- Dentons US LLP (Washington, DC)
- …LLP is currently recruiting for a Threat Analyst . The Information Security Threat Analyst is responsible for proactively hunting for threats within ... and maintain comprehensive documentation of threat hunting activities. The analyst collaborates with internal teams to enhance security operations,… more
   
- COLSA Corporation (Huntsville, AL)
- Apply understanding of military systems and processes to perform integrated threat scenario validation and verification (V&V) testing and analysis for the ITASE V&V ... and verification testing: + Performing software release testing of ITASE threat models and Architecture Suite + Executing simulation scenarios using multiple… more
   
- Revelyst (Irvine, CA)
- **Job Description** As a Senior Security Operations Analyst , you will be a key member of our Security Operations team, responsible for detecting, ... threats across our enterprise. You will help build and mature our SOC ( Security Operations Center) capabilities, contribute to threat intelligence and incident… more
   
- SMBC (Charlotte, NC)
- …Sumitomo Mitsui Finance and Leasing Co., Ltd. **Role Description** As a Vulnerability Management Analyst , you will be a key part of a high performing SOC team, with ... and that we keep pace with a rapidly changing threat landscape. You will help protect the Bank's networks,... landscape. You will help protect the Bank's networks, applications , and infrastructure by working with IT owners to… more
   
- COLSA Corporation (Huntsville, AL)
- COLSA is seeking a Validation & Verification Analyst in support of the Missile and Space Intelligence Center (MSIC) in Huntsville, Alabama. This role is 100% ... Will apply understanding of modeling and simulation (M&S) to perform integrated threat scenario validation and verification (V&V) testing and analysis for the ITASE… more
   
- Hawaiian Electric (Honolulu, HI)
- …version [ITIL]). + Programming language structures and logic. + System and application security threats and vulnerabilities (eg, buffer overflow, mobile code, ... Senior Information Assurance Analyst - Oahu Date:Oct 14, 2025 Location: Honolulu,...service or consulting organization, preferably in an information technology, application security , network security or… more
   
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …use, operations security ). Cyber assessment teams may be deployed to high- threat but permissive environments anywhere in the world. Each team can support up ... information technology threats, and cybersecurity practices + Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis,… more
   
- Entrust (Shakopee, MN)
- … leveraging RAG, fine tuning and prompt chaining. + Familiarity with enterprise security frameworks, threat modeling, data governance and compliance standards in ... us at Entrust?** At Entrust, we're shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global… more
   
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …use, operations security ). Cyber assessment teams may be deployed to high- threat but permissive environments anywhere in the world. Each team can support up ... information technology threats, and cybersecurity practices + Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis,… more
   
- Talen Energy (Allentown, PA)
- …is seeking a skilled and proactive Cybersecurity GRC (Governance, Risk, and Compliance) Analyst to join our dynamic cybersecurity team. The GRC Analyst will ... role in identifying, managing, and mitigating risks related to information security and ensuring compliance with industry standards, regulations, and internal… more
   
- Bank OZK (Little Rock, AR)
- …Gramm-Leach-Bliley Act (GLBA). + Knowledge of principals of cloud, network and endpoint security , current threat and attack trends, and security principals. ... Purpose & Scope Administers and helps implement multiple programs within Information Security to include security awareness and training, identity access… more
   
- AFELM US Space Command (Kirtland AFB, NM)
- …and requires the employee obtain and maintain a TOP SECRET (TS) security clearance with eligibility for access to Sensitive Compartmented Information (SCI), ... use by employees in sensitive positions present a clear threat to the mission (Continued) of the Air Force,...to the mission (Continued) of the Air Force, national security , and public safety. It is required that you… more
   
- SMBC (Charlotte, NC)
- …Security data (ie, Phishing, Identity Management, Privileged Access, Cloud Security , Incident Response, Vulnerability Management, Threat Detection) + Exposure ... Governance & Data Quality team for the AD Information Security department and will report to the Head of...department as well as other stakeholders aligned with the applications owned by ISDAD. **Role Objectives** + Operate as… more
   
- Edward Jones (St. Louis, MO)
- …of the Team Lead to independently perform moderately complex offensive and defensive security activities in the Incident Response, Threat Detection, Hunt, and ... a material impact on the Firm. The Senior Cybersecurity Analyst will have a broad understanding of the Firm's...of the Firm's technology systems and processes and the security , threat , and regulatory landscape as it… more
 
- General Dynamics Information Technology (Reston, VA)
- …illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT + Gather and handle forensic evidence ... Yes **Job Description:** Own your career as a Cyber Security Analyst at GDIT. Here, you'll have...and report indicators of misuse, abuse, data spillage, insider threat , and security violations. + Identify acceptable… more
 
- Google (VA)
- …experience. + 8 years of experience in a customer-facing analytical role in cyber security (eg, Network Forensics Analyst , Threat Intelligence Analyst ). ... Principal Threat Analyst , GTIG Intelligence Delivery, Mandiant...security operations. + Experience with CTI methodologies and application within cyber security organizations. + Experience… more
 
- Citigroup (Irving, TX)
- …join us. We'll enable growth and progress together. **Overview of Chief Information Security Office (CISO):** The **Chief Information Security Office (CISO)** is ... our employees and our proprietary data. We manage information security as one end-to end program - one with...understanding of cybersecurity principles to work in the Cloud Threat Modeling team. Using threat modeling you… more
 
- TEKsystems (Greensboro, NC)
- …, Information security , Security operations, Incident Response, Cyber Threat Analyst , Malware, Cyber security , Soc, Siem, analysis, splunk, ... python, OSINT Top Skills Details Security ,Information security , Security operations,Incident Response,Cyber Threat Analyst ,Malware,Cyber security… more
 
- Bank of America (Chicago, IL)
- Strategic Threat Evaluation Sr. Analyst Washington, District of Columbia;Chicago, Illinois; Denver, Colorado **To proceed with your application , you must be ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Washington/Strategic- Threat -Evaluation-Sr- Analyst \_25037719) **Job Description:** At Bank of America,… more
 
- General Dynamics Information Technology (Springfield, VA)
- …Description:** Seize your opportunity to make a personal impact as a CI Cyber Threat Analyst supporting our intelligence customer. GDIT is your place to make ... **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity,Cyber Threat Analysis, Security Operations **Experience:** 10 + years...At GDIT, people are our differentiator. As CI Cyber Threat Analyst , you will help ensure today… more
 
            Related Job Searches:
                Analyst, 
                Applications, 
                Security, 
                Security Analyst, 
                Security Threat Analyst, 
                Threat, 
                Threat Analyst
        
    