- UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS DTRA Counter Threat Network Intelligence Analyst, you will provide embedded and reach back support to Countering Weapons of Mass Destruction (CWMD) and Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bluehawk is seeking a seasoned Senior All Source Analyst to support the Defense Counterintelligence and Security Agency's (DCSA) Insider Threat Management and Analysis Center (DITMAC), focusing on Secured Internet Protocol Router Network (SIPR) User Activity Monitoring (UAM) Analyst services based in Tampa, FL. This essential position involves conducting insider threat analysis for SIPR UAM initiatives, catering to both DCSA and various other Department of Defense (DoD) agencies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Dive into the distinctive challenges posed by video on demand and live streaming, where ensuring low latency and high quality videos is paramount across diverse network conditions. The teams within USDS that deliver on this commitment daily span across Trust & Safety, Security & Privacy, Engineering, User & Product Ops, Corporate Functions and more.
$86,555 - $177,777 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA A+ plus CompTIA Security+, CompTIA CySA+, or CompTIA Network+. Providing 24/7/365 monitoring and analysis of Security event alerts across the enterprise network. Other advanced certifications such as Certified Ethical Hacker (CEH) or Certified Information System Security Professional (CISSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Play a pivotal role in monitoring security alerts, incident response, detection, and threat intelligence integration. May be required to work flexible hours or be available for emergency response for network failures; will be on-call and may travel to remote sites for onsite support as needed.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong logical/critical thinking abilities, especially analyzing security events (windows event logs, network traffic, IDS events for malicious intent) This position is responsible leading the team responsible for monitoring the organization's network and devices for security breaches, maintain software such as log management; research latest security trends; Conduct security assessments, and compliance reviews of the SOC operations and assists with Security Policy and Procedure maintenance and training of all SOC personnel.
$113,485 - $170,227 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Administration and/or familiarity with network and host configurations, application security, cloud services, third-party risk management, and role-based access. 1 to 3 years’ experience in either Cyber Risk Management, Security Analyst role, and Disaster Recovery, and related activities, preferably for a financial services corporation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Sev1Tech is seeking an IT Service Management (ITSM) Business Analyst to join our Network Operations Security Center (NOSC) team on a program supporting the Department of Homeland Security (DHS)'s network and security operations.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Generalist understanding of Network, Cloud, Application and Server Security standards and best practices. We own and operate leading entertainment and news brands, including NBC, NBC News, MSNBC, CNBC, NBC Sports, Telemundo, NBC Local Stations, Bravo, USA Network, and Peacock, our premium ad-supported streaming service.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Security Information and Event Management (SIEM) systems, network security tools, and log analysis tools. Knowledge of operating systems, network protocols, and security technologies.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
PREFERRED SKILLS AND EXPERIENCE · Endpoint and network security experience required; IDS, IPS, EDR, ATP, Malware defenses and monitoring experience. · Collaboration: Working closely with other teams in the organization, such as IT, network operations, compliance, and legal, to ensure effective communication and coordination during security incidents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber security business and systems subject matter management expertise in Application Security, Data Security, Data Governance, and Network Security domains. Designs technical solutions for network protection, endpoint security, access control, auditing, and log management.
RemoteExpandApply NowActive JobUpdated 6 days ago
network security jobs Title: analyst
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.