- UpvoteDownvoteShare Job
- Suggest Revision
DLP, Endpoint Security, and anti–malware Required Clearance/Certifications: Active IAT Level II Certification (Sec+, CCNA, CySA+, GICSP, GSEC, CND, SSCP, or equivalent) AND Operating System (OS)/Computing Environment (CE) certification Active or interim Secret Clearance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure discovered cyber incidents, including misuse, virus/malware, penetrations, and data spills are reported per standard operating procedures (SOP); support investigations and remediation/clean up as necessary.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Fundamental knowledge of NIST, MDM, OWASP, PowerShell/Python/JavaScript, MacOS, malware analysis, LOLBAS, vulnerability management, WAF, CIS Benchmarks. GCIH, GCIA, GMON, GCED, or equivalent GIAC defense focused certifications desired.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Computer engineering, electronic engineering, information technology, malware, processor, programming, radar, robotics. Founded in 1961 to help the Department of Defense resolve complex logistics management challenges, LMI continues to enable growth and transformation, enhance operational readiness and resiliency, and ensure mission success for federal civilian and defense agencies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applicants must have at least 5 years of experience working within a defense contractor and have a thorough understanding of Defense Contract Audit Agency (DCAA) accounting practices for cost-type contracts.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Whether you're fueled by a passion for Firmware or Kernel-level development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse Engineering, IO, and CNO technology development, we encourage you to explore the possibilities of joining our ever-expanding team.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This program provides targeted threat monitoring and response capabilities related to security event monitoring, incident response, malware analysis and reverse engineering, cyber intelligence, and insider threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
For nearly two decades, the Advanced Concepts Laboratory (ACL) has been at the forefront of innovation, crafting cutting-edge cyber solutions for the Department of Defense (DoD) and Intelligence Community (IC.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to communicate and collaborate with various audiences from technical analysts (e.g., malware analysts, Cyber Threat Intelligence (CTI) analysts, Incident Response (IR) and Cyber Hunt analysts), to academic researchers, to business and functional managers and leaders, to senior executivesin both the public and private sectors.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have strong experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, shell scripting. With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Translate threat intelligence into actionable insights for enhancing cyber defense strategies. Proficiency in security tools and technologies, including intrusion detection systems, SIEM, network monitoring, and malware analysis.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have strong experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development. JFL Consulting is currently seeking a talented and motivated Cyber Defense Analyst.
ExpandApply NowActive JobUpdated Today
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: