And investigations related to network breaches unauthorized access of data through computer forensics and incident response.May perform duties as a cyber security threat hunter. track threat..
MA MS or 10 yr w. BA BSExperience utilizing Commercial Off The Shelf (COTS) OSINT tools which include but are not limited to the Berber Hunter Tool Kit applications (, SILO, SCRAAWL, Data Miner..
Aligning its implementation across the mission acquisition lifecycle.Maintain and promote a comprehensive and holistic cybersecurity engineering view while addressing stakeholder security risks..
Our pride and dedication shows in everything we do from intelligence analysis, cyber operations and IT.. military and government to recognize, manage and defeat threats inspires us to push ourselves and our..
Global Engineering and Technology (GET) is seeking qualified applicants for Threat & Warning Analyst in.. The Threat & Warning Analyst collects, processes, analyzes, and disseminates cyber warning assessments..
The Warnings Analyst collects, processes, analyzes, and disseminates cyber warning assessments. This key.. related to designated cyber operations warning issues Monitor and report validated threat activities..
Reviews continuous audit and vulnerability assessment data and collaborates with the threat intelligence.. Associate's degree with 10. years, or Bachelor's degree with 5. years of related cybersecurity..
We currently have a career opening for a Senior Cyber Security Engineer. Purple Team within our Cyber.. Integrate threat intelligence, offensive, and defensive cyber security solutions Develop and maintain a..
We aim to be a world class cybersecurity organization that enables Cardinal Health to be healthcare's.. Cyber Threat Operations Center (CTOC) Overview The is a pivotal role on the Security Incident Response..
Description. Salary Range. 62.07 hour. 72.98 hourTechnical SummaryDo you enjoy information security research and providing solutions to better protect networks from cyber threat adversaries? Do..
Whether the focus is on space exploration, national security, cyber security, or cutting edge.. to support DCO. Adapt technologies to meet the mission architecture and threat. Qualifications Required..
Whether the focus is on space exploration, national security, cyber security, or cutting edge.. architecture and threatAdvises on technical design and implementation of Defensive Cyber Operations..
Whether the focus is on space exploration, national security, cyber security, or cutting edge.. architecture and threatAdvises on technical design and implementation of Defensive Cyber Operations..
Security Operations Center Watch Analysts provides 24x7 support to monitor and implement cyber threat mitigation and to obtain steps that an adversary must go through to achieve their goal..
Leidos is seeking a Cyber Security Analyst in Colorado Springs, CO. This position provides Tier II Cyber.. including the analysis of non alert based traffic, to uncover potential threats in the absence of..
And information security is a plus.Completed FSO Program Management for Possessing Facilities and Insider Threat Training.COMSEC, OPSEC courses.In depth knowledge of 32CFR, Part 117, Executive..
This position will report directly to the Cyber Security Operations Watch Lead, with regular interaction.. Recommend appropriate countermeasures to deter and stop cyber threats. Conduct cyber vulnerability..
Description Leidos is seeking a Cyber Security Analyst in Colorado Springs, CO. This position provides.. Stay abreast of current threats and trends in the cybersecurity landscape to inform proactive defense..
Implements Leidos Corporate Insider Threat Program at the facility level. Maintains contract DD254's and.. Must hold a current DoD Top Secret SCI Clearance. Command Cyber Readiness Inspection (CCRI) Experience..
Bash, Perl, Python, JavaScriptWe are seeking a skilled and experienced Threat Detection SIEM Engineer.. The ideal candidate possesses a strong background in cybersecurity, SIEM technologies, and hands on..
Description. At Regions, the Cyber Security Architect contributes to the advancement of Regions' cyber security program and its capabilities through developing, communicating, and implementing a..
Description. At Regions, the Cyber Security Architect contributes to the advancement of Regions' cyber security program and its capabilities through developing, communicating, and implementing a..
We are hiring for a Senior Software Engineer to join our firm. This Software Engineer will work on the Bounty Hunter System, a Defensive Space Control Program of Record for the United States..
Point Solutions expanding our Federal Services Team! We are currently seeking a Cyber Warfare Subject.. This position provides cyber warfare strategic planning and analysis. An active TS. SCI clearance with..
Point Solutions Group is seeking multiple Cyber Policy and Integration Subject Matter Experts (SME) to.. This position provides defensive cyber capabilities for space (DCOS) strategic planning and analysis..