Advanced Search


Start New Search:

analyst remote
fully remote
comptia security
identity access management
ethical hacker
information security manager
cyber security analyst
information security analyst
microsoft azure
vulnerability management

Cyber Security Analyst Advisor - REMOTE

Share Job
Suggest Revision
General Dynamics Information TechnologyDallas, TX
  • At GDIT, people are our differentiator!
  • As a Senior Security Analyst supporting the VA Enterprise Security Architecture (ESA) Modernization Support project, you will be trusted to work actively with GDIT security and Cyber-Security professionals to support our VA customer.
  • Our mission within the VA is to ensure Veteran's information, VA information systems and infrastructure is cybersecurity ready.
  • GDIT will accomplish this while ensuring the resiliency of VA's cybersecurity infrastructure through proactive monitoring, adaptive responses, adherence to Federal requirements and best practices, and the recruitment, retention, and development of a world-class cybersecurity workforce.
  • The ideal Senior Security Analyst will have experience in the concepts, terms, processes, policy and implementation of information security.
  • The right candidate will have experience and knowledge of the latest security measures at all stages of an information system life cycle as well as have the ability to solve complex problems involving a wide variety of information systems.
  • A good security analyst must be able to understand and differentiate between critical and non-critical systems and networks.
  • This role is fully remote!
  • Conduct cyber security tests, risk evaluations, assessments and providing results of these activities to leadership
  • + Provide input on configuration changes and risk recommendations as needed.
  • + Perform root cause analysis to identify gaps and provide technical and procedural recommendations that will reduce the exposure to cyber risks
  • + Use data collected from a variety of cyber defense tools (e.g., Vulnerability scanning, IDS alerts, firewalls, network traffic logs) to analyze the security posture of information systems
  • + Support the development and maintenance of security playbook procedures
  • + Respond to and report incidents related to assigned information systems
  • + Provide input and/or develop security processes and procedures
  • + Present and deliver findings based on information gathered in group and individual settings
  • + Perform risk evaluations, respond to incidents, conduct basic forensics (chain of custody, imaging, reporting)
  • + Assist in the development of the security policies and procedures and ensure compliance with those policies and procedures through ongoing monitoring and assessments
  • + Evaluating risks associated with assigned systems, enforcing and assessing the controls and monitoring the security impact of changes to the systems
  • + Provide into to the technical writing team for complex technical documents in support of the program and system Certification and Accreditation efforts
  • + Other duties as assigned
  • + Provide and/or assist in root cause analysis of anomalous events
  • Required Skills and Experience
  • Masters a minimum of 8 years work experience.
  • Ten (10) years of relevant experience may be substituted for education
  • + Experience in the concepts, terms, processes, policy and implementation of information security.
  • Must have experience and knowledge of the latest security measures at all stages of an information system life cycle.
  • Must have the ability to solve complex problems involving a wide variety of information systems.
  • Must be able to understand and differentiate between critical and non-critical systems and networks.
  • + Experience with analyzing vulnerability and penetration testing reports to develop and manage POA&Ms to include risk calculations
  • + Experience using security tools (Nessus, Splunk, Sophos, Security Center, etc.)
  • + Ability to perform Splunk queries to examine and query log data from the Enterprise Logging as a Service system
  • + Proficiency with Microsoft Office products (Word, Outlook, Excel, PowerPoint, and SharePoint)
  • + Must be able to meet customer facility COVID requirements
  • + Must have U.S. Citizenship
  • + Must be able to obtain Public Trust
  • Desired Skills and Experience
  • Knowledge of and the ability to script in either, Perl, Python, or Bash
  • + Experience performing incident response
  • + Experience performing malware analysis
  • + Certified Ethical Hacker (CEH)
  • + CompTIA Cybersecurity Analyst (CySA
  • Certified Information Systems Security Professional (CISSP)
  • + Certified Information Security Manager (CISM) Understanding and experience with eMASS
  • + Must have strong attention to detail
  • + Effective verbal and written communication and presentation skills
  • + Strong planning, organizational, and time management skills
  • + Demonstrated initiative and ability to work independently, as well as strong interpersonal skills that foster the ability to work effectively on teams, communicate effectively
  • COVID-19 Vaccination: GDIT does not have a vaccination mandate applicable to all employees.
  • Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
  • We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country.
  • Bringing the expertise needed to understand and advance critical missions.
  • Shifting the ways clients invest in, integrate, and innovate technology solutions.
  • We ensure today is safe and tomorrow is smarter.
  • On the ground, beside our clients, in the lab, and everywhere in between.
  • Offering the technology transformations, strategy, and mission services needed to get the job done.
  • GDIT is an Equal Opportunity/Affirmative Action employer.
  • All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

