- UpvoteDownvoteShare Job
- Suggest Revision
Phia is seeking a motivated Cyber Threat Analyst with a passion for protecting large enterprises from cyber threats and a desire to advance their career in a dynamic and challenging environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Digital Consultants is seeking a Cyber Security Analyst to join the team supporting NCIS in Quantico, VA! Cyber Security AnalystJob Details. Experience in the development of RMF Assessment and Authorization (A&A) Security Plans (SP), System Level Continuous Monitoring (SLCM), Ports, Protocols and Services Management (PPSM), Host Based Security Systems (HBSS), Assured Compliance Assessment Solution (ACAS) vulnerability scanning.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a talented and motivated Advanced Blue Cyber Analyst to join our client s team. Blue Cyber Analyst. Blue Cyber, Cyber Analysts, Cyber Operations, Cybersecurity, Network Operations, System Engineering, Security Engineer, Networking, Sec+, Security Plus, 8570, CCNP, CCIE, CISSP, CASP, CEH.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform operation and maintenance activities in support of existing CIC cyber tools and technologies (MSV, Qualys, Tenable Nessus and others). Implement strategies for CIC cyber defense technologies, ensuring integration and alignment for continued operation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The American Heart Association has an excellent opportunity for a Sr. Cyber Risk Analyst in our National Center office located in Dallas, TX. (Home-based work available) The Business Technology (BT) Sr. Cyber Risk Analyst is responsible for risk identification and management across the BT department and the overall American Heart Association organization.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key Words: Cyber, Cyber analyst, CEH, Sec +, Security plus, CYSA, Linux, Windows,Analyst, Splunk, Colorado, Cleared roles, Cleared, Government, COTS, Zachary Piper Solutions is currently seeking a Cyber Security Analyst who will support a government contract located in Auroa, CO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Sr. Cyber Security Risk Analyst will partner with all appropriate parties which includes, but is not limited to: other departments, service providers, application service providers, technology staff, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Analyst is responsible for providing technical security advice, guidance, design and operations in support of Security Operations with an emphasis on cloud based deployments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Threat Analyst, Senior. As a cyber threat specialist on our team, you'll help customers solve problems using the latest software like Splunk, Carbon Black, Tenable, and SIEM products.
$81,800 - $186,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a talented Cyber Threat Intelligence Analyst to join our team to support a federal customer within the customers Security Operations. The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following:Identify, track and investigate high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
I2X ISYS TECHNOLOGIES offers top-notch technology and engineering services with a focus on cyber security management. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, ISYS is ready to offer you the chance to make a real-world impact in your field and for your country.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one certification from the CSSP Incident Responder Category (CEH, CFR, CCNA Cyber Ops, CCNSecurity, CHFI, CySA+ Strong understanding of cyber threat actor motivations, TTPs, cyber kill chain, vulnerability threat intelligence, and MITRE ATT&CK framework.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. Ability to author cyber investigative reports documenting digital forensics findings.
ExpandApply NowActive JobUpdated Today
Title: cyber analyst Company: Illuminate Technologies Uk Ltd
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.