- UpvoteDownvoteShare Job
- Suggest Revision
Required, preferably in a fast-paced and constantly changing environment with 2-3 years of experience with SIEM, IDS/IPS, vulnerability management, incident response, threat intelligence. Own the Vulnerability management solutions to validate systems are meeting industry hardening benchmarks such as CIS, with continuous tuning, ongoing integration, feature expansion, reporting, validation, and monitoring of endpoint security controls and vulnerability management solutions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform or support activities defined in the NIST RMF to obtain and maintain FISMA compliance; work with the Inspector General (IG) auditing team in support of FISMA audit and RMF assessment teams in support of the SA&A process.
$112,000 - $179,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the maintaining of CG User Account access and performing random account audits on Information Assurance tools to include but not limited to Information Assurance Compliance System (IACS), Assured Compliance Assessment Solution (ACAS), Homeland Secure Data Network (HSDN), Continuous Monitoring Risk Scoring (CMRS), Cyber Operational Attribute Management System (COAMS) and Enterprise Mission Assurance Support Services (eMASS.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Risk Management, in Supply Chain including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
$54,000 - $123,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Web-filtering, Advanced Threat Protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The analyst maintains the computer and information security incident, damage, and threat assessment programs and leads efforts that identifies and resolves potential security breaches and vulnerabilities and leads cross divisional project teams to implement organization wide cyber security enhancements.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience with supply chain risk management, including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of security operations concepts: perimeter defense, BYOD management, data loss protection, insider threat, kill chain analysis, risk assessment, and security metrics.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience with a variety of vulnerability scanners, monitoring, intrusion detection systems, endpoint protection software, and forensic or incident response actions. Behavioral analysis of malware to provide indicators for monitoring.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert Exercise and Assessment, Monitoring & Evaluation Analyst: Analytic Services, Inc. (ANSER) is seeking an Expert Exercise and Assessment, Monitoring & Evaluation (AM&E) Analyst.
Full-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Microsoft Sentinel security information and event (SIEM) tool and other monitoring tools for security monitoring and proactive threat hunting. Support annual self-assessment of threat hunting capabilities against the DHS CSP maturity model.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 7+ years of combined experience in analytical, investigative, threat assessment, law enforcement, and/or executive protection disciplines. Concentric offers strategic advisory services, risk assessments, physical protection, threat intelligence, open-source monitoring, program audits, secure embedded staffing, and training for security teams and intelligence analysts.
$145,500 - $153,300 a yearRemoteExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding/working knowledge of various data sources (e.g., Refinitiv, Crunchbase, Panjiva, NIST NVD, MITRE CVE, etc.) Experience with Databricks Lakehouse Platform is a plus. Selected candidate will provide technical staff with competencies in data science and data engineering that will specifically focus on data science workflow automation, systems engineering of data workflows, development of technical data artifacts, data acquisition from Public and Private sector data sources, and data analysis requirement collection.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have the capability to support the following systems: ArcSight SIEM, Splunk, Novetta Cyber Analytics, FireEye MPS Suite, Snort IDS, Bro IDS, Fidelis XPS, CloudShield Trusted Cyber Solution Orchestrator, Microsoft Advanced Threat Analytics, and Counterattack Active Defense.
$135,000 - $155,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support ISSO/ISSM with Assessment and Authorization (A&A) requirements and drafting/updating security related RMF documentation. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago
threat assessment monitoring jobs in Alexandria, VA
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.