- UKG (Ultimate Kronos Group) (Weston, FL)
- …attacks). * 4-6 years of experience with cyber attackers (eg, script kiddies, insider threat , non-nation state sponsored, and nation sponsored) and cyber-attack ... inspired by you. **About the Team** As a Senior Security and Threat Monitoring Analyst , you will be part of UKG's Global Security Operations Center (GSOC)… more
- Lockheed Martin (Orlando, FL)
- …will be the Intelligence Analyst Staff for the Counterintelligence \(CI\) and Insider Threat program and strategy across the MFC enterprise\. **What You Will ... the Intelligence Analyst Staff, you will serve as an Insider Threat Program Senior Official \(ITPSO\), developing education and training materials in support… more
- Amentum (Tampa, FL)
- …+ Identify individuals of CI concern through All-source analysis. + Proactively identify insider threats and Military CI Collection (MCC) leads. + Generate leads and ... Identify (PID) and deconflict LN identities. + Assess LN threat concerns based on All-source analysis. + Manage RFIs...or at least eight (8) years direct relevant intelligence analyst experience. **Minimum Years of Experience:** + At least… more
- SMX (Key West, FL)
- …Validator Information Assurance certification + Previous Information Systems Security Manager and Insider Threat experience + Knowledge of Telos Xacta or eMASS ... all jobs) (https://www.smxtech.com/careers/) Key West, FL Join SMX as an Information Assurance Analyst and become a key contributor of our IA team in Key West,… more
- TestPros (Tampa, FL)
- …a basic-intermediate technical knowledge in endpoint security, network vulnerability scanning, insider threat , cross domain solutions, cyber defense monitoring ... Active DoD Secret clearance Responsibilities and Duties: The Cybersecurity Information Analyst supports the entire squadron and generates and edits documentation for… more
- Amentum (Tampa, FL)
- …individuals of CI concern through All-source analysis. * Proactively identify insider threats and Military CI Collection (MCC) leads. Ad Hoc/anticipated ... * Positively Identify (PID) and deconflict LN identities. C.5.1.4.4.2 assess LN threat concerns based on All-source analysis. * Manage RFIs as follows: enter… more