- UpvoteDownvoteShare Job
- Suggest Revision
Tier 1 Network Operations & Security Center (NOSC) Analyst. A minimum of six (6) months experience in one or more of the following: computer network penetration testing/techniques; computer evidence seizure, computer forensic analysis, data recovery; computer intrusion analysis/incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices, multiple operating systems, and secure architectures.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SANS Global Information Assurance Certification (GIAC) Certified Network Forensic Analyst (GNFA) SANS Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Desired Skills Splunk Proofpoint Fidelis Solera Windows Linux Operating Systems Characteristics Investigates, analyzes, and responds to cyber incidents within a network environment or enclave. : Yes Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in engineering and operations & maintenance of enterprise Network platforms (e.g., Cisco, Juniper, Arista, Aruba, Palo Alto). Out of Band Network Management, Port Security, Comply to Connect and Zero Trust requirements.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert understanding of network analysis tools such as Analyst Notebook and Palantir. More than three years of experience conducting network analysis in support of attack the network or CBRN/WMD operations to include counter-facilitation.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This Network Analyst position is located in Northern Virginia with flexible core hours. The Network Analyst (NA) will be responsible for daily substantive work to the Senior Management Team. The NA will also be a member of multidisciplinary teams.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Should have 5 years of experience serving as a digital media analyst or as a computer forensic analyst. SANS Global Information Assurance Certification (GIAC) Certified Intrusion Analyst (GCIA.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The analyst will report to the Americas Intelligence Officer also based in Reston, VA. Travel will primarily be within the United States. Knowledge of network intrusion, cybercrime, economic crime, or anti-money laundering threat trends.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We're seeking a Secret cleared IT Operations Analyst to bolster our team supporting the Department of Defense. Production Operations - Computing Environment: At least one of the following certifications is required: CompTIA Linux+ Linux LPIC-1 or LPIC-2 certification CompTIA Server+ Cisco Certified Network Associate (CCNA) or Higher CompTIA.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Counter Threat Network Intelligence Analyst will provide embedded and reach back support to Countering Weapons of Mass Destruction (CWMD) and Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyze log files from a variety of sources (e.g., individual host, network traffic, firewall, and intrusion detection system (IDS) logs) to identify possible threats to network security.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
What You ll Get to Do As an Exploitation Analyst, you will: Apply your deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed Be part of a team, working with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience detecting, monitoring, and remediating various aspects of CS, to include physical, SW, and network security; performing compliance control testing, knowledge of evolving cyber threats; developing recommendations and training programs to minimize CS risk; RMF; Zero Trust Architecture (ZTA); Federal Information Security Modernization Act (FISMA) compliance.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Host-Based Systems Analyst - IV - Cyber Network Defense Analysts (CNDA) SME. Desired Certifications: - GCFA, GCFE, EnCE, CCE, CFCE, CISSP, IASAE II, GCIA, GCIH, CSSP Analyst, CSSP Incident Responder, CEH, SANS GIAC GNFA preferred.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Analyst - TS/SCI Full Scope Poly - Dulles, VA. Demonstrate experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack.
ExpandApply NowActive JobUpdated 6 days ago
network analyst jobs in Ashburn, VA
FEATURED BLOG POSTS
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.