• Base-2 Solutions, LLC (Colorado Springs, CO)
    …incident reports and analysis methodology and results. Monitor and analyze signature alerts from Intrusion Detection/Prevention Systems (IDS/IPS) for false ... Our work depends on a Cyber Security Analyst joining our team of analysts,...tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud,… more
    JobGet (05/08/24)
    - Save Job - Related Jobs - Block Source
  • Dexian - DISYS (Oak Grove, NC)
    …organization through our incident ticketing system .Enhances detections, alerts, and other cyber event correlation rules within the SIEM to reduce false ... System Administration and/or Architecture.Proficient understanding of various Operating Systems and their architectures: Windows, Unix/Linux and OSx.Previous experience… more
    JobGet (05/11/24)
    - Save Job - Related Jobs - Block Source
  • Cyber System Signature

    General Dynamics Information Technology (Reston, VA)
    …Able to Obtain:** Top Secret SCI + Polygraph **Job Family:** Cyber Security **Skills:** Cybersecurity,Firewall Rules , Signature -Based Detection,Snort ... experience **US Citizenship Required:** Yes **Job Description:** Own your career as a Cyber Intrusion Detection System Administrator at GDIT. Here, you'll have… more
    General Dynamics Information Technology (04/12/24)
    - Save Job - Related Jobs - Block Source
  • Secret Cyber Signature Developer

    Insight Global (Quantico, VA)
    Job Description Insight Global is looking for a Cyber Signature Specialist in Quantico, VA. -Create custom rules and signatures using CSSP toolsets -Collect ... -Provide updates and analysis to support closure of security policy violations and cyber security events/incidents We are a company committed to creating diverse and… more
    Insight Global (05/08/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Firewall Administrator…

    Joint Enterprise Technologies (Washington, DC)
    …About the Opportunity: Joint Enterprise Technologies is currently seeking an experienced Cyber Systems Firewall Administrator with advanced knowledge in applying ... incident reports and analysis methodology and results. + Monitor and analyze signature alerts from Intrusion Detection/Prevention Systems (IDS/IPS) for false… more
    Joint Enterprise Technologies (04/30/24)
    - Save Job - Related Jobs - Block Source
  • DCO Cyber Defense Infrastructure Support…

    Jacobs (Colorado Springs, CO)
    …the updating of rules and signatures (eg, intrusion detection/protection systems , anti-virus, and content blacklists) for specialized cyber defense ... (ESM). . Identify potential conflicts with implementation of any cyber defense tools (eg, tool and signature ...them. . Perform system administration on specialized cyber defense applications and systems (eg, anti-virus,… more
    Jacobs (05/11/24)
    - Save Job - Related Jobs - Block Source
  • Northrop Grumman (DoD SkillBridge) - Principal…

    Northrop Grumman (Mclean, VA)
    …of internship. **Job Description** : **Northrop Grumman** is seeking a **Principal Cyber Systems Administrator** to join our Mission Operations - Automation ... Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations… more
    Northrop Grumman (04/19/24)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Analyst

    General Dynamics Information Technology (St. Louis, MO)
    …and predict previously undiscovered events and incidents and develop or tune rules /signatures/scripts as needed. + Coordinates with Defensive Cyber Operations ... investigate and obtain information about potential sources of compromise on enterprise systems and develop or tune rules /signatures/scripts as needed. +… more
    General Dynamics Information Technology (05/01/24)
    - Save Job - Related Jobs - Block Source
  • Security Operations Senior Associate - Perimeter…

    JPMorgan Chase (Houston, TX)
    …utilizing your skills in threat analysis and incident response to protect vital data and systems . As a Security Operations Senior Associate in the Cyber and Tech ... maintain the integrity, confidentiality, and availability of sensitive data and systems . You will follow best practices like threat recognition, pattern analysis,… more
    JPMorgan Chase (05/11/24)
    - Save Job - Related Jobs - Block Source
  • UPS