- Northeast Georgia Health System, Inc (Gainesville, GA)
- …event correlation capabilities. Supports investigations with intelligence collection, analysis , and/or dissemination. Ability to think logically and creatively ... Vulnerability Management tools. Minimum Job QualificationsLicensure or other certifications: Cybersecurity Certification.Educational Requirements: Minimum Experience: Five (5) years of… more
- Washington Metropolitan Area Transit Authority (VA)
- …Ensures real-time cyber defense incident handling tasks are executed (eg, forensic collections, intrusion correlation and tracking, threat analysis , and ... Cybersecurity Analyst Lead, Data Security Job ID: 240185...or specialized expertise in cyber policy, intelligence, analytics, budget, audit , metrics, or training such that it meets the… more
- Washington Metropolitan Area Transit Authority (VA)
- … cybersecurity professional with proven experience in threat intelligence analysis , cyber investigations, and incident response. This individual will have ... Cybersecurity Analyst III, Threat Intelligence Job ID: 240189...activities. To ensure real-time cyber defense incident handling (eg, forensic collections, intrusion correlation and tracking, threat analysis… more
- Washington Metropolitan Area Transit Authority (VA)
- …Ensures real-time cyber defense incident handling tasks are executed (eg, forensic collections, intrusion correlation and tracking, threat analysis , and ... Cybersecurity Analyst Lead, Threat Intelligence Job ID: 240188...or specialized expertise in cyber policy, intelligence, analytics, budget, audit , metrics, or training such that it meets the… more
- Excentium (Reston, VA)
- …the Information Assurance Vulnerability Management (IAVM) program + Conduct Incident Response and forensic analysis when necessary + Assist in management of the ... Senior Cybersecurity Specialist (Cloud-FedRAMP) Summary Title:Senior Cybersecurity ...satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands. The… more
- Cambridge International Systems Inc (Houston, TX)
- …and complex obstacles! Cambridge International Systems, Inc. has a full-time Cybersecurity Specialist III opportunity available based in Houston, TX. Qualified ... the functional management and oversight of the collection and analysis of threat intelligence, event analysis , automation...solution to document and report on incidents to meet audit , compliance and legal requirements. + Conduct in-depth root… more
- JPMorgan Chase (Tampa, FL)
- …to achieve a desired objective + Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation ... Shape the future of cybersecurity through advanced digital forensics, contributing to firm-wide...requirements, provide technical guidance, and provide detailed documentation of analysis finding + Develop and implement innovative forensic… more
- BAE Systems (Kingsport, TN)
- …discipline with 2 years relevant experience in Cyber Assurance, Cyber Engineering, Cyber Analysis , Threat Hunting, or Forensic Analysis ; OR Associate's ... discipline with 4 years relevant experience in Cyber Assurance, Cyber Engineering, Cyber Analysis , Threat Hunting, or Forensic Analysis . + Combination of… more
- ManTech (Herndon, VA)
- …in-depth analysis , and identify the root cause of incidents + Conduct forensic analysis and detailed investigations of security incidents to determine the ... following: computer network penetration testing/techniques; computer evidence seizure, computer forensic analysis , data recovery; computer intrusion analysis… more
- Fusion Technology LLC (Arlington, VA)
- …proactive hunting, and rapid onsite incident response utilizing host and network-based cybersecurity analysis capabilities. What you'll do: + Assists the ... system and information + Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis , and… more
- Fusion Technology LLC (Arlington, VA)
- …proactive hunting, and rapid onsite incident response utilizing host and network-based cybersecurity analysis capabilities. What you'll do: + Serve as hunt ... or more of the following tools: + EnCase + Forensic Toolkit (FTK) + SANS Investigative Forensics Toolkit (SIFT)...(GCIH) + Certified Ethical Hacker (CEH) + Sys Admin, Audit , Network and Security (SANS) What we do: The… more
- ADP (Roseland, NJ)
- …desired **Technology** Skills AI Security, AI Dev Ops, AI Modeling ** Analysis ** Skills: Excel, PowerBI, SQL, Graph API, and Reporting Tools **Programming** ... this role will be developing, testing, tuning, & implementing DLP rules & policies to audit and control the flow of sensitive information into and out of ADP systems… more
- Alaka'ina Foundation Family of Companies (Honolulu, HI)
- …Conduct exploratory and in-depth analysis of network traffic from security devices, analysis of host-based audit logs, malware analysis , trending of ... logging outputs of Network Security Monitors: (Zeek/Suricata, etc.) + Utilize Digital Forensic solutions for Hard Drive Imaging analysis : (EnCase, FTK Imager,… more
- ADP (Alpharetta, GA)
- …EFA) Hashing, Tokenization, Digital Rights Management (DRM), MS Sensitivity Labels ** Analysis ** Skills: SQL, Graph API, and Reporting Tools **Data Security** ... With your four to ten-plus years of experience in technology & cybersecurity roles, including: planning, implementing, and running security solutions. You have a… more
- Fidelitone (Lebanon, TN)
- …+ Ensure all organizational wide IT processes are audited according to the IT audit policy Required Skills + An understanding of computer code, and in particular ... asse ssment technologies and methods + Understanding of computer forensic s and security breach protocols + The ability...security r isk assessments and evaluations + Knowledge of cybersecurity best practices (and a record of proving how… more
- Global Foundries (UT)
- …Firm understanding of Security incident handling procedures + Ability to perform forensic analysis , threat hunting and penetration testing + Excellent ... of security events and incidents as needed. + Ensures adequate audit trails exist for the detection, investigation, correction, and/or disciplinary action… more