- Leidos (Fort Meade, MD)
- …(PCAP) data) to identify cyber adversary activity. + Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion ... The Leidos Defense Group has an opening for a ** Cyber Security Fusion Analyst** on the DISA...protocols, cyber vulnerabilities and exploitation techniques and cyber threat /adversary methodologies. + Proficiency with datasets,… more
- Leidos (Fort Meade, MD)
- …(PCAP) data) to identify cyber adversary activity. + Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion ... and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat /adversary methodologies. + Proficiency with datasets, tools and… more
- Leidos (Fort Meade, MD)
- **Description** Leidos has a current job opportunity for a Cyber Fusion and Threats Analyst on the DISA GSM-O II program supporting the DISA Joint Operations ... Kill Chain (CKC) methodology; knowledge of Advanced Persistent Threat (APT) and other cyber threat...modeling frame works. + Working knowledge of the US Intelligence Community and/or Fusion centers. **Original Posting… more
- TEKsystems (Fort Meade, MD)
- …(PCAP) data) to identify cyber adversary activity. * Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion ... and reduce the attack surface. * Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability… more
- TEKsystems (Fort Meade, MD)
- …(PCAP) data) to identify cyber adversary activity. * Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion ... and reduce the attack surface. * Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability… more
- Deloitte (Baltimore, MD)
- …changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence , and building a security culture across the ... Jun 2024 Work you'll do The Cybersecurity Engineer position supports the Fusion Center as an escalation point identifying and addressing potential Splunk… more
- Leidos (Odenton, MD)
- …and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat /adversary methodologies (TTPs) + Computer Network Defense (CND) ... and provide recommendations in coordination with the Cross Functional Fusion Team. + Leverage intelligence and operational...vectors and methods of exploitation with an understanding of intelligence driven defense and/or Cyber Kill Chain… more
- Leidos (Odenton, MD)
- …and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat /adversary methodologies (TTPs) + Computer Network Defense (CND) ... and provide recommendations in coordination with the Cross Functional Fusion Team. + Leverage intelligence and operational...vectors and methods of exploitation with an understanding of intelligence driven defense and/or Cyber Kill Chain… more