing, lateral movement, and other attack techniques * Strong understanding ... of MITRE ATT&CK and how to map detections to attacker TTPs * Ability to write clear incident timelines and investigative findings Employee Value Proposition (EVP) This is a great opportunity to be a part of building out a brand-new SOC. This opportunity does… more
    TEKsystems (12/19/25)
    - Related Jobs
  • Cyberspace Defensive Analyst 1

    Huntington Ingalls Industries (Fort Meade, MD)
    …and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious ... Contact Reports. + Engaging with FCC or DIB on network protection. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies… more
    Huntington Ingalls Industries (12/19/25)
    - Related Jobs