Analyst will be a resident technical expert within the Security Operations Center (SOC). This role is for a senior level... individual contributor role on the Cyber Defense - Computer Security Incident Response Team (CSIRT) and will be working closely...
(GCFA) Certification, GIAC Certified Intrusion Analyst (GCIA) Certification, or GIAC Network Forensic Analyst (GNFA...Cyber Capability Developer The Opportunity: As a cyber professional, you know that understanding adversary tactics...
Intrusion Analyst (GCIA) Certification GIAC Network Forensic Analyst (GNFA) Certification Clearance: Applicants selected...Cyber Capability Developer The Opportunity: As a cyber professional, you know that understanding adversary tactics...
Registered Intrusion Analyst (CRIA), Certified Network Intrusion Analyst (CCNIA), Certified Host Intrusion Analyst (CCHIA); SANS...This role may be based in New York City or Washington DC. This is a leadership role to create and grow Cyber Incident...
Registered Intrusion Analyst (CRIA), Certified Network Intrusion Analyst (CCNIA), Certified Host Intrusion Analyst (CCHIA); SANS...This role may be based in New York City or Washington DC. This is a leadership role to create and grow Cyber Incident...
environments and identify security gaps through the eyes of an adversary. ESSENTIAL FUNCTIONS Conduct cyber intrusion analysis... Forensic Analyst (GCFA) GIAC Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) PHYSICAL REQUIREMENTS...
, innovate, and secure your career. Sentar is seeking a Cyber Threat Intelligence (CTI) - Technical Lead in Charleston, SC...-makers. Lead a team in identifying cyber threats, trends, and new developments by analyzing open-source intelligence (OSINT...
of CSU Cyber Fusion Center. The CSU Chancellor's Office, located on the waterfront adjacent to the Aquarium of the Pacific... a Director of CSU Cyber Fusion Center to serve as the strategic and operational leader of the CSU Cyber Fusion Center, driving...
Description: Tyto Athene is searching for a Cyber Defense Forensics Lead to support a law enforcement customer... in Ashburn, VA. You will play a critical role in leading in-depth analyses and responding to incidents from cyber threats facing...
Cyber Threat Hunt Analyst conducting advanced threat hunting and forensic analysis. 5+ years of hands-on experience...Description: Tyto Athene is searching for a Cyber Threat Hunt Team Lead to support a law enforcement customer...
Intrusion detection and incident response Malware analysis Security content development (signatures, rules, etc.) Cyber...Description: Tyto Athene is searching for a Cyber Threat Intelligence (CTI) Lead to support a law enforcement...
Registered Intrusion Analyst (CRIA), Certified Network Intrusion Analyst (CCNIA), Certified Host Intrusion Analyst (CCHIA); SANS... and grow Cyber Incident Response (CIR) in the Americas, specifically: To be an exceptional leader with the ambition, ability...
) GIAC Certified Incident Handler (GCIH) GIAC Certified Intrusion Analyst (GCIA) AWS Certified Security – Specialty...Responsibilities Peraton is seeking a Cyber Analysis Lead. Peraton’s Defense Mission and Global Health Solutions...
US Citizenship Required: Yes Job Description: Own your career as a Cyber Security Analyst at GDIT. Here, you’ll have the... are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on Cyber...
to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management... Job Qualifications: Skills: Cybersecurity, Intrusion Detection System (IDS), MITRE ATT&CK Framework Certifications: None Experience...
Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion...Open Systems Technologies Corporation is looking for a Cyber Capability Developer to join our high performing cyber...
Celestar Corporation is seeking a Mid-level All-Source Analysis CI Cyber Intelligence Analyst to support The U.S. Army... (ICAC). · Use of Cyber Intrusion, SIGINT, HUMINT, IMINT, GEOINT, and OSINT databases to research and analyze raw reporting...
(ICAC). · Use of Cyber Intrusion, SIGINT, HUMINT, IMINT, GEOINT, and OSINT databases to research and analyze raw reporting... category, Cyber Analyst, shall be used for Counterintelligence Cyber Analysis Support as well. Its definition is removed...
**Must be a U.S. Citizen** Phoenix Cyber is looking for SOC Analysts to join our client delivery team. This is onsite... traffic, Intrusion Detection Systems (IDS), security events and logs; Prioritize and differentiate between potential intrusion...
**Must be a U.S. Citizen** Phoenix Cyber is looking for SOC Analysts to join our client delivery team. This is onsite... traffic, Intrusion Detection Systems (IDS), security events and logs; Prioritize and differentiate between potential intrusion...