• Cyber Protection

    Chicago, Illinois
    ... operational support to VA-CSOC focusing on expert level analysis for cyber insider threats to include sabotage ... : Access Protection such as user and group management as well as security and audit policy changes ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... such as digital evidence preservation, analysis, data recovery in support of designated cyber security ... forensics analysis and provide recommendations on cyber intrusions, malware incidents and cyber security ...
  • Cyber Protection

    Chicago, Illinois
    ... cyber security investigations, and documentation Conduct forensic evidence collection remotely and on ... corrective actions Perform forensics analysis and provide recommendations on cyber intrusions, malware ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... and Responsibilities may include, but are not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or ...
  • Cyber Protection

    Chicago, Illinois
    ... and Responsibilities may include, but are not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... and Responsibilities may include, but are not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or ...
  • Cyber Protection

    Chicago, Illinois
    ... and Responsibilities may include, but are not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or ...
  • Cyber Protection

    Washington, District Of Columbia
    ... not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to ...
  • Cyber Protection

    Washington, District Of Columbia
    ... not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to ...
  • Cyber Protection

    San Diego, California
    ... to Cyber and Information Operations. May prepare and presents technical reports and briefings. May ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... for threats at every phase of the Cyber Intrusion Kill Chain. Monitor all security ... intelligence and various cyber security threat portals (e.g. Homeland Security Information Network (HSIN ...
  • Cyber Protection

    Chicago, Illinois
    ... based events for potential incidents Monitor for threats at every phase of the Cyber ... . Utilize open source intelligence and various cyber security threat portals (e.g. Homeland Security ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... incidents Monitor for threats at every phase of the Cyber Intrusion Kill Chain. 5 ... . Utilize open source intelligence and various cyber security threat portals (e.g. Homeland Security ...
  • Cyber Protection

    Washington, District Of Columbia
    ... for threats at every phase of the Cyber Intrusion Kill Chain. Monitor all security ... intelligence and various cyber security threat portals (e.g. Homeland Security Information Network (HSIN ...
  • Cyber Protection

    Martinsburg, West Virginia
    ... recommendations on cyber intrusions, malware incidents and cybersecurity related investigations Perform ...
  • Staff Cyber Protection

    Martinsburg, West Virginia
    ... :** Lead a team of Cyber Hunt and Threat Analysts (CHTA) determining if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to investigation ...
  • Principal Cyber Protection

    Chicago, Illinois
    ... Responsibilities:** SIEM (Security Information and Event Management) Application Specialist to provide cyber ... services for the analysis, architecture design, implementation and maintenance support of Cyber Security ...
  • Principal Cyber Protection

    Washington, District Of Columbia
    ... include, but are not limited to:** Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident ...
  • Principal Cyber Protection

    San Diego, California
    ... implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations ...
  • Principal Cyber Protection

    Washington, District Of Columbia
    ... characteristics, and approach to innovation. Roles and Responsibilities: Senior Cyber Security Specialist well-versed in security operations, cyber security tools, and Open Source information ...
  • Principal Cyber Protection

    Kearneysville, West Virginia
    ... characteristics, and approach to innovation. Roles and Responsibilities: Senior Cyber Security Specialist well-versed in security operations, cyber security tools, and Open Source information ...
  • Principal Cyber Protection

    Martinsburg, West Virginia
    ... (Security Information and Event Management) Application Specialist to provide cyber security technical ... support of Cyber Security Applications including but not limited to Log Aggregation and SIEM (Splunk ...
  • Principal Cyber Protection

    Chicago, Illinois
    ... characteristics, and approach to innovation. Roles and Responsibilities: Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation ...
  • C2BMC Principal Cyber Info Assurance Analyst (19-056)

    Schriever AFB, Colorado
    ... Department of Defense cyber mission forces and/or cyber protection teams, or incident response / CERT teams ... candidates for a Cyber Analyst. The successful candidate will have the: Ability to assist in the ...
  • Cyber Systems Engineer/ Principal Systems Engineer

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
  • Cyber Software Engineer

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
  • Sr Principal Cyber Sftwr Engr

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
  • Cyber Software Engineer 2

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
  • Sr Principal Cyber Sys Engr

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
  • Cyber Software Engineer

    Annapolis Junction, Maryland
    ... Adversaries, cybercriminals and cyber terrorists, are working every hour of every day to develop ... and space are imperatives in controlling the cyber domain. Our talented employees make advances every ...
More