• Lead Cyber Architect 5

    Huntington Ingalls Industries (Dayton, OH)
    …systems and designs to include system architecture evaluation, protocol analysis , hardware and/or software vulnerability discovery , and documentation of ... . Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of… more
    Huntington Ingalls Industries (06/03/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Identity - Entra ID Senior Consultant

    Deloitte (Hermitage, TN)
    …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Execute on AD/Entra ID engagements during different ... Consultant (Microsoft Identity-Entra ID and Active Directory (AD) Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in… more
    Deloitte (06/12/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Embedded Software Engineer

    CACI International (Florham Park, NJ)
    …hardware state. * Develop custom tools and scripts (eg, in Python3) to automate analysis workflows such as firmware unpacking, protocol decoding, and memory ... Cyber Embedded Software Engineer Job Category: Engineering Time...really work, and excels in low-level software and hardware analysis . You'll play a key role in evaluating security… more
    CACI International (07/30/25)
    - Save Job - Related Jobs - Block Source
  • Protocol Analyst- 3

    Leidos (Odenton, MD)
    …Apply now! **Job Responsibilities/Qualifications:** + **Mission Focus** : Perform computer protocol analysis and session reassembly of known and unidentified ... opportunity for a ** Protocol Analyst-3** in our **National Security Sector's (NSS) Cyber & Analytics Business Area (CABA)** . Our talented team is at the… more
    Leidos (07/16/25)
    - Save Job - Related Jobs - Block Source
  • Theater Vulnerability Analyst

    Alaka'ina Foundation Family of Companies (Pearl Harbor, HI)
    …government customer in Honolulu, HI DESCRIPTION OF RESPONSIBILITIES: + Analyzes PACAF AOR cyber security posture reports. + Provides PACAF cyber units expertise ... and fix action guidance. + Interfaces with base cyber units and provides PACAF leadership a depiction of...+ Coordinate with Vulnerability Management teams upon scan result analysis . + Identify patching issues/troubleshooting way ahead. + Produce… more
    Alaka'ina Foundation Family of Companies (06/08/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Consultant - Microsoft Purview and Data…

    Deloitte (Detroit, MI)
    …issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Executing on Microsoft Purview engagements during different ... Job Title: Senior Consultant (Microsoft Purview and Data Governance) Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in… more
    Deloitte (06/13/25)
    - Save Job - Related Jobs - Block Source
  • SkillBridge - Network Security Analyst

    Battelle Memorial Institute (Augusta, GA)
    …challenging and meaningful projects + Pursue ideas in scientific and technological discovery + Collaborate with world-class experts in an inclusive environment + ... the next generation of scientific leaders and business professionals Battelle's Cyber team is seeking **SkillBrigde Network Security Analyst** candidates to collect… more
    Battelle Memorial Institute (05/22/25)
    - Save Job - Related Jobs - Block Source
  • Principal Forensic & Incident Response Architect…

    Henry Ford Health System (Detroit, MI)
    …Unix\Linux operating systems including logging facilities. + Understanding of network protocol analysis , public key infrastructure, SSL, Active Directory. ... to computer forensic investigations, live response and triage, and electronic discovery . The Principal Forensic and Incident Response Architect will also perform… more
    Henry Ford Health System (07/15/25)
    - Save Job - Related Jobs - Block Source
  • Unified Capabilities (UC) NOC Technician 4

    Leidos (Scott Air Force Base, IL)
    …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... **Job Description:** The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Unified Capabilities (UC) NOC… more
    Leidos (06/19/25)
    - Save Job - Related Jobs - Block Source
  • Network Engineer

    SOS International LLC (Pearl Harbor, HI)
    …to include Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. Experience with ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more
    SOS International LLC (07/31/25)
    - Save Job - Related Jobs - Block Source
  • FLEX Senior Cloud Data Security Engineer

    Marriott (Bethesda, MD)
    …working with several of these technologies: Data Loss Prevention (DLP), Data Discovery , Cloud Security Access Broker (CASB), Data Rights Management (DRM), SSL ... protect sensitive data on managed networks. + Conducting cloud security analysis of Cloud platforms/environments. + Performing onboarding of data security services… more
    Marriott (07/31/25)
    - Save Job - Related Jobs - Block Source