- UpvoteDownvoteShare Job
- Suggest Revision
Bluehawk is seeking a seasoned Senior All Source Analyst to support the Defense Counterintelligence and Security Agency's (DCSA) Insider Threat Management and Analysis Center (DITMAC), focusing on Secured Internet Protocol Router Network (SIPR) User Activity Monitoring (UAM) Analyst services based in Tampa, FL. This essential position involves conducting insider threat analysis for SIPR UAM initiatives, catering to both DCSA and various other Department of Defense (DoD) agencies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, the contractor shall possess active accounts for the MARCORSYSCOM Vital Information Portal for Enterprise Resources (VIPER), Defense Logistics Agency (DLA) Logistics Information Services Web Federal Logistics Information System, DLA Federal Logistics, USMC Logistics Command Logway site, Intel Link on the Secret Internet Protocol Router (SIPR) Network and the MC Technical Publications Site in order to support systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical proficiency in at least one enterprise SIEM platform (i.e. ArcSight, Envision, Q1 Radar, Nitro Security), and at least one enterprise Network Intrusion Detection System (i.e. HP Tipping Point, Sourcefire, McAfee.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum two (2) certifications: CompTIA (e.g. A+, Network+, or Security+), Microsoft (e.g. MCSE, MCSA, or MCDST), ITIL Foundations, Dell Certification, etc. Strategic Innovation Group (SIG) seeks several full-time 1099 contractors to serve as IT Analyst (Tier 1/Tier 2) providing onsite and remote support to the Washington Metropolitan Area Transit Authority (WMATA.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Calhoun International is seeking a qualified Open Source Analyst to support INDOPACOM J2 / JIOC. The OSINT analyst conducts all-source analytic production on sources and products of information available from public, private, and U.S. and foreign Government open source materials within established security protocols.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Both the Digital Network Exploitation Analyst (DNEA) Development Program (DDP) and the Intrusion Analyst Skill Development Program (IASDP) are 3 year programs that combine formal training (i.e., SIGINT, discovery/analysis, and advanced cyber security) and diverse work assignments.
$85,052 - $187,662 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
And we are the only NDR platform that leverages the power of Open Source projects in addition to our own technology to deliver Intrusion Detection (IDS), Network Security Monitoring (NSM), and Smart PCAP solutions.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Or an Air Force weapons school graduate Experience with or understanding of electronic warfare and/or passive RF collection modeling Experience with space surveillance network sensor operations, or other SOSI network sensor operations Fluency in agile software development using object-oriented languages such as C.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers, and workstations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as a Management Analyst for varied technology and integration projects managed by Network and Telecommunications Services (NTS) Directorate and is responsible for action officer, analysis, (cont.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Analyst / Network Security Analyst. Network Security Monitoring – FireEye NX, Endpoint, Splunk. Network Intrusion detection tools – Snort, Security Onion, SolarWinds.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GENERAL DUTIES:Provides technical and programmatic Information Assurance services in support of DC3 network and information security systems utilizing tools such as ACAS, FireEye, HBSS, PaloAlto, SCCM, SCOM, SolarWinds, Splunk, and Tanium.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Examples of supported requirements include documentation and system authorization artifacts (e.g., System Security Plans, lifecycle documentation, continuous monitoring plans, Security Assessment Plans, Security Assessment Reporting, Risk Assessment), DoD security hardening, collection, and assessment tools (e.g., STIGs, ACAS SCAP, Nessus), security architectures, firewalls and network access.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working closely with technical teams on their crypto-economic model, smart contract security, and other questions that come up around protocols and software. They are a visionary who can see a clear future of Web 3 despite the ever-present noise, and will leverage their network in the crypto space to build relationships and aggressively drive deals forward to close.
Full-timeExpandApply NowActive JobUpdated 8 days ago
network security jobs Title: analyst
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!