Cyber Operational Risk Analyst (ORSA). Working as expert to assist JFHQ-DODIN understand, identify, assess, and managing risks effecting the secure operation and defensibility of cyberspace, inclusive of DoD intelligence systems, missions support systems, weapon systems, new technology, capabilities...
Support exercise planning in accordance with the Joint Exercise Lifecycle (JELC) and support exercise and wargame activities through advice on potential cyberspace threat actors and their impact on military operations and government activities, development of exercise intelligence products, and prod...
A company is looking for a Cyber Security Technical Business Analyst. ...
We are ranked as one of Computerworld 's Top Places to Work in IT 5 years running, and we are seeking a Cyber and Information Systems Security Analyst that will play an instrumental role in the design and operation of national security systems. As a Cyber and Information Systems Security Analyst/ISS...
The Cyber Incident Response Analyst is responsible for responding to both existing and emerging threats, as well as identifying attacker tools, tactics, and procedures by analyzing data from a variety of sources and tools. Through a strong understanding of attacker behavior, participates in and mana...
Good knowledge of operating system internals, OS security mitigations, understanding of Security challenges in Windows, Linux, Mac, Android & iOS platforms . Create detections and automations to detect, contain, eradicate, and recover from security threats. Knowledge of system and application securi...
CACI is seeking a Cyber Security Analyst for the DISA GSM-O II program to support Cyber Operations for our customers at Fort Meade, MD. Cyber Security AnalystJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: TS/SCIEmployee Type: RegularPercentage of Travel ...
Prior experience in cybersecurity and/or significant work within the Intelligence community. This role will require the ability to effectively brief topics on cybersecurity up-and-down the organizational hierarchy. Analyst’s Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, lin...
Description Are you searching for challenging and impactful work supporting Highly Classified networks? Are you passionate about cybersecurity operations and policy? If so, we're looking for someone like you to apply and join our team at APL! We are ranked as one of Computerworld 's Top Places to Wo...
This position will work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, ACAS, ESS (HBSS), and security related activities to secure and harden systems. Review cyber events and document Cybersecurit...
Marathon TS has an opening for a Cyber Security Analyst at Ft. The Cyber Security Analyst will enable Command and Control (C2) of the Department of Defense Information Network (DODIN) by ensuring its overall health through 24/7 monitoring, directing, controlling, coordination, de-conflicting, synchr...
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.The Leidos pay range for this job level is a general ...
The Cyber Security Analyst acts as a lead consultant, interfacing between the customer and IT security consulting team throughout the federal information system Security Assessment & Authorization (SA&A) lifecycle process. The Cyber Security Analyst will be actively engaged in identifying unique sys...
Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Amentum is seeking Computer Network Defense Analysts 1-4 (CNDA) to use information collected from a variety sources (e. Computer Network Defense Analys...
Peraton is seeking a System Engineer to be responsible for architectural design and development, end-to-end engineering of interfaces, both internal and external, and architectural level system engineering activities. Bachelor's degree in a Qualified Engineering Field or related discipline from an a...
QinetiQ US’s dedicated experts in defense, aerospace, security, and related fields all work together to explore new ways of protecting the American Warfighter, Security Forces, and Allies. Being a part of QinetiQ US means being central to the safety and security of the world around us. Far Ridgeline...
Senior Operations Research/Systems Analyst (SIGINT). Analyzing legal and policy documents related to the FISA authorities to extract key information from the documents in accordance with operations guidelines and procedures. Assisting in the establishment and maintenance of effective operations and ...
Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. Assist...
You’ll work on a fast-paced team in a lab environment alongside system integrators, design engineers, RF engineers, and test physicists to bring these technologies to life. Today’s dynamic global security threats require solutions both big and small – solutions living within the Northrop Grumman Mic...
As a Network Monitoring Engineer, you will be responsible for maintaining our organization's network infrastructure. Managing, monitoring, maintaining, and securing networks and tenant network segments that integrate the transport of networks and data. Maximus is seeking a Network Monitoring Enginee...
Peraton is hiring an Operations Requirements Analyst to join our Cyber Mission business unit in Fort Meade, Maryland. As an Operations Requirements Analyst on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. As an Operations Requi...
G Vulnerability Research Analyst. Utilize new tools and methodologies to advance mobile technology security for the next generation. Perform penetration testing, conduct vulnerability research, generate reports and brief findings, assist in the development of prototypes, and contribute to the design...
Cyber Training Specialist, Senior. Provide SME support to the management of a DoD-wide training program, including coordinating with Combatant Commands to ensure USCYBERCOM-assigned forces are trained, certified, and interoperable with other Joint Forces. Establish and maintain training and certific...
This position is focused on the end-to-end engineering of interfaces, both internal and external, and architectural level system engineering activities. Peraton is seeking a System Engineer to support the design, development, and testing of Next Generation SIGINT architecture. Bachelor's degree in C...
KBR’s National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. KBR’s work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecuri...