is looking for business analysts to work with a large federal agency! As a Business Analyst in Business operations and Content Strategy...Business Analyst Employment Type: Full-Time, Experienced Department: Information Technology CGS...
to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program to provide leading cyber... cyber incident a continuous on site presence will be required. What you’ll do: Provide static and dynamic malware...
: Secret Public Trust/Other Required: None Job Family: Military Operations Job Qualifications: Skills: Management... Trainings, Military Operations, Training and Development Certifications: None Experience: 6 + years of related experience...
activity. We are seeking Cyber Information Technologies Requirements Manager to support this customers Engineering & Operations... personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber...
with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations... (Certified Ethical Hacker) or CFR (CyberSec First Responder) or Cloud+ or CySA+ (CompTIA Cybersecurity Analyst) or GCED (GIAC...
Cyber Group. Location: Arlington, VA We are currently seeking a Senior Power BI Developer with experience in SharePoint..., CSS, HTML, AJAX, and web services. Experience with PowerShell commands for backup and restore operations...
desktop, technical writing, technical editor, editor, cybersecurity, cyber security, secret, TS, Top Secret, top secret, sci..., clearance, governemtn, DARPA, TS/SCI, DHS, federal, technical writer, business analyst, CONOPS, SOPs, standard operating...
, particularly in cyber operations, computer network defense, or security incident management roles Experience with endpoint...) with strong knowledge of incident management practices Incident Response or Security Operations certification(s) (e.g., GIAC Certified...
threat hunting operations at petabyte scale. - You will participate in an on-call rotation and provide ad hoc support...) and is responsible for proactively seeking out threat activities which pose a risk to our customers and business operations. Our threat...
, and procedures (TTPs). - You will build custom capabilities to uncover threats and enable threat hunting operations at scale... to identify cyber threat activities at scale. - Work individually and/or as a team on high priority security issues. About the...
, and procedures (TTPs). - You will build custom capabilities to uncover threats and enable threat hunting operations at scale... to identify cyber threat activities at scale. - Work individually and/or as a team on high priority security issues. About the...