- General Dynamics Information Technology (Pearl Harbor, HI)
- …and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN ... SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber Security **Skills:** Cybersecurity, Security Audit,...detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations.… more
- Hawaiian Electric (Honolulu, HI)
- …distribution attacks), + Different cyber attackers (eg, script kiddies, insider threat , non-nation state sponsored, and nation sponsored). + Different ... known vulnerabilities. + Assists with risk assessments, and development of security architecture solutions and technologies. + Supports development of detailed… more