- UpvoteDownvoteShare Job
- Suggest Revision
CACI is seeking a Cyber Security Analyst for the DISA GSM-O II program to support Cyber Operations for our customers at Fort Meade, MD. GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DoD and COCOM. This position provides 24x7 cybersecurity monitoring services for the Department of Defense network.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS Senior SI/Cyber Analyst, you will serve as a key member of a threat analyses and strategic planning team embedded with the 389th Military Intelligence Battalion and in direct support of US Army Special Operations Command (USASOC), the Theater Special Operations Commands and other Strategic Partners across the Special Operations Forces Emerging Threat, Operations and Planning Support (SOFETOPS) enterprise.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Major duties include penetration testing in support of Defensive Cyber Operations (DCO); assessing Cyber Security plans; bolstering cyber defenses; performing cyber threat emulation; assessing intelligence; assessing malware analysis; remaining cognizant with the missions and priorities of the CPT to which assigned; development and updating of Concept of Operations (CONOPs) and procedures.
TemporaryExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Using advanced cyber techniques, our team of technologists and analysts employ capabilities spanning traditional computing environments to Internet of Things (IoT), including offensive and defensive cyber operations and analysis, signals intelligence (SIGINT) discovery, and data science.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in project and multi-functional security teams requiring interaction with system administrators, networking staff, application developers, IT operations staff, and cyber research and development areas within the organization in order to identify and implement information assurance controls and make risk mitigation recommendations for IT operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience in endpoint security, including EDR, threat intelligence, and incident response, with at least 5 years in a leadership role. Drive continuous improvement in the program's endpoint security operations, policies, and procedures, including incident response and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct applied research and development in one or more of the following technical cyber areas: cybersecurity, threat informed cybersecurity, weapons and space systems cybersecurity reverse engineering, software development & dev sec ops, analytic development, systems engineering , vulnerability analysis, mitigation development, system assessments, cyber threat intelligence , offensive and defensive cyber operations, AI/ML, and post-quantum implementations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
With teammates, stakeholders, and intelligence consumersYou’ll Bring These QualificationsEducation: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Perform cyber intelligence analysis and develop raw intelligence products derived from intelligence reporting, open-source data, and information housed in a custom, classified system based on a proprietary configuration to support investigations, operations, and intelligence production.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyze unit host systems for indicators of Malicious Cyber Activity (MCA), Insider Threat, or lack of Defensive Cyber Operations best practices,document and report findings, and help implement risk mitigating corrective actions.
$122,200 - $220,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requisition Number: 19143 Required Travel: 11 - 25% Employment Type: Full Time/Salaried/Exempt Security Clearance: Ability to Obtain Level of Experience: Mid HI This opportunity resides with Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within HII’s Mission Technologies division.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position serves as part of an interdisciplinary team of faculty teaching programming, security, networking, digital forensics, and cloud security operations. The successful candidate will support HCC’s continued designation as a Center of Academic Excellence in Cyber Defense (CAE-CD) by delivering courses that maintain CAE training standards and staying up-to-date with current technology trends.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Global Dimensions is a HUBZone, service disabled, veteran-owned small business based in Fredericksburg, VA. We are a dynamic, expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a network and access discovery analyst, you will use your spe cia lized te chn ical experience to enable cyber space operations and intelligence collection to enable the success of mission owners.
$81,800 - $186,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
For over four decades, our team has been providing some of the world s most technically advanced full-spectrum cyber, data operations, systems integration and intelligence support services to the U.S. government on its most important missions.
$118,000 - $246,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago
operations cyber intelligence security jobs in Fort Meade, MD
FEATURED BLOG POSTS
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.