This position is to support the United States Central Command J2 Directorate through the analysis of Target intelligence.Your fused analysis and assessment will be vital to the decision making of senior leaders to include the CENTCOM Commander.You will witness the impact of your analysis indirectly ...
Coordinate with Data Engineers to build Data environments providing data identified by Data Analysts, Data Integrators, Knowledge Managers, and Intel Analysts. LMI is seeking a skilled Data Analyst at the client site in Tampa, Florida. Successful Data Scientists demonstrate competency in leading gui...
QinetiQ US’s dedicated experts in defense, aerospace, security, and related fields all work together to explore new ways of protecting the American Warfighter, Security Forces, and Allies. Being a part of QinetiQ US means being central to the safety and security of the world around us. ...
The analyst applies ODNI analytic tradecraft standards to conduct research using a variety of databases and toolsets, compile and analyze complex data, and develop assessments in support of the team’s mission. ...
ECS is seeking an OSINT Report Analyst to join our Tampa, FL team in support of an intelligence related program. Duties of the OSINT Report Analyst include:. ...
Position : Information Security Analyst. Focusing on the digital fraud area of the greater Cybersecurity & Digital Risk team, this individual contributor role will be responsible for Cyber Fraud Investigations and support including triage of alerts, initiating communications to United customers ...
Lead Business Systems Analyst (Information Security) - W2 ONLY - No C2C or Third Parties. Lead Business Systems Analyst is a member of the Security - TPR team. Coordinates the gathering of third-party cybersecurity risk assessment data and prepares cybersecurity risk assessments for critical-related...
Seeking an Epic Security Analyst within 2. Under very limited supervision, this position will administer all aspects of the system security standards and profiles of the Epic system. Monitoring and auditing of security guidelines along with monitoring and auditing changes. Works closely with the Cus...
Position : Information Security Analyst. Focusing on the digital fraud area of the greater Cybersecurity & Digital Risk team, this individual contributor role will be responsible for Cyber Fraud Investigations and support including triage of alerts, initiating communications to United customers (whe...
Seeking an Advanced Security Analyst who will be responsible for maintaining Governance, Risk, and Compliance functions as they relate to Cybersecurity in the Health System network. Advanced expertise on security technologies and solutions and is able to identify any gaps in capabilities of various ...
Issuer Services Ops Tampa Hub perform the contractual obligation activities for more than 300 contracts for the following countries: Panama, Colombia, Peru, Brazil and Argentina.Our business handles a wide variety of types of contracts.No contract is the same; all are tailor made, according to the n...
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security. Develops techniques and procedures for conducting IS, cyber security and access and identity risk assessments and compliance audits, the evalua...
The candidate needs to have the ability to define and drive interoperability with security components of a complex end to end network and cloud security ecosystem, focusing on client experience. The Chief Information Security Office (CISO) is home to deeply talented colleagues that work to ensure th...
Plan & implement Security training materials to end users. ...
Gov is seeking a Cyber Security Analyst to. Knowledge of basic communications, encryption, networking, IT systems, and cybersecurity fundamentals. Ability to develop and disseminate network and cybersecurity status reports, metrics, briefings, or ad hoc reports and presentations as directed by the G...
The Application Security Analyst will be responsible for evaluating new and existing Freedom owned applications to ensure they are designed and deployed in compliance with Information Security standards and industry best practices. Our client, a Mortgage Servicing Compnay is seeking a remote Applica...
Conduct network and system audits using Security Technical Implementation Guides (STIGs), Security Requirements Guides (SRGs), ACAS vulnerability scans, and DISA SCAP. Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall progr...
Analyst will contribute and generate ideas during the entire transaction process. ...
BlueWater Federal is looking for a Cyber Security Analyst to support SOCOM. Maintain multiprotocol routers, multilayer switches, network security devices and network management systems. Perform systems administration, maintenance, computer security, and support for servers on networks and Computer N...
Plan & implement Security training materials to end users. ...
Northrop Grumman Mission Systems is actively seeking an experienced Security Operations Center (SOC) Analyst to fill a role that requires a broad array of knowledge and skills working with team members to support a Cyber Security program based in Tampa, FL. Utilize Splunk Enterprise Security: Levera...
In this role the risk analyst will support cyber security program functions; use program frameworks and guidance to independently evaluate the design and effectiveness of cybersecurity controls within the bank's applications, systems, databases, and platforms; plan and perform cybersecurity assessme...
Goldbelt Nisga’a NTEK, LLC is looking for a for Cyber Security Analyst to support the Global System Support Engineers (GSSE) under the United States Special Operations Command (USSOCOM), Program Executive Office for Special Operations Forces Digital Applications (PEO SDA). The Cyber Security Analyst...
Experienceworking in a NIST Cybersecurity Framework aligned securityprogram. Hold activeinformation security certifications such as: CEH CISSP CISA CISMCCNP CCIE Security GCIA etc. Experience inworking with third parties to coordinate monitor respond to andcoordinate cybersecurity threats incidents ...
Conduct network and system audits using Security Technical Implementation Guides (STIGs), Security Requirements Guides (SRGs), ACAS vulnerability scans, and DISA SCAP. Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall progr...