- US Courts (Memphis, TN)
- …systems that provide hardware/software inventory, patch management, endpoint malware protection, network vulnerability scanning, perimeter protection, intrusion ... prevention/detection, and event correlation. Perform other related duties as required. Requirements Conditions of Employment Applicants must be a US citizen or eligible to work in the United States. The Federal Financial Reform Act requires direct deposit of… more
- HCA Healthcare (Nashville, TN)
- …Response (EDR) + Sandboxing + Virtual Machines + Netflow analysis + Malware Repositories + Threat Intelligence + Deception Stack o Intrusion Detection/Prevention ... System (IDS/IPS) + Security Orchestration Automation Response (SOAR) + Phishing Triage + User Behavior Analytics (UBA) + Email Hygiene and Filtering + Experience interfacing with peer support teams (Security Engineering, Vulnerability and Patching Teams,… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, and/or shell scripting + Hands-on experience ... with network monitoring and packet inspection tools + Demonstrated experience with Linux environments (Red Hat, CentOS, Ubuntu) + Programming experience (Perl, Python, C, etc.) **Desired Qualifications** + Team and project leadership/management experience +… more
- Meta (New York, NY)
- …with incident responders on incident investigations 17. Familiarity with malware analysis or network traffic analysis 18. Familiarity with nation-state, ... sophisticated criminal, or supply chain threats 19. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 20. Experience in one or more query languages such as SQL 21. Experience… more
- Meta (New York, NY)
- …Analyst in a large and regulated organization 22. Experience handling and triaging malware 23. Experience driving changes to processes and tools that scale across a ... global security operations team 24. Experience working in a 24x7 operational environment, and a track record of defining, implementing and measuring success of operational programs **Public Compensation:** $137,000/year to $196,000/year + bonus + equity +… more
- University of Utah (Salt Lake City, UT)
- …servers, and cloud environments to identify the root cause of breaches, malware infections, or other security issues. + Provide security evaluations and guidance ... regarding new technologies or processes. + Assist in legal discovery, evidence acquisition, and preservation. + Support the Security Operations Center ( SOC ) with tools, data, and guidance. + Stay up-to-date concerning emerging threats, vulnerabilities, and… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, and/or shell scripting + Hands-on experience ... with network monitoring and packet inspection tools + Programming experience (Perl, Python, C, etc.) **Desired Qualifications** + Knowledge, skills, and ability to operate the advanced cyber analytical toolkit and perform required assessments + Working… more
- Texas A&M University System (Laredo, TX)
- …sub-areas include digital, network, or memory forensics; mobile device forensics; malware analysis; and digital evidence forensics. Experience in cryptography and ... interdisciplinary collaboration is a plus. We offer competitive salaries and a benefits package including health insurance, retirement benefits, and life insurance. Additional pay is available for summer teaching. Financial support for professional development… more
- TEKsystems (Scottsdale, AZ)
- …email protection, log correlation * Proven ability to investigate and contain malware , phishing, lateral movement, and other attack techniques * Strong understanding ... of MITRE ATT&CK and how to map detections to attacker TTPs * Ability to write clear incident timelines and investigative findings Employee Value Proposition (EVP) This is a great opportunity to be a part of building out a brand-new SOC. This opportunity does… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious ... Contact Reports. + Engaging with FCC or DIB on network protection. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies… more