- UpvoteDownvoteShare Job
- Suggest Revision
Proficient understanding of threat vulnerability assessment (TVA) process. At least five years' experience actively designing Electronic Security Systems (ESS) Some knowledge of local and national codes (NEC, IBC, NFPA) related to the design and operation of security systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Specifically in search of: CA/PKI SE: Online Certificate Status Protocol (OCSP), Active Directory, Certificate Authority, CAC Data Storage Technologies: Delinea , Entrust, Gigamon, Palo Alto, NVIDIA, Elastic, Trendmicro , Splunk/Tines, Cameo Cross Domain Solutions SE Threat Assessment/Vulnerability SEs *TS/SCI Full Scope required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with HPC open source parallel programming methods such as pthreads, Open MPI, and UPC.– Experience developing test plans, operational assessment test reports, and associated documentation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Center's analytic domains include mergers and acquisitions, market insight, value-based arrangements, cross-stakeholder and community-level analysis including economic impact of poor health, population health, value assessment, quantification of patient-centered preferences, and digital health.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role you will:Conduct applied research and development in one or more of the following technical cyber areas: cybersecurity, threat informed cybersecurity, weapons and space systems cybersecurity reverse engineering, software development & dev sec ops, analytic development, systems engineering, vulnerability analysis, mitigation development, system assessments, cyber threat intelligence, offensive and defensive cyber operations, AI/ML, and post-quantum implementations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Penetration Tester will provide support for HVA Assessments using methodology by Cybersecurity and Infrastructure Security Agency (CISA) Assessment Evaluation and Standardization (AES) program with broad and in-depth knowledge to conduct offensive cyber operations across the organization globally.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Senior Threat Intelligence Analyst to join our team in the DMV area.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Twelve (12) years of experience in security, systems engineering or system assessment, including recent experience within the last three (3) years in five (5) or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS Senior SI/Cyber Analyst, you will serve as a key member of a threat analyses and strategic planning team embedded with the 389th Military Intelligence Battalion and in direct support of US Army Special Operations Command (USASOC), the Theater Special Operations Commands and other Strategic Partners across the Special Operations Forces Emerging Threat, Operations and Planning Support (SOFETOPS) enterprise.
$180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networksContinuously improve processes for use across multiple detection sets for more efficient operationsUtilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify and analyze threats, using OSINT, Threat Intelligence and enrichment resources. Have experience and understanding of Red Team and Threat Emulation TTPs. Make recommendations and create or modify processes and procedures based on knowledge of sophisticated threat behaviors.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The LCSW is responsible for the application of social work procedures and techniques, including interviewing, behavioral assessment, and evidenced-based therapies, in the evaluation, diagnosis, and treatment of psychological and neuropsychological disorders using the following skills: individual, family and group psychotherapy, couples-therapy, alcohol and drug treatment evaluations.
ExpandApply NowActive JobUpdated Today
threat assessment jobs Title: security engineer in Glenn Dale, MD
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.