- Indigo IT, LLC (Fort Meade, MD)
- …of cyber sensing technologies including intrusion detection, packet capture, malware detection, threat analytics, and SIEM integration. + Experience designing ... solutions for both on premises and cloud environments including virtualization, containerization, and cloud native architectures. + Demonstrated experience with requirements decomposition, DoDAF architecture development, design documentation, and engineering… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Coordination and support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious ... Contact Reports. + Engaging with FCC or DIB on network protection. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies… more
- Koniag Government Services (Gallup, NM)
- …365 + Active Directory user and computer support + Basic network troubleshooting + Malware removal tools + Imaging and configuration tools + Ability to use and ... interpret: + Diagnostic equipment + System logs + Hardware/software reference materials + Technical Support & Troubleshooting: + Hands-on experience supporting: + Desktops, laptops, tablets, phones + Thin clients and peripheral devices + Video conferencing… more
- MUFG (Jersey City, NJ)
- …network packet analysis, endpoint detection and response, firewalls, Anti malware /anti-virus, Security Information and Event Management tool) + Experienced with ... CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools + Ability to perform risk analysis utilizing logs and other information compiled from various sources + Understanding of… more
- WIN Waste Innovations (Portsmouth, NH)
- …365 security and compliance management, specifically anti-phishing/anti- malware /anti-spam policies/config/troubleshooting/email tracing + Responsible for securing ... all aspects of the M365 environment. + Experience with Azure AD Connect and syncing objects from on-prem AD to Azure AD. + Knowledge of Azure AD Authentication, Identity and Access Management (IAM), and Conditional Access Policies. + Deep understanding of… more
- Amcor (WI)
- …(including on-call and weekend work), supporting incident response, forensics, malware analysis, and phishing investigations + Lead initiatives in security ... engineering, automation, analytics, and advanced threat detection + Deliver high-quality projects on time, following approved change management practices + Manage configuration, patching, tuning, and upgrades of core security infrastructure and technologies +… more
- RBR-Technologies (Fort Meade, MD)
- …common exploitation techniques like SQL Injection, buffer overflow, phishing, malware + Excellent communication, collaboration, and presentation skills. + Experience ... with technical and/or military writing and staff work. Preferred Qualifications + Experience with DISA and DoD Information Networks (DODIN). + Experience with configuring networking devices (ie routers, firewalls, IDPS) + Demonstrate knowledge of Cybersecurity… more
- Sandia National Laboratories (Livermore, CA)
- …your role may include anything from research to software development to malware reverse engineering. About Sandia: Sandia National Laboratories is the nation's ... premier science and engineering lab for national security and technology innovation, with teams of specialists focused on cutting-edge work in a broad array of areas. Some of the main reasons we love our jobs: + Challenging work with amazing impact that… more
- Oracle (Washington, DC)
- …a tenancy. Software assurance includes measures to prevent the deployment of malware or vulnerable, malicious, or unauthorized code into the application's tenancy. ... It also includes monitoring the flow of data in and out of the application's tenancy to prevent unauthorized exfiltration of data. The software gateway services will intercept web traffic, operator actions, and CI/CD pipelines to perform a set of assurance… more
- GE HealthCare (Waukesha, WI)
- …threats. Demonstrates technical leadership abilities and strong comprehension of malware , emerging threats and calculating risk. **Job Description** **Roles and ... Responsibilities** You are a highly skilled security Engineer who enjoys security work and collaborating with product managers and developers to drive the successful adoption of innovative methods in developing secure applications. In this role, you will: *… more