- Halliburton (Houston, TX)
- …the protection of critical infrastructure against cyber threats, such as malware , ransomware, and unauthorized access, while maintaining operational continuity. Job ... Duties Continued + Take a leading role in network security incident management, leveraging threat intelligence to mitigate threats and respond to incidents. + Continuously assess emerging security threats, propose strategies, and implement security solutions… more
- Citigroup (Tampa, FL)
- …Persistent Threat, Third Party Risks/Threats, Cybercrime, Software Development, Cybersecurity, Malware Analysis. + Excellent written and verbal communication skills, ... consistently demonstrating clarity, conciseness, and attention to detail. + Established project management skills, including the ability to coordinate and prioritize multiple projects simultaneously while working with globally dispersed teams and stakeholders.… more
- Palo Alto Networks (Dallas, TX)
- …within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary ... behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations. If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We… more
- Parsons Corporation (West Melbourne, FL)
- …edge exploitation techniques, tools, and methodologies + Experience with hypervisors + Malware analysis + Ability to analyze network protocols throughout all layers ... of the network stack + Software development for embedded/IOT systems **Security Clearance Requirement:** An active Top Secret security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment… more
- Commerce Bank (Kansas City, MO)
- …systems, generation of certificates using the internal PKI system, CyberArk support, Malware Protection, cloud security and puppet. Essential Functions + Work with ... inter-departmental teams to provide Server Security solutions including Active Directory, certificates, Patching, CyberArk, Identify Management, Cloud Security and Logging, in the support of a variety of server platforms including Puppet + Administer SailPoint… more
- Nightwing (Falls Church, VA)
- …of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware , etc. to identify the responsible, determine remediation, and recommend ... security improvements + Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc + Follows strict guidance on reporting requirements + Keeps management informed with precise, unvarnished information… more
- KBR (Honolulu County, HI)
- …of infrastructure including but not limited to: servers, zero clients, malware protection software, HBSS, syslog servers, databases, ACAS, etc. . Upgrade ... systems and processes as required for enhanced functionality and/or security issue resolution. . Identify potential risks or inefficiencies associated with the configuration of the system and recommends appropriate mitigation strategies. . Ensure compliance… more
- OneMain Financial (Baltimore, MD)
- …more than one platform area (IDS/IPS, firewall/WAF, access and identity, malware defense, threat modeling, exposure management, among others), the Principal ... Cybersecurity Engineer is formally trained in enterprise IT design and architecture practices. + Collaborate with and mentor enterprise architects in security best practices, fostering a collaborative and high-performance work environment. + Prepare… more
- Indigo IT, LLC (Fort Meade, MD)
- …of cyber sensing technologies including intrusion detection, packet capture, malware detection, threat analytics, and SIEM integration. + Experience designing ... solutions for both on premises and cloud environments including virtualization, containerization, and cloud native architectures. + Demonstrated experience with requirements decomposition, DoDAF architecture development, design documentation, and engineering… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Coordination and support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious ... Contact Reports. + Engaging with FCC or DIB on network protection. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies… more