The ideal candidate will have a strong understanding of cybersecurity principles, secure Linux systems administration, and data-centric network security best practices. The ideal candidate will have a strong understanding of cybersecurity principles, secure Linux systems administration, and data-cen...
The Senior Cyber Security Analyst/ Elastic Detection Engineer develops SIEM/SOAR capabilities to support the team's Cyber Security Service Provider (CSSP) services. Leidos has a current job opportunity for a Senior Cyber Security Analyst/ Elastic Detection Engineer specializing in data integration, ...
Supports the cybersecurity Risk Management program by validating and/or assessing security controls, developing Risk Assessment Reports (RARs) and interfacing with system owners, Information System Security Managers (ISSMs) and Information System Security Officers (ISSOs). Supports the cybersecurity...
Perform defensive cyber operation duties including, but not limited to, ensuring workstation and server compliancy with Trellix Host Based Security System (HBSS) requirements; identifying cybersecurity incidents using HBSS, Splunk, Security Information and Event Manager (SIEM), and other automated t...
Ensure the cyber risk management team supports Enterprise IT Audits; collaborate with Internal Audit on all Cyber Security Risk-related activities; act as the main point of contact for Cyber Security Risk. The Director of IAM (Identity Access Management) and Cyber Security Risk Management is respons...
EY’s Cybersecurity Practice functions as a center of excellence to assist our consulting practices in planning, pursuing, delivering, and managing large, complex full lifecycle initiatives along with providing expertise in leading practices, methods, and resources in the space of Cybersecurity. Your...
EY's Cybersecurity Practice functions as a center of excellence to assist our consulting practices in planning, pursuing, delivering, and managing large, complex full lifecycle initiatives along with providing expertise in leading practices, methods, and resources in the space of Cybersecurity. Your...
An enterprise client in Hawaii is seeking a Cyber Security Solutions Architect to join their team. This individual will help plan, design, and maintain solutions for the clients cyber security infrastructure to include network, systems, applications, operations technology. Research, evaluate, and r...
Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts, and reports and tracks incident findings and resolutions to customers that include trends, respons...
Can accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD 8500. Possesses knowledge of DoD cybersecurity practice. Bachelor’s degree in Computer ...
Ensures all cyber security operations and tasks are conducted and performed, specifically in technical support for monitoring, correlating, identifying, mitigating, managing, tracking, and supporting processes for security incidents. Develops, maintains, and implements security processes and control...
CEH, CFR, CCNA Cyber Ops, CCNA-Security, CySA+ **, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+, SSCP, CHFI, CFR, CND, CCNA-Security, GCFA, CISA, GSNA,, CISM, CISSP, CCISO. CCNA Security, CySA+ **, GICSP, GSEC, Security+ CE, CND, SSCP, CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, ...
Engineer connections from security devices, security managers, and security platforms across the Theater to the RCC-P SIEM. Bachelor of Science degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science. Must meet at least one of the following baseline ce...
Cyber Security Operator Primary Place of Performance: Pearl Harbor, HI Mandatory Requirements: U. Citizenship and TS/SCI Clearance Years of Experience: Mid - Sr Level (5+ Years) JFL Consulting is currently seeking a talented and motivated Cyber Security Operator to join our team. Our cybersecurity o...
Cybersecurity, Cyber Security Operator, Cyber Operator, Cyber Analysis, Cybersecurity Analyst, Top Secret Clearance, Cleared, TS SCI, TS/SCI,. SRG Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies ...
Lyn Aerospace has an immediate opening for a Cyber Security Specialist. Maintains operational security posture to ensure information systems (IS) security policies, standards, and procedures are established and followed. Prepare and review documentation to include System Security Plans (SSPs), Risk ...
Develop and/or assist in the development of, but not limited to, , System Security Plans (SSP), , Security Assessment Plan (SAP), Security Assessment Report (SAR) Risk Assessment Report (RAR), Plan of Action and Milestones (POAM) System Specific Policies and Procedures, Configuration Management Plan...
Can accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD 8500. Bachelor’s degree in Computer Science or related discipline plus three (+ 3) year...
Cyber Security Analyst I (Exempt). Can accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD DoD Information Assurance Certification and Accredit...
The successful candidate will be a Network Engineer with specific cyber security experience in the areas of conformance testing, network monitoring and cyber security event monitoring and response. Performs compliance reviews of computer security plans, performs risk assessments, and performs securi...
CSA is seeking a Cyber Security Engineer ISSOs to support our Army client in various locations. Manage physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of ...
CACI is seeking a Cyber Security Analyst for the DISA GSM-O II program to support Cyber Operations for our customers at Fort Meade, MD. Cyber Security AnalystJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: TS/SCIEmployee Type: RegularPercentage of Travel ...
Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts, and reports and tracks incident findings and resolutions to customers that include trends, respons...
General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). If not credited toward education requirements, completion of military training in a relevant area such as JCAC ...
Can accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD DoD Information Assurance Certification and Accreditation Process, DOD Instruction Risk...