Similar jobs:

  • All Jobs
  • Active
StateRAMP PMO Information Security Analyst (Remote)
Knowledge ServicesDallas, TX
One or more of the following security certifications (or other relevant security certifications): CompTIA Security+, Certified Ethical Hacker, Associate of ISC2, SSCP, CCSP, GCLD, GCIH
Cyber Security Risk Vulnerabilities Engineer
Request Technology - Craig JohnsonDallas, TX
Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP) are preferred
Cyber Security Analyst
Wilson Elser Moskowitz Edelman & Dicker LLPDallas, TX
This role can be fully remote from anywhere in the country that Wilson Elser has an office or on site in White Plains or NYC.
Cyber Security Analyst
Wilson ElserDallas, TX
This role can be fully remote from anywhere in the country that Wilson Elser has an office or on site in White Plains or NYC.
Senior Cyber Security Analyst
Pinnacle Group, IncDallas, TX
This person will be assisting with the Demand Intake within the Cyber Security TeamWill help field projects from various departments within the company from and IAM/ Security perspectiveMust have a strong Cyber Security Background including a strong IAM, Governance, and PAM expertise
How do Good Interviewers Prepare for Interviews?

Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.

Cyber Security Engineer II
Request Technology - Robyn HonquestDallas, TX
Looking for a candidate with Security Risks & Vulnerabilities, 5 plus years Windows Unix IT Controls IT Infrastructure Scripting Automation Cloud Azure Frameworks ISO NIST SOC Identity Access Management Authentication anti-Malware Server Firewalls System log correlation and analysis data encryption endpoint detection vulnerability assessments forensic tools web filtering SPAM prevention
Remote Ethical API Security Hacker
CyberCodersDallas, TX
Currently, we are looking for a REMOTE Ethical API Security Hacker who has an Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), GIAC Web Application Penetration Tester (GWAPT), or similar certification.
IT Security Analyst
Crescent BankDallas, TX
At least one of the following certifications is highly desirable: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and Cisco Certified Network Administrator (CCNA).
Cyber Threat Hunter Remote
DeloitteDallas, TX
Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.
How to Reject a Candidate Professionally

When deciding on how to reject a candidate, your first question may be

Cyber Security Analyst
Dallas County Community College District (DCCCD)Dallas, TX
Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Center of Digital Forensics Academic Excellence (CDFAE).
SOC Analyst
ExperisDallas, TX
CEH (Certified Ethical Hacker)
Jr Cyber SOC Analyst IRES - SSFB
Flood ModellerDallas, TX
(the process of which must be completed prior to the anticipated start date) Must have years of experience in an engineering field Must have a current DoD IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have or be able to obtain a DoD CSSP Incident Responder certification(CEH, CFR, CCNA Cyber Ops, CHFI, CySA+ GCFA, GCIH, SCYBER, or PenTest+) no later than 6 months from date of hire.
Cyber Security Analyst (SIEM IDS Incident Response - REMOTE
CapgeminiDallas, TX
+ Scripting language skills in Python or PowerShell are preferred+ Must have Information Security Certifications commensurate with experience, i.e. GCIH, SEC , Network , GCIA, GSEC.Key words: Security Operations Center Analyst SOC Analyst Incident Response Analyst Cybersecurity Analyst Threat Analyst Incident HandlerCandidates should be flexible / willing to work across this delivery landscape which includes and not limited to Agile Applications Development, Support and Deployment.
How Does Salary Pay Work? (Compared to Hourly Pay)

At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.

Cyber Security Specialist, Hybrid Remote
Gibbs & Cox, a Leidos CompanyDallas, TX
· Witness and report on penetration tests, red team testing and similar forms of testing (i.e., Vulnerability Assessment) for OT, IT, and ICT systems
Security Operations Analyst - DoD Skillbridge
Equinix, IncDallas, TX
Information Security education in application and infrastructure security architecture, design, and engineering using technologies, solutions, or frameworks inclusive of OWASP, SAML, firewalls, SSO, IDM, data encryption & enterprise key management, PKI, IDS/IPS, malware management, web content management, SIEM, endpoint security, digital forensics, etc.

Latest Blog Posts: Cover Letter Tips with ExamplesUntil now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing. Practical Ways to Remove Bias from your Hiring ProcessMany employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started. for a Good Character Reference Letter with ExamplesHiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you? to Dress on the First Day of Work (Men & Women)You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work. College Students Should Work While in College?College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses. Ways to Measure Candidate ExperienceYour candidate experience is made up of 4 essential parts to Stall a Job Offer PolitelyYou did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.