- Bank of America (Washington, DC)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
- Dentons US LLP (Washington, DC)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Bank of America (Washington, DC)
- …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
- General Dynamics Information Technology (Springfield, VA)
- …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
- Huntington Ingalls Industries (Annapolis Junction, MD)
- …advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...options and effects for our nation in an ever-changing threat environment. Our experts provide a full range of… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...options and effects for our nation in an ever-changing threat environment. Our team provides a full range of… more
- General Dynamics Information Technology (Springfield, VA)
- …and recovery measures for events and incidents. CSOC Tier 2 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT ... all contractors in support of CSOC Tier 2 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period… more
- Nightwing (Falls Church, VA)
- …Exploits + Threat Management + Regular Expressions + Knowledge of Control Frameworks and Risk Management techniques + Excellent oral and written communication ... technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...options and effects for our nation in an ever-changing threat environment. Our experts provide a full range of… more
- CACI International (Springfield, VA)
- …and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT ... CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT...and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement… more
- RightDirection Technology Solutions LLC (Washington, DC)
- …and client related antivirus incidents, and upgrading servers and clients; + Provide malware and virus analysis and removal; Create indicators from analysis for use ... + Ensure HBSS set up conforms to requirements and recommendations IAW Intelligence Community Security Coordination Center (ICSCC); Operate and maintain the current… more