• Parsons Corporation (St. Louis, MO)
    …originating from Enterprise Incident Response Events. Conducting liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other ... errors, processes and activities are conducted within established timeframes, and analysts are trained in and follow current standard operating procedures. What… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • General Dynamics Information Technology (Tampa, FL)
    …waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... on a Cyber Security Analyst joining our team of analysts , stationed in diverse CONUS and OCONUS locations tasked...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. Identify acceptable… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Director Cybersecurity - Data Protection…

    Target (Brooklyn Park, MN)
    …practices with organizational priorities. + Provide vision and strategic direction for Insider Threat and Data Protection analysts , ensuring successful ... Technology Services is on a mission to offer the systems , tools and support that guests and team members...As the **Director of Cybersecurity - Data Protection & Insider Threat ** , you will lead and… more
    Target (10/22/25)
    - Save Job - Related Jobs - Block Source
  • Insider Threat Analyst

    DEFTEC (Redstone Arsenal, AL)
    Redstone Arsenal, AL, USA | Full Time Insider Threat Analyst DEFTEC delivers mission-critical solutions through skillfully delivered services and innovative ... operating or accessing classified computer networks to safeguard classified information and establish insider threat detection programs. The FBI's Insider more
    DEFTEC (11/20/25)
    - Save Job - Related Jobs - Block Source
  • Insider Threat Program User Activity…

    Leidos (Washington, DC)
    …supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your ... UAM tool and its hosted infrastructure. The ITP mission is to identify insider threats to the department by utilizing advanced analytics, monitoring, and data… more
    Leidos (11/09/25)
    - Save Job - Related Jobs - Block Source
  • Sr Threat Intelligence Analyst

    ADM (Erlanger, KY)
    …by cyber incident responders, physical security, security operations center, hunt teams, insider threat , legal, etc. **Responsibilities include, but are not ... with world events, geo-politics, etc. and how they often influence the cyber threat . + Familiarity with insider threat investigations and programs.… more
    ADM (09/26/25)
    - Save Job - Related Jobs - Block Source
  • CI Cyber Threat Technical Analyst

    General Dynamics Information Technology (Springfield, VA)
    …from Enterprise Incident Response Events. + Conduct liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other offices ... to make a personal impact as a CI Cyber Threat Technical Analyst supporting our intelligence customer. GDIT is...log analysis, security change tracking and other network security systems and devices. + Provide written reports based on… more
    General Dynamics Information Technology (12/09/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Defense Forensics Lead

    Tyto Athene (Ashburn, VA)
    …(7) years professional cybersecurity experience with strong expertise in incident response, insider threat investigations, forensics, and threat analysis. + ... you will serve as the escalation point for other analysts , helping guide them through more complex and high-priority...two years including: + Host-based and network-based monitoring + Insider threat detection tools + Host-based forensic… more
    Tyto Athene (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Senior SOC Analyst

    KeenLogic (Merrifield, VA)
    …related functions; information security, SPAA, incident response, cyber security, insider threat , computer forensics, vulnerability assessment and management, ... hunting. This role conducts higher-level analysis than other analysts on the team. A senior SOC analyst performs...Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, or Insider Threat + One of the following… more
    KeenLogic (11/07/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Administrator

    State of Georgia (Fulton County, GA)
    …programs, and managers Quality Rated, Georgia's community powered child care rating system . The department also houses the Head Start State Collaboration Office, ... and event monitoring. . Create and update runbooks to guide SOC analysts through standardized response procedures. . Integrate Sentinel with Microsoft Defender and… more
    State of Georgia (12/09/25)
    - Save Job - Related Jobs - Block Source
  • (Cyber) Incident Management Analyst - Hybrid

    Nightwing (Arlington, VA)
    …- Applying knowledge of the tactics, techniques, and procedures of various criminal, insider , hacktivist, and nation state threat actors to identify and validate ... Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers'… more
    Nightwing (10/14/25)
    - Save Job - Related Jobs - Block Source
  • CI Cyber Technical Analysis

    Parsons Corporation (Springfield, VA)
    …from Enterprise Incident Response Events. + Conducting liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other relevant ... errors, processes and activities are conducted within established timeframes, and analysts are trained in and follow current standard operating procedures. **What… more
    Parsons Corporation (11/14/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Analyst - Full time must include…

    General Dynamics Information Technology (Tampa, FL)
    …waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... on a Cyber Security Analyst joining our team of analysts , stationed in diverse CONUS and OCONUS locations tasked...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. + Identify… more
    General Dynamics Information Technology (11/13/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Manager, eDiscovery & Forensics

    Warner Bros. Discovery (New York, NY)
    …and external intellectual property (IP) theft, attacks/intrusions, computer abuse, and insider threat investigations. + Possess skills to collect, process, ... partner closely with the Legal, People and Culture, GICS security engineers/ analysts and cyber incident commanders, leading incident investigations and providing… more
    Warner Bros. Discovery (10/22/25)
    - Save Job - Related Jobs - Block Source
  • Deputy IT Security Manager

    IntelliDyne (Falls Church, VA)
    …strategic direction. + Coordinate with division leads and directors for investigations, insider threat , and research. + Conduct analysis and provide ... Exempt Responsibilities: + Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies. + Manage large,… more
    IntelliDyne (12/11/25)
    - Save Job - Related Jobs - Block Source
  • Security Engineer-Surface Coverage, Detection…

    Meta (New York, NY)
    …designing systems used for responding to both external and insider threats 18. Experience analyzing network and host-based security events 19. Knowledge ... are seeking a Security Engineer who specializes in designing and implementing new systems and tools to enhance the security of Meta's products and infrastructure.… more
    Meta (11/19/25)
    - Save Job - Related Jobs - Block Source
  • Security Engineer

    TEKsystems (Irvine, CA)
    …Deploy, configure, and maintain SentinelOne EDR across enterprise endpoints. * Threat detection and response: Monitor alerts, investigate suspicious activity, and ... streamline detection and response workflows. * Collaboration: Work closely with SOC analysts , IT teams, and leadership to contain and mitigate threats. * Reporting:… more
    TEKsystems (12/08/25)
    - Save Job - Related Jobs - Block Source