- Tetrad Digital Integrity LLC (MD)
- …and vulnerabilities in this digital age. We are seeking an experienced and detail-oriented Malicious Network Activities Expert to support the evaluation ... RESPONSIBILITIES: + Create question-answer pairs that test models on detecting malicious network activities + Design scenarios involving unencrypted traffic… more
- Vexterra Group (Bethesda, MD)
- …software packages such as EnCase, FTK, or Sleuth Kit/Autopsy + Advanced or Expert experience with reverse engineering and network security tools, including Ida ... and the ability to work in a team environment. + Advanced or Expert level experience in hardware configuration and network /data communications + Advanced… more
- Toyota (San Juan, PR)
- …mobile devices, and all other endpoints are protected and monitored for malicious activities . + Ensure that security requirements are addressed throughout ... mobile devices, and all other endpoints are protected and monitored for malicious activities . **Vulnerability and Endpoint Management** + Identify and track… more
- Nightwing (Sterling, VA)
- …relating to the subject matter as it relates to hunt and incident response activities - Serves as technical expert on high-level incident response teams ... provides DHS's front-line response for cyber incidents and proactive hunting for malicious cyber activity. Nightwing provides support for on and offsite incident… more
- ENS Solutions (Washington, DC)
- On our expert team, you'll perform work focused on implementing and operating next generation security solutions for government and commercial clients. You'll ... as they engineer solutions to complex challenges for customers using knowledge network engineering, Active Directory, and system administration. In this role, you'll… more
- BlueVoyant (College Park, MD)
- …time of security incidents. As a Senior analyst, you are the ultimate technical expert and escalation point for analysts on your team. Your significant expertise in ... SIEM logs, endpoint logs, and EDR telemetry + Research indicators and activities to determine reputation and suspicious attributes + Perform analysis of malware,… more
- Leidos (Ashburn, VA)
- …threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's IT operating ... products for dissemination to stakeholders regarding high priority threat campaigns, malicious actors, APTs, emerging threats, etc. + Bring a comprehensive… more
- Parsons Corporation (Colorado Springs, CO)
- …of system design to deal with cyber-related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ ... Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities . **Required Skills:** + Utilize Joint Special Access Program Implementation… more
- Weill Cornell Medical College (New York, NY)
- …solid foundation in operating systems, and considered to be a SME (subject matter expert ) in a specific domain such as Network , Security, or Infrastructure ... and efficient way to conduct a series of operational activities in a high-volume diverse environment. The ideal candidate...a variety of incidents and attack vectors, such as network intrusions, web-based attacks, malicious emails, root-… more
- Travelers Insurance Company (St. Paul, MN)
- …is a key member of our SOC, and will act as a subject matter expert , leading detection, analysis, and response to SOC alerts and other cybersecurity events alongside ... with business partners for a fast resolution. + Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system… more
- ICW Group (San Diego, CA)
- …cybersecurity approaches and techniques to evaluate the security of a system or network . This position will assist with strategic initiatives for short and long-term ... eradication, and recovery. + Researches and implements methods to remediate network and application security vulnerabilities. + Leads and participates in security… more
- Citigroup (Irving, TX)
- …hunting activities using various techniques and tools to identify malicious activity, potential security breaches, security gaps, and opportunities for improved ... best practices, threat intelligence, and organizational risk assessments. + Analyze network traffic, system logs, and other data sources to detect anomalies,… more
- RBR-Technologies (Fort Meade, MD)
- …infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. RESPONSIBILITIES + Provide ... to enable operational effectives, defense, and command and control. + Analyze network infrastructure in order to recommend methods and strategies that reduce and/or… more
- iconectiv (Bridgewater, NJ)
- …consumers and businesses protected. Our cloud-based information as a service network and operations management and numbering solutions span trusted communications, ... potential threats/vulnerabilities.** + Assist with incident response and potential breach activities , on a 24x7 schedule, if necessary. + Conduct security… more
- Amentum (Norfolk, VA)
- …Red Team. The Exploitation Analyst will function as a subject matter expert in cyberspace operations and use all available system documentation and intelligence ... through verbal, written, and/or visual means. + Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). +… more
- Node.Digital (Arlington, VA)
- …analyze information from multiple sources, synthesize that information, and provide expert analysis to senior customer stakeholders. Node is seeking a Cybersecurity ... * Coordinate with VM analysts and leadership to synchronize VM operational activities * Coordinate with broader Cybersecurity Division (CSD) analysts and leadership… more
- Lumen (Columbia, SC)
- …remote position. **The Main Responsibilities** + Serve as Threat Research Subject Matter Expert , offering guidance and support to the Black Lotus Labs team on threat ... hunting activities , such as identifying knowledge gaps, troubleshooting technical challenges,...actionable threat intelligence data to Lumen customers. + Provide expert analysis and strategic insights on emerging threats and… more
- Optiv (Atlanta, GA)
- …SIEM systems. + 1-2 years professional experience working with networks and network architecture. + 1+ year professional experience writing SIEM content specifically ... + Ability to deal confidently with complex technical problems. + Expert -level knowledge of Microsoft Sentinel and/or Exabeam (Search, Collectors, Advanced… more
- Oracle (Montgomery, AL)
- …decision to heavily invest on detecting system vulnerabilities and threat activities , correlate and analyze problems, then remediate, notify and block attacks ... from malicious actors against customer cloud environment. We offer a...Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures + Good understanding of databases, NoSQL systems,… more
- Oracle (Boston, MA)
- …decision to heavily invest on detecting system vulnerabilities and threat activities , correlate and analyze problems, then remediate, notify and block attacks ... from malicious actors against customer cloud environment. We offer a...Working familiarity with networking protocols (TCP/IP, HTTP) and standard network architectures * Good understanding of databases, SQL, NoSQL… more