- UpvoteDownvoteShare Job
- Suggest Revision
Peraton’s DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.
$86,000 - $138,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Intelligence Analyst II shall perform site lead duties and support the Operational Intelligence Division (OID), Office of Strategic Intelligence and Information (OSII), Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and the U.S. Department of Justice (DOJ) with intelligence analysis and investigative support.
ExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful Cyber Security Engineer applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks to elevate the security posture of the program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer must display an excellent understanding of technology and utilization of Firewalls (Security Groups), VPNs, Data Loss Prevention (DPS), IDS/IPS, Web-Proxy, Security tools, and Security Audits.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are in search of a Security Engineering & Operations (E&O) Technical Lead to join our National Oceanic and Atmospheric Administration (NOAA) Cyber Security Center (NCSC) Engineering & Operations team.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Performs cyber intelligence analysis and develop raw intelligence products derived from intelligence reporting, open-source data, and information housed in a custom, classified system based on a proprietary configuration to support investigations, operations, and intelligence production.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking Cyber Network Defense Analysts (CNDA) with Cloud Forensics experience to support this critical customer mission. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Capability to support the following systems: ArcSight SIEM, Splunk, Novetta Cyber Analytics, FireEye MPS Suite, Snort IDS, Bro IDS, Fidelis XPS, CloudShield Trusted Cyber Solution Orchestrator, Microsoft Advanced Threat Analytics, Counterattack Active Defense.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the general supervision of the Section Chief, Information Security GRC, this role will provide security expertise and support of the IMF's security assurance program for a) Cloud solutions and b) Financial systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support customer's ability to comply with cyber security and system security requirements to safeguard sensitive data and maintain operational continuity. Support development of cyber security policies and plans to identify and respond to threats and issues in compliance with Army regulations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support formal investigations of misconduct in collaboration and manage responses to Cyber and Data Protection incidents and their resolution in collaboration with the following functions: Corporate Ethics & Compliance, Legal, GRC, Human Resources, Corporate Security/EHS.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Security+, Help Desk, Desktop support, Analyst, VPN, Citrix, VMware, virtual desktops, virtual private networks, Linux, TS/SCi, secret, top secret, DHS Suitability, Windows, Unix, MacOS, Tickets, ticketing, remedy, ServiceNow, er requests via email, walk-ins, phone calls, or other communication means promptly.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our work depends on a Security Control Assessor joining our highly skilled team to be a premier provider of cyber security services to the customer. We provide consummate cyber security risk management "as a service" platform across multiple fabrics and centers.
Full-timeExpandApply NowActive JobUpdated Today
support cyber security jobs Title: specialist cyber security Company: Critical Solutions in Arlington, VA
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.