- UpvoteDownvoteShare Job
- Suggest Revision
O Incident Response, Threat Hunting, Vulnerability Mgmt., Intrusion analysis, Information Assurance, Watch Officer are the most common job roles/environments candidates will come from. Typical tasks include performing monitoring operations; reporting cyber security events and anomalies; providing analysis and recommendations, Vulnerability Management (VM) and Malware Protection / Vulnerability Assessment and Analysis (VAA), Intrusion Analysis and Correlation Information, incident handling, mission operations transfer, exercise and assessment support.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
NMAP Endpoint Detection and Response (EDR) tools Linux CLI, Powershell, Windows CLI Metasploit Kali Linux Protocol Analyzers, Password Crackers, Vulnerability Assessment Command Line Tools: netstat, nslookup, netcat etc Pyhton, Bash Scripting Threat Modeling (ATT&CK, MITRE, Kill-Chains.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ARES is seeking an experienced cybersecurity analyst to join our security control assessment, vulnerability assessment, software assurance, and risk assessment teams supporting our Nation’s ballistic missile defense program.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with red team penetration testing or offensive penetration testing, or cyber threat emulation. C ond uct cyber threat analysis and Mission-based Cyber Risk Assessments for weapon and space system operations, including satellites, ground stations, and command and control networks.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the independent operational assessment organization for the MDS, The MDS OTA Team is actively involved in test, assessment, and analysis tasks that occur in cooperation the Missile Defense Agency and Warfighter communities.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This individual will perform research, analysis,and data gathering activities while conducting threat, vulnerability, andcapability maturity assessments. ARES is seeking an experienced senior cybersecurity analyst to join oursecurity control assessment, vulnerability assessment, softwareassurance, and risk assessment teams supporting our Nation's ballisticmissile defense program.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Manages the system/application Assessment and Authorization (A&A) efforts, including assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Department of the Air Force policies (i.e., RMF.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with DoD RMF Assessment and Authorization (A&A) process. Experience with Assured Compliance Assessment Solution (ACAS) Provide the collected data to Information Systems Security Engineers (ISSE) in support of their assessment of system cyber security posture and support the cyber security operations staff in resolving complex cyber security issues as requested.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant work experience in Information Technology and Cybersecurity, including roles in SOC, Network/Security Engineering, Threat Intelligence, or similar domains. IAT II (Security+, CySA+, CCNA Security, GICSP, GSEC, SSCP.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Establish, organize, and maintain a CBRN control center, if needed, based on IRMP threat assessment. Perform risk, threat, and vulnerability assessments as required and provide written findings and recommendations on corrective actions to the Readiness and Emergency Management Manager.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Freeport-McMoRan has reviewed the jobs at its various office and operating sites and determined that many of these jobs require employees to perform essential job functions that pose a direct threat to the safety or health of the employees performing these tasks or others.
ExpandUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As part of the Specialized Warfighter Development Contract (SWDC) the Warfighter Simulation and Services (WSS) team offers opportunities to support the U.S. Missile Defense System through the development of Modeling and Simulation applications used in warfighter training and exercises, concept evaluation, developmental engineering, testing and verification, and assessment.
ExpandUpdated 11 days ago
threat assessment jobs in Colorado Springs, CO
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.