- Wyetech, LLC (Honolulu, HI)
- …rare within our industry. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection ... must be in computer or information systems design/development, programming, information/cyber/ network security , vulnerability analysis, penetration testing, computer… more
- Wyetech, LLC (Honolulu, HI)
- …rare within our industry. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection ... must be in computer or information systems design/development, programming, information/cyber/ network security , vulnerability analysis, penetration testing, computer… more
- Ernst & Young Oman (San Francisco, CA)
- …Within Information Security we blend risk strategy, digital identity, cyber defense , application security and technology solutions as we consider the entire ... value. The opportunity Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the...in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server… more
- Wyetech, LLC (Honolulu, HI)
- A cybersecurity services firm in Honolulu is seeking candidates for network engineering and systems security roles. Applicants must possess a TS/SCI clearance ... and relevant experience. The position offers competitive pay and a range of benefits including retirement contributions, generous PTO, and flexible medical plans. This role is pivotal in supporting federal government clients and requires strong analytical… more
- Boeing (Hazelwood, MO)
- …Setup Product Security and/or Cybersecurity compliance experience Understanding of Network Security standards Experience implementing Product Security ... and top US exporter, Boeing develops, manufactures and services commercial airplanes, defense products and space systems for customers in more than 150 countries.… more
- Jacobs (Coronado, CA)
- …Guides (STIG). The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security , SIEM, COMPLY ... courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security ...Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaise with network and system… more
- Leidos (Bethesda, MD)
- A defense contracting company is seeking an experienced Lead Cyber Operations Analyst to oversee a Fusion Analyst team. The role involves 24/7 support for ... critical cyber defense operations, including threat analysis, mentorship, and collaboration with...certifications, and a strong understanding of cyber vulnerabilities and network protocols. This exciting position is based in Bethesda,… more
- CACI International Inc. (Washington, DC)
- …of Columbia, United States of America Secret 319760 Senior Business Systems Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance ... The Opportunity CACI looking for an experienced Business Systems Analyst to join our fast‑paced agile team on a...agile team on a program supporting the Department of Defense financial management processes and systems. You will join… more
- cFocus Software Incorporated (Washington, DC)
- …(SIEM) systems, and malware analysis tools. Bachelor's degree in Cybersecurity preferred. Security + is required and Network + or equivalent is preferred. Duties ... cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This...search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and… more
- Tyto Athene, LLC (San Diego, CA)
- …environments, and receives calls on standard office automation tools, hardware and network problems, access and security problems, remote access issues, on-line ... Description Tyto Athene is searching for a Systems Analyst to serve as a resource on the...and track warranty actions. Be the first line of defense for security issues. Log all requests… more