Overview: SilverEdge Government Solutions is seeking an experienced and detail-oriented Malicious Network Activities... Expert to support the evaluation of test subjects in the domain of network security. This role involves developing...
SilverEdge Government Solutions is seeking an experienced and detail-oriented Malicious Network Activities Expert... and realistic test materials that assess a test subject's ability to understand and reason about malicious network behavior. The...
Malicious Network Activities Expert to support the evaluation of test subjects in the domain of network security. This role... that test models on detecting malicious network activities Design scenarios involving unencrypted traffic analysis Develop...
Center for an Intelligence customer in Cape Canaveral, FL. The team is seeking a technical cyber defense expert, to perform..., tasking, and organizational resource utilization. Leads and coordinates enterprise-wide incident response activities...
cloud management and security tools and sources to detect indicators of performance issues and malicious activities. Deep... and operate continuous monitoring of network traffic, systems, and applications to detect, analyze, and respond to cybersecurity...
or other organizations supporting cyber OT&E events. Functions as a subject matter expert in cyberspace operations and use... of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). Ability to identify...
&E) activities across a broad portfolio of Navy platforms, weapon systems, information warfare capabilities, and enterprise business..., and operational security is paramount throughout all phases of testing. This role requires expert application of approved tools...
and operational programs. This role provides senior-level support to cyber Operational Test and Evaluation (OT&E) activities... throughout all phases of testing. This role requires expert application of approved tools, resources, and advanced adversary...
of experience performing digital forensic investigations. Hands-on experience with endpoint, server, network, and cloud forensics... investigations following cybersecurity incidents, data breaches, and suspected malicious activity. Perform forensic acquisition...
analysis of network and endpoint logs & activity, executing various types of cyber threat hunts on various agency assets..., malicious actors with the interest, capability and Tactics, Techniques, and Procedures (TTPs). Utilize Cyber Threat...
. Your mission is to: Proactively Hunt: Execute hypothesis-driven threat hunts across the network, endpoints, and cloud environments... to uncover hidden, anomalous, or malicious activity that could bypass controls Leverage Intelligence: Integrate Cyber Threat...
they can cause harm. Your mission is to: Proactively Hunt: Execute hypothesis-driven threat hunts across the network..., endpoints, and cloud environments to uncover hidden, anomalous, or malicious activity that could bypass controls Leverage...
The Exploitation Analyst serves as a subject matter expert (SME) in cyberspace operations, responsible for developing... analysis * Demonstrated proficiency decomposing complex computer systems and network architectures in support of exploitation...
and 12 final digital forensics reports, while providing expert support to CI Cyber Threat and Technical Analyst requirements..., while providing expert support to CI Cyber Threat and Technical Analyst requirements. Perform Digital Media Acquisition...
and Border Protection (CBP), you will be responsible for in-depth technical analysis of network and endpoint logs & activity... priority threat campaigns, malicious actors with the interest, capability and Tactics, Techniques, and Procedures (TTPs...
. Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential... (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology...
for malicious and unauthorized activity, perform vulnerability scanning and application security testing, participate or lead... network traffic and log data, investigating anomalous activity, forensic analysis, and resolution of security incidents...