• Malicious Network Activities

    Tetrad Digital Integrity LLC (MD)
    …and vulnerabilities in this digital age. We are seeking an experienced and detail-oriented Malicious Network Activities Expert to support the evaluation ... RESPONSIBILITIES: + Create question-answer pairs that test models on detecting malicious network activities + Design scenarios involving unencrypted traffic… more
    Tetrad Digital Integrity LLC (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Software Reverse Engineer (TS/SCI)- Senior & Mid

    Vexterra Group (Bethesda, MD)
    …software packages such as EnCase, FTK, or Sleuth Kit/Autopsy + Advanced or Expert experience with reverse engineering and network security tools, including Ida ... and the ability to work in a team environment. + Advanced or Expert level experience in hardware configuration and network /data communications + Advanced… more
    Vexterra Group (10/14/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Analyst, Infrastructure and InfoSec

    Toyota (San Juan, PR)
    …mobile devices, and all other endpoints are protected and monitored for malicious activities . + Ensure that security requirements are addressed throughout ... mobile devices, and all other endpoints are protected and monitored for malicious activities . **Vulnerability and Endpoint Management** + Identify and track… more
    Toyota (11/08/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Host Forensic Analyst IV

    Nightwing (Sterling, VA)
    …relating to the subject matter as it relates to hunt and incident response activities - Serves as technical expert on high-level incident response teams ... provides DHS's front-line response for cyber incidents and proactive hunting for malicious cyber activity. Nightwing provides support for on and offsite incident… more
    Nightwing (11/06/25)
    - Save Job - Related Jobs - Block Source
  • ForeScout Engineer - Active TS/SCI with CI Poly

    ENS Solutions (Washington, DC)
    On our expert team, you'll perform work focused on implementing and operating next generation security solutions for government and commercial clients. You'll ... as they engineer solutions to complex challenges for customers using knowledge network engineering, Active Directory, and system administration. In this role, you'll… more
    ENS Solutions (12/06/25)
    - Save Job - Related Jobs - Block Source
  • SOC Security Analyst L3

    BlueVoyant (College Park, MD)
    …time of security incidents. As a Senior analyst, you are the ultimate technical expert and escalation point for analysts on your team. Your significant expertise in ... SIEM logs, endpoint logs, and EDR telemetry + Research indicators and activities to determine reputation and suspicious attributes + Perform analysis of malware,… more
    BlueVoyant (11/24/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Intel Analyst

    Leidos (Ashburn, VA)
    …threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's IT operating ... products for dissemination to stakeholders regarding high priority threat campaigns, malicious actors, APTs, emerging threats, etc. + Bring a comprehensive… more
    Leidos (11/13/25)
    - Save Job - Related Jobs - Block Source
  • Senior Information Systems Security Engineer…

    Parsons Corporation (Colorado Springs, CO)
    …of system design to deal with cyber-related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ ... Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities . **Required Skills:** + Utilize Joint Special Access Program Implementation… more
    Parsons Corporation (10/11/25)
    - Save Job - Related Jobs - Block Source
  • Service Operations Analyst II - Security

    Weill Cornell Medical College (New York, NY)
    …solid foundation in operating systems, and considered to be a SME (subject matter expert ) in a specific domain such as Network , Security, or Infrastructure ... and efficient way to conduct a series of operational activities in a high-volume diverse environment. The ideal candidate...a variety of incidents and attack vectors, such as network intrusions, web-based attacks, malicious emails, root-… more
    Weill Cornell Medical College (10/31/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Operations Center (SOC) Manager

    Travelers Insurance Company (St. Paul, MN)
    …is a key member of our SOC, and will act as a subject matter expert , leading detection, analysis, and response to SOC alerts and other cybersecurity events alongside ... with business partners for a fast resolution. + Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system… more
    Travelers Insurance Company (10/31/25)
    - Save Job - Related Jobs - Block Source
  • Information Security Engineer III

    ICW Group (San Diego, CA)
    …cybersecurity approaches and techniques to evaluate the security of a system or network . This position will assist with strategic initiatives for short and long-term ... eradication, and recovery. + Researches and implements methods to remediate network and application security vulnerabilities. + Leads and participates in security… more
    ICW Group (12/13/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Hunt Senior Analyst

    Citigroup (Irving, TX)
    …hunting activities using various techniques and tools to identify malicious activity, potential security breaches, security gaps, and opportunities for improved ... best practices, threat intelligence, and organizational risk assessments. + Analyze network traffic, system logs, and other data sources to detect anomalies,… more
    Citigroup (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Analyst

    RBR-Technologies (Fort Meade, MD)
    …infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. RESPONSIBILITIES + Provide ... to enable operational effectives, defense, and command and control. + Analyze network infrastructure in order to recommend methods and strategies that reduce and/or… more
    RBR-Technologies (11/27/25)
    - Save Job - Related Jobs - Block Source
  • Senior Security Engineer

    iconectiv (Bridgewater, NJ)
    …consumers and businesses protected. Our cloud-based information as a service network and operations management and numbering solutions span trusted communications, ... potential threats/vulnerabilities.** + Assist with incident response and potential breach activities , on a 24x7 schedule, if necessary. + Conduct security… more
    iconectiv (11/14/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Amentum (Norfolk, VA)
    …Red Team. The Exploitation Analyst will function as a subject matter expert in cyberspace operations and use all available system documentation and intelligence ... through verbal, written, and/or visual means. + Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). +… more
    Amentum (11/12/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Vulnerability Analyst

    Node.Digital (Arlington, VA)
    …analyze information from multiple sources, synthesize that information, and provide expert analysis to senior customer stakeholders. Node is seeking a Cybersecurity ... * Coordinate with VM analysts and leadership to synchronize VM operational activities * Coordinate with broader Cybersecurity Division (CSD) analysts and leadership… more
    Node.Digital (10/02/25)
    - Save Job - Related Jobs - Block Source
  • Black Lotus Labs Principal Threat Researcher

    Lumen (Columbia, SC)
    …remote position. **The Main Responsibilities** + Serve as Threat Research Subject Matter Expert , offering guidance and support to the Black Lotus Labs team on threat ... hunting activities , such as identifying knowledge gaps, troubleshooting technical challenges,...actionable threat intelligence data to Lumen customers. + Provide expert analysis and strategic insights on emerging threats and… more
    Lumen (12/02/25)
    - Save Job - Related Jobs - Block Source
  • SIEM Engineer - Exabeam | Remote, USA

    Optiv (Atlanta, GA)
    …SIEM systems. + 1-2 years professional experience working with networks and network architecture. + 1+ year professional experience writing SIEM content specifically ... + Ability to deal confidently with complex technical problems. + Expert -level knowledge of Microsoft Sentinel and/or Exabeam (Search, Collectors, Advanced… more
    Optiv (12/08/25)
    - Save Job - Related Jobs - Block Source
  • Principal Member of Technical Staff

    Oracle (Montgomery, AL)
    …decision to heavily invest on detecting system vulnerabilities and threat activities , correlate and analyze problems, then remediate, notify and block attacks ... from malicious actors against customer cloud environment. We offer a...Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures + Good understanding of databases, NoSQL systems,… more
    Oracle (11/25/25)
    - Save Job - Related Jobs - Block Source
  • Principal Member of Technical Staff

    Oracle (Boston, MA)
    …decision to heavily invest on detecting system vulnerabilities and threat activities , correlate and analyze problems, then remediate, notify and block attacks ... from malicious actors against customer cloud environment. We offer a...Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures * Good understanding of databases, SQL, NoSQL… more
    Oracle (11/25/25)
    - Save Job - Related Jobs - Block Source