As an FBM Configuration Management and Data Management Analyst, you will:. Security Clearance Statement:. This position requires a government security clearance, you must be a US Citizen for consideration. ...
Position Title: Information Security Analyst (Cyber Ops). Minimum of 3 years of cyber planning experience in a Joint or Combined Command Headquarters, National Security Agency, or United States Cyber Command (USCYBERCOM). ...
Due to the nature of the activity, SAP Security Analyst II must have good written and verbal communication, team, and people skills. The SAP Security Analyst II will be responsible for the following additional responsibilities:. Working closely with the Value Streams and Functional teams to understa...
CompTIA Security+ or CompTIA Cybersecurity Analyst (CySA+). Security Orchestration and Automation (SOAR) tools: Familiarity with tools like Palo Alto Networks Cortex XSOAR or Splunk Phantom can make a security analyst more effective in automating repetitive tasks and speeding up incident response. A...
We help a variety of federal agencies in areas such as national security, homeland security, international development, training, analytics, healthcare, and other professional services. Joint or Combined Command Headquarters, National Security Agency, or United States Cyber Command (USCYBERCOM). The...
Develop and update required security-related documents (System Security Plan, Security Impact Analysis, Privacy Impact Analysis, etc. As a Security Analyst you will have the chance to:. Proactively monitor vulnerability scans from multiple Security tools, ensuring identification as early as possible...
EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC) Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC). The Information Security Analyst will be responsible for directly supporting one or more of the following progra...
Validates and verifies system security requirements definitions, analyzes and establishes system security designs and makes recommendations on solutions to meet security requirements. IT experience experience running security solutions on network/security engineering/security operations, with at lea...
Three (3) years or more of information security administration experience in an enterprise environment with 1,000 or more users. Knowledge of security issues, techniques, and implications across all existing computer platforms; and. ...
Minimum of 3 years of cyber planning experience in a Joint or Combined Command Headquarters, National Security Agency, or United States Cyber Command (USCYBERCOM). ...
The Analyst II - We are seeking a skilled Cybersecurity/Network Operations Center Analyst to join our Threat Detection and Response team. Additionally, the Analyst II will be responsible for monitoring, detecting, and responding to cybersecurity incidents across our IT networks, servers, and worksta...
In this role, you'll also deliver engaging training sessions on cutting-edge investigative techniques, working alongside top cybersecurity and legal professionals. If you're passionate about blockchain technology, have a solid background in crypto investigations, excel in smart contract analysis, an...
Additionally, the Analyst will help protect national security while working on innovative projects that offer opportunities for advancement and growth. IAT Level II Certification equivalent or higher per DoD 8140 (CompTIA Security+ CE, CCNA Security, GICSP, GSEC, SSCP, etc. Delivering a broad range ...
Monitor security logs and SIEM systems for abnormal behavior or security-related events, investigating and resolving potential security incidents. Develop and implement security protocols, procedures, and security awareness training programs to promote a security-first culture within the organizatio...
The University of Miami Health System, UHealth, Information Technology Department has an exciting opportunity for a full-time Security Analyst 1 for our 24/7/365 Security Operations Center (SOC) in Miami, Florida. The Security Analyst conducts computer forensic investigations, data recovery, and ele...
SSI is seeking an Information Security Analyst to join our team on a new Navy contract in the summer of 2024. Submit your resume now to be part of the team on this new 5-year program! Opportunities for advancement in IT, telecom, & cyber security!. Research, develop, implement, test and review of in...
The analyst applies ODNI analytic tradecraft standards to conduct research using a variety of databases and toolsets, compile and analyze complex data, and develop assessments in support of the teams mission. ...
Position Title: Information Security Analyst (Special Technical Operations). ...
The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). Augment and assist GISCS Securit...
Maintain at least one security-specific, industry certification for Computing Environment (CYSA+, CCNA Security, CEH, CISA, etc. Complete an information system security course of instruction appropriate to level of responsibilities. Familiar with information system security. Security Clearance State...
The Information Security Analyst works directly with the Information Security Officer (ISO) as a member of the Bank information security team. This position collaborates with Risk Management, Information Technology, Third-Party Risk Management, Enterprise Risk Management, Bank Compliance, Audit, HR,...
Reporting to the Security Risk and Compliance Office Security Manager, the Security Analyst is. The Security Analyst effectively correlates and analyzes security. The Security Analyst is responsible for assisting with the day-to-day operations of securing the departments various. The Security Analys...
Security Compliance and Governance: The analyst must have general knowledge of security compliance frameworks like HIPAA/HITECH and SOC2, as well as experience in security risk identification, analysis, and mitigation. Hands-on Technical Security Skills: The candidate must have direct experience wit...
Primarily responsible for API application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management). Hands-on experience performing application API security assessment, static and dynamic security assessme...
The Security Analyst I is a key contributor in the development, implementation, and monitoring of a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality, and availability of information that is owned, controlled, or processed by IPG. Collabor...