- Parsons Corporation (St. Louis, MO)
- …originating from Enterprise Incident Response Events. Conducting liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other ... errors, processes and activities are conducted within established timeframes, and analysts are trained in and follow current standard operating procedures. What… more
- General Dynamics Information Technology (Tampa, FL)
- …waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... on a Cyber Security Analyst joining our team of analysts , stationed in diverse CONUS and OCONUS locations tasked...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. Identify acceptable… more
- Target (Brooklyn Park, MN)
- …practices with organizational priorities. + Provide vision and strategic direction for Insider Threat and Data Protection analysts , ensuring successful ... Technology Services is on a mission to offer the systems , tools and support that guests and team members...As the **Director of Cybersecurity - Data Protection & Insider Threat ** , you will lead and… more
- DEFTEC (Redstone Arsenal, AL)
- Redstone Arsenal, AL, USA | Full Time Insider Threat Analyst DEFTEC delivers mission-critical solutions through skillfully delivered services and innovative ... operating or accessing classified computer networks to safeguard classified information and establish insider threat detection programs. The FBI's Insider … more
- Leidos (Washington, DC)
- …supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your ... UAM tool and its hosted infrastructure. The ITP mission is to identify insider threats to the department by utilizing advanced analytics, monitoring, and data… more
- ADM (Erlanger, KY)
- …by cyber incident responders, physical security, security operations center, hunt teams, insider threat , legal, etc. **Responsibilities include, but are not ... with world events, geo-politics, etc. and how they often influence the cyber threat . + Familiarity with insider threat investigations and programs.… more
- General Dynamics Information Technology (Springfield, VA)
- …from Enterprise Incident Response Events. + Conduct liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other offices ... to make a personal impact as a CI Cyber Threat Technical Analyst supporting our intelligence customer. GDIT is...log analysis, security change tracking and other network security systems and devices. + Provide written reports based on… more
- Tyto Athene (Ashburn, VA)
- …(7) years professional cybersecurity experience with strong expertise in incident response, insider threat investigations, forensics, and threat analysis. + ... you will serve as the escalation point for other analysts , helping guide them through more complex and high-priority...two years including: + Host-based and network-based monitoring + Insider threat detection tools + Host-based forensic… more
- KeenLogic (Merrifield, VA)
- …related functions; information security, SPAA, incident response, cyber security, insider threat , computer forensics, vulnerability assessment and management, ... hunting. This role conducts higher-level analysis than other analysts on the team. A senior SOC analyst performs...Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, or Insider Threat + One of the following… more
- State of Georgia (Fulton County, GA)
- …programs, and managers Quality Rated, Georgia's community powered child care rating system . The department also houses the Head Start State Collaboration Office, ... and event monitoring. . Create and update runbooks to guide SOC analysts through standardized response procedures. . Integrate Sentinel with Microsoft Defender and… more
- Nightwing (Arlington, VA)
- …- Applying knowledge of the tactics, techniques, and procedures of various criminal, insider , hacktivist, and nation state threat actors to identify and validate ... Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers'… more
- Parsons Corporation (Springfield, VA)
- …from Enterprise Incident Response Events. + Conducting liaison between CI Office, Insider Threat , Cyber Security Operations Center (CSOC), and other relevant ... errors, processes and activities are conducted within established timeframes, and analysts are trained in and follow current standard operating procedures. **What… more
- General Dynamics Information Technology (Tampa, FL)
- …waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... on a Cyber Security Analyst joining our team of analysts , stationed in diverse CONUS and OCONUS locations tasked...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. + Identify… more
- Warner Bros. Discovery (New York, NY)
- …and external intellectual property (IP) theft, attacks/intrusions, computer abuse, and insider threat investigations. + Possess skills to collect, process, ... partner closely with the Legal, People and Culture, GICS security engineers/ analysts and cyber incident commanders, leading incident investigations and providing… more
- IntelliDyne (Falls Church, VA)
- …strategic direction. + Coordinate with division leads and directors for investigations, insider threat , and research. + Conduct analysis and provide ... Exempt Responsibilities: + Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies. + Manage large,… more
- Meta (New York, NY)
- …designing systems used for responding to both external and insider threats 18. Experience analyzing network and host-based security events 19. Knowledge ... are seeking a Security Engineer who specializes in designing and implementing new systems and tools to enhance the security of Meta's products and infrastructure.… more
- TEKsystems (Irvine, CA)
- …Deploy, configure, and maintain SentinelOne EDR across enterprise endpoints. * Threat detection and response: Monitor alerts, investigate suspicious activity, and ... streamline detection and response workflows. * Collaboration: Work closely with SOC analysts , IT teams, and leadership to contain and mitigate threats. * Reporting:… more