- General Dynamics Information Technology (Reston, VA)
- …to Obtain:** Top Secret SCI + Polygraph **Job Family:** Cyber Security **Skills:** Cybersecurity,Firewall Rules ,Intrusion Detection **Certifications:** CompTIA ... experience **US Citizenship Required:** Yes **Job Description:** Own your career as a Cyber Intrusion Detection System Administrator at GDIT. Here, you'll have… more
- Joint Enterprise Technologies (Washington, DC)
- …About the Opportunity: Joint Enterprise Technologies is currently seeking an experienced Cyber Systems Firewall Administrator with advanced knowledge in applying ... incident reports and analysis methodology and results. + Monitor and analyze signature alerts from Intrusion Detection/Prevention Systems (IDS/IPS) for false… more
- General Dynamics Information Technology (St. Louis, MO)
- …and predict previously undiscovered events and incidents and develop or tune rules /signatures/scripts as needed. + Coordinates with Defensive Cyber Operations ... investigate and obtain information about potential sources of compromise on enterprise systems and develop or tune rules /signatures/scripts as needed. +… more
- JPMorgan Chase (Houston, TX)
- …utilizing your skills in threat analysis and incident response to protect vital data and systems . As a Security Operations Senior Associate in the Cyber and Tech ... maintain the integrity, confidentiality, and availability of sensitive data and systems . You will follow best practices like threat recognition, pattern analysis,… more
- M. C. Dean (Richland, WA)
- …for long-term system sustainability. Together we are creating the integrated systems and technologies that shape the built and cyber -physical world. We ... Inspections, Maintenance Operational Checks, and Failure Analysis, and repairs. * Certifies by signature to the customer that systems and components adhere to… more
- Indigo IT, LLC (Washington, DC)
- …an intrusion prevention system (IPS), unified threat manager (UTM), and other systems as needed, to include: + The modification of policy. + The deployment and ... ensure that all tools are operating with up-to-date patches, signature files, log sources, etc., and maintain 24/7 visibility...systems , to include: + Monitoring, reviewing, and analyzing system event and network flow logs in correlation with… more
- CACI International (St. Louis, MO)
- …to investigate and obtain information about potential sources of compromise on NGA systems , and develop or tune rules /signatures/scripts as needed; **More About ... valid alerts and false positives, and develop or tune rules /signatures/scripts as needed; + Assists the Cyber ...compromise; + Documents all work in the authorized ticketing system with a sufficient level of detail to ensure… more
- Alaka'ina Foundation Family of Companies (Omaha, NE)
- …Hawai'i. DESCRIPTION OF RESPONSIBILITIES: + Maintain and update SIEM tool software rules for optimal detection of malicious or unauthorized activity. + Consolidate ... 10 destinations, top attack vector, etc.) And all active cyber incidents, in near real time to the Theater...+ Update and validate plan at least annually. A signature test plan shall be developed. + Monitor sensor… more
- Commerce, International Trade Administration (Washington, DC)
- …effective cyber security and risk management programs, cost-effective IT systems including areas such as software engineering, network and telecommunications, ... for providing executive leadership, technical leadership, and policy advice on information systems . As CIO, the incumbent directs the staff of Information Technology… more
- St. Luke's University Health Network (Allentown, PA)
- …capture devices + Work with customers to form and fix appropriate policy and signature rules . This comprises tuning and development of the creation of custom ... or improvements to existing and current network security related products and systems . JOB DUTIES AND RESPONSIBILITIES: + Project, configure, implement, and maintain… more
- MetLife (Cary, NC)
- Role Value Proposition: The Cyber Platforms and Automation team is primarily based out of MetLife's global technology headquarters in Cary, NC. This team manages the ... diverse group of stakeholders from global regions and backgrounds like cyber security experts, network engineers, infrastructure operations, Business leaders, etc.… more
- Cybersecurity and Infrastructure Security Agency (Arlington, VA)
- …being part of the team focused on securing the Nation's physical and cyber infrastructure against threats to public health and safety, economy, and national ... Transfer for salary payments. DHS uses e-Verify, an Internet-based system , to confirm the eligibility of all newly hired...disciplinary or adverse action in accordance with applicable laws, rules , and regulations (5 USC 7501-7533 and 5 CFR… more