- Raymond James Financial, Inc. (St. Petersburg, FL)
- … Analyst + SANS: GCFE - Forensic Examiner + SANS: GNFA - Network Forensic Analyst + SANS: GREM - Reverse Engineering Malware + OSCP - Offensive Security ... but not limited to: countermeasure deployment across various technologies; malware and exploit analysis; intrusion monitoring and response; assessing alerts… more
- ManTech (Doral, FL)
- …seeks a motivated, career and customer-oriented **Senior** **Cybersecurity Threat Intelligence Analyst ** to join our team in **Doral, FL** . **Responsibilities ... evolving threats. + Conducts in-depth research on threat actors, malware , vulnerabilities, and attack techniques, producing comprehensive threat assessments and… more
- AIG (Charlotte, NC)
- …in collecting, analyzing, and operationalizing intelligence on cyber adversaries. The analyst will work within an interdisciplinary team that develops advanced ... research methodologies, and other approaches to identify emerging cyber threats. The analyst will be responsible for analyzing the technical and behavioral aspects… more
- 3M (Austin, TX)
- **Job Description:** Senior SOC Analyst (L3) **Collaborate with Innovative 3Mers Around the World** Choosing where to start and grow your career has a major impact ... You Will Make in this Role** The L3 Security Analyst serves as a senior member of the Cyber...Conduct advanced investigations of security alerts and incidents, including malware analysis, lateral movement, and data exfiltration. + Perform… more
- BlueVoyant (MD)
- SOC Security Analyst L3 Location: The requirement has been updated to work out of the College Park, Maryland office 4 days per week Shift Requirement: BlueVoyant's ... and dwell time of security incidents. As an L3 analyst , you are the ultimate technical expert and escalation...tracing a labyrinth of domain registrations and ripping apart malware . When you say "it's bad" everyone jumps into… more
- Tyto Athene (Washington, DC)
- …Tyto Athene is searching for a **Tier 3 Digital Forensics and Incident Response Analyst ** . You will play a critical role in conducting in-depth analyses and ... + Utilize advanced tools, such as digital forensics or malware analysis capabilities, to identify incidents' root causes, scope,...Systems Security Professional + GCFA - GIAC Certified Forensic Analyst + GCFE - GIAC Certified Forensic Examiner +… more
- Imagine One Technology & Management (Lexington Park, MD)
- Imagine One Technology & Management is currently seeking an **Information Security Analyst ** "contingent" on award of the associated work to the Imagine One Team. ... the US Navy in Lexington Park, Maryland. The ** Information Security Analyst ** will plan, implement, upgrade, or monitor security measures for the protection… more
- UIC Government Services and the Bowhead Family of Companies (Vicksburg, MS)
- **Overview** Bowhead seeks an experienced Cybersecurity Protect Analyst to join our team onsite in Vicksburg, MS. The Cybersecurity Protect Analysts will ensure ... DOD guidance * Ensure signature based and heuristic based malware protection capabilities are kept up to date with...protection capabilities are kept up to date with latest malware signatures and/or properly configured and tuned to protect… more
- Competitive Range Solutions, LLC (Fort Meade, MD)
- …in a collaborative, congenial environment. We are seeking a highly skilled SOC Analyst Level 2 to coordinate cyber analysis and response efforts across network ... security, digital media analysis, and malware teams within a Security Operations Center (SOC) or...cybersecurity efforts between network defense, digital media analysis, and malware response teams. + Assess and track network attack… more
- Robert Half Technology (Miami, FL)
- Description We are seeking a proactive and detail-oriented IT Security Analyst to join our team. The ideal candidate will have experience with VPNs, firewalls, cloud ... security, malware prevention, and various threat detection techniques. You will...Response: Identify, analyze, and respond to security threats, including malware , ransomware, spyware, and other vulnerabilities. + Penetration Testing:… more