You will manage complex security plans and component configurations, complete self-assessments, and computer security projects. Serve as the Information Systems Security Officer (ISSO) role as the author and owner of comprehensive cyber security document packages. Collaborate with customers in the d...
Jacobs has an opening for an intelligence analyst for microelectronics to join an interdisciplinary team at Lawrence Livermore National Laboratory. Use independent judgment to contribute to the development of a focused national security research program in assigned areas that address complex key sci...
Are you interested in joining some of the brightest talent in the world to strengthen the United States’ security? Come join Lawrence Livermore National Laboratory (LLNL) where our employees apply their expertise to create solutions for BIG ideas that make our world a better place. We have an openin...
The Senior Cybersecurity Analyst is responsible for implementing cybersecurity strategies outlined in the company's roadmap to safeguard digital assets and operations. Reporting to the Chief Information Security Officer (CISO), this role executes the Information Security Program. Information Securit...
The selected Contract Analyst will solicit, negotiate, award, and administer contracts for research and development, international physical security, non-proliferation, cyber security, space systems, intelligence, energy security, biosecurity, chemical security, and advanced sensing and technology ...
Information Security Analyst (Incident Response). The Information Security Analyst Incident Response operates across a complex IT environment, encompassing traditional data centers, Software as a Service (SaaS) services, multiple cloud providers, and a diverse end-user environment. The ideal candida...
Our notable retail client is seeking a Senior Security Analyst to join their global security team. Functional Role: Senior Security Analyst. This person will be responsible for the security roadmap and periodic cybersecurity activities. Bachelors or relevant security certifications (CEH, OSCP, GIAC)...
Role: Security Technical Consultant. Investigate intrusions and security events. Perform forensic analysis using security tools and processes. Identify, contain, eradicate, and recover from security incidents. ...
Are you interested in joining some of the brightest talent in the world to strengthen the United States’ security? Come join Lawrence Livermore National Laboratory (LLNL) where our employees apply their expertise to create solutions for BIG ideas that make our world a better place. We have an ...
Are you interested in joining some of the brightest talent in the world to strengthen the United States' security? Come join Lawrence Livermore National Laboratory (LLNL) where our employees apply their expertise to create solutions for BIG ideas that make our world a better place. We have an openin...
Role: Security Technical Consultant. Investigate intrusions and security events. Perform forensic analysis using security tools and processes. Identify, contain, eradicate, and recover from security incidents. ...
The Cloud Security (CS) Analyst is responsible for the secure operation of all Amazon Web Services (AWS) cloud instances (i. This includes monitoring system alerts, analyzing IDS alerts, checking server and firewall logs, scrutinizing network traffic, interfacing with Cloud Security Vulnerability An...
IT Security and Compliance Analyst who will be crucial in upholding our ISO 27001 and ISO 27018 certifications and managing various aspects of our security and compliance framework. Conduct detailed security assessments of vendors, reviewing SOC2 documentation and other relevant security credentials...
Role: Information Security Analyst. A defense contractor is seeking an Information Security Analyst with 3+ years of experience in classified programs, working onsite at Point Mugu Naval Air Station in Camarillo, CA. Between 3 and 10 years of practical CEAT computer security experience in secure net...
We have an opening for a W87-1 Modification Program (MOD) Lead Engineering Business Analyst. Lead, oversee, mentor, and provide training, guidance, and direction to the W87-1 Business Analyst team, setting work priorities, tasks, and requirements across the program scope. Experience supporting the N...
We have an opening for a W87-1 Modification Program (MOD) Lead Engineering Business Analyst. Lead, oversee, mentor, and provide training, guidance, and direction to the W87-1 Business Analyst team, setting work priorities, tasks, and requirements across the program scope. Experience supporting the N...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Stay abreast of the full spectrum of security services portfolio, especially those that they may compliment the RRR service; seek out new ways to position our services to generate new opportunities and pull-through business for the Threat Research Advisory Center (VTRAC). Stay updated on the latest ...
This role will be responsible for managing the cybersecurity risks (identifying, assessing, managing, monitoring and communicating cybersecurity risks) and security policies (facilitate development, maintenance, and evolution of the security policy framework, and work with all security teams to impl...
Security Analyst to coordinate with the Client’s Dental and Vision IT staff to keep the infrastructure and data secure within the CDV secure enclave and to bring the following skills:. Monitor security reports on vulnerabilities and anti-virus status on configured items and to work with the CDV-IT t...
Implements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities. ...
Design and implement security standards for healthcare enterprise systems and software applications. ...
The Security Analyst will work directly with product groups, technology teams, and the wider Information Security & Privacy group to analyze cyber risk scenarios across the organization. The Security Analyst will be a point of contact for their relevant technology teams and will provide visibility a...