- UpvoteDownvoteShare Job
- Suggest Revision
Experience with managing, deploying and configuring TLA network/system components such as Cisco Firepower Firewalls, Intrusion Prevention Systems (IPS), Intrusion Detection System (IDS), Content Analysis Systems (CAS), Forward/Reverse Proxy, Malware Analysis Appliance, Network Probe Packet Analyzer, Vulnerability Scanner Assure Compliance Assessment Solution (ACAS), Secure Socket Layer (SSL) Visibility Appliance, and Network Taps.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You can translate investigative capabilities into effective automation, instrumentation, and tooling, based on an understanding of how analysts need to synthesize disparate sets of data from sources such as malware, cyber attack patterns, and closed and open-source intelligence.
$233,100 a yearExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverages scanning tools (i.e., VirusTotal) to conduct suspicious file scanning; performing queries, pivoting on indicators, and malware analysis on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Encase, SANS, ftk, brute force, cyber, incident, response, breach, investigation, analysis, log, endpoint, detection, remediation, ransomware, dfir, malware, network, host, live box, dead box, host based, end point, digital forensics, security, RCA, Root cause analysis, forensics, DFIR, Autopsy, Xplico, SIFT, Investigative, Android, reverse, reverse engineering, malicious, app store, google, google play, mobile app.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with creating, updating, and executing basic scripting – batch, PowerShell, BASH, PythonExperience with technology used to satisfy NIST requirements, such as Anti-Malware, Vulnerability scanning software, Ivanti, Splunk, or etc.
$113,100 - $203,600 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data sources / architecture / application design and software testing practices as it relates to cyber threat intelligence, cyber fraud intelligence, cyber crime, or active defense. Center 2 (19050), United States of America, McLean, VirginiaDirector, Technical Program Management (TPM), Cyber Intelligence.
$233,100 a yearExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain situational awareness of cyber activity by reviewing Intelligence Community and open-source reporting for new vulnerabilities, malware or other threats that have the potential to impact.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This Cyber Threat Analyst position supports the Defense Cyber Crime Center (DC3) and participates as a team member performing threat analyses based on knowledge of cybersecurity and concepts supporting intelligence analysis requirements for all-source cyber analysis and reporting.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following: working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, or security endpoint detection and response.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a Tier 2 IR Day Shift Back to work supporting our client in Ashburn, VA Clearance: US Citizen Salary: $109,000 Requirements: Must be a US citizen, no clearance required, prefer Secret Clearance with the ability to obtain TS/SCI. - Bachelor’s degree in Science or Engineering Field, IT, or Cybersecurity or related field 3+ years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any experience with penetration testing, malware analysis, network traffic analysis. Leidos is seeking an Artificial Intelligence (AI) Cybersecurity Researcher / Engineer to support the Department of Homeland Security (DHS) Office of the Chief Information Security Officer.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understand and recommend Cyber Security IT/OT concepts and architecture and how to best protect against viruses / malware and other threat vectors across ISC assets (aka the Connected Enterprise.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Encryption/decryption, managing multiple partitions (LPARS), anti-virus/malware Position Summary IBM i experience, leveraging analytical skills and experience with IBM i to support and enhance business operations.
TemporaryExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with any of the following systems/products also a plus: scripting, enterprise antivirus management, data loss prevention, malware detection, intrusion detection/prevention, penetration testing/vulnerability scanning, web application firewall.
ExpandApply NowActive JobUpdated 5 days ago
malware job
FEATURED BLOG POSTS
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.