Research and Documentation Analyst. Research and Documentation Analyst. Research and Documentation Analyst. ...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. The MITRE Corporation’s Cost & Business Analytics Department is seeking a cost analyst to support multiple projects solving our cus...
Five Rivers Analytics is looking for a Telecom Analyst I to work in Boston, MA. COMPTIA Security+ce (IAT-Level II) Certification. ...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. The MITRE Corporation’s Cost & Business Analytics Department is seeking a cost analyst to support multiple projects solving our cus...
Chipton-Ross is seeking a Senior Configuration Analyst for a hybrid contract opportunity in Chelmsford, MA. The Senior Configuration Analyst will have the opportunity to work with our top, industry leading multi-disciplined design professionals. The Analyst will have the opportunity to design, devel...
Bachelor's degree from an accredited college or university in Computer and Information Science, Computer Engineering, Computer Systems Analysis, Information Cybersecurity and five (5) years of progressive information security experience across various information security/information technology risk...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. MITRE’s National Security Accelerator Program (. ...
A&F IT is seeking a highly skilled and detail-oriented Information Security Analyst to join the Office of the Chief Information Security Office (CISO) team. Position: Information Security Analyst. This posting is for an Information Security Analyst to assist the Executive Office for Administration a...
The Securityand Access Management Analyst is responsible for applicationof policies, programs, standards, and compliance of information security,access, and privacy. Security and Access Management Analyst. Develop and maintain information security policies and procedures for network security, access...
As a Lead Knowledge Analyst (LKA) in a Client Focused role within BCG's Public Sector Practice Area for Defense & Security, you will work in a growing global team, delivering value to clients via individual expertise and/or institutionalized knowledge assets (products, tools, data, workshops, framew...
The Information Security Analyst II will provide extensive support to the evolution and improvement of the existing Digitial Information Security Policy Portfolio. The Information Security Analyst II independently operates existing processes to operate security controls within their domain. The Info...
As part of MathWorks' Information Security team, the Information Security and Risk Analyst is responsible for developing information security and risk management practices and monitoring information security compliance and risk posture. In this role, the analyst will provide skilled technical, infor...
Welcome to the exciting world of Application Security, where you’ll play a crucial role in defending against cyber threats and protecting vital digital assets. You'll also be part of a dynamic team that values creativity and innovation, contributing your ideas to enhance our security measures. Ready...
This role will support leadership in all aspects and leadership of vendor and risk management programs such as, audits, risk assessments, vendor management, policy management, and security awareness. Manage overall process to intake and respond to client security requests (i. Conduct information sec...
Interacting with developers, analysts, security analysts, and technical and non-technical business teams to determine use cases and business processes for roles, entitlements, provisioning and de-provisioning. Bachelor's Degree in Information Security, Cyber Security, Information Assurance, Computer...
Monitor security events, analyze security logs, and investigate potential security incidents. Conduct threat hunting, incident analysis, and root cause analysis to identify security threats and vulnerabilities. Assess and prioritize security risks, and recommend mitigation strategies and controls. C...
Client: The Massachusetts Department of Transportation (MassDOT)<br /><br />Role: Cyber Security Operations Analyst<br /><br />Duration: 10 Months (Possible Extension)<br /><br />Location: 10 Park Plaza, 8th floor Boston, MA 02116<br /><br />Work Sched...
Are you a security professional looking for a Security Operations Center role in IR? We are the leading Datadog partner and are embarking on building a security managed services offering from the ground up. This is a unique opportunity to work with cutting edge cloud security solutions and be invol...
REQUIRED: bachelor’s degree; five years of experience in cybersecurity or related field and at least three years’ information security experience; broad understanding of networking, security, and system administration concepts; experience with security tools (i. Information Systems and Technology (I...
You will also lead security risk assessments of blockchains, and provide security expertise and risk mitigation recommendations to various enterprise teams. In this role, you will design and execute a robust blockchain security assessment program. Leverage your technical understanding of various blo...
We want to find an innovative, adaptable, and results-oriented Associate Analyst, Security Operations for our Security Control Center in Northborough, MA. As an Associate Analyst, Security Operations, you'll ensure that all Security Control Center monitoring and notification processes, policies and ...
Innova Solutions is immediately hiring a Security Analyst Consultant. As Security Analyst Consultant, you will:. Undergraduate degree in cyber security, information technology or computer science or 4 Years of Equivalent in the information technology. ...
Responsibilities include: responding to suspicious cyber security activities, incidents, and tickets; analyzing information from a wide range of sources including logs and data from network devices, applications, and security tools, from other security and IT professionals, and from Internet sources...
Candidates for this role must understand how NAV solutions round out capabilities and processes within the security operations center (SOC) and the availability of managed security services (MSS) to gain access to additional security expertise, increase security detection and response capabilities, ...
Typically requires a bachelor’s degree in security management, Criminal Justice, Business Management, or similar curriculum and a minimum of 5 years’ experience working in Industrial Security, Information Assurance/Cyber, Special Programs, security management, military, or government information sec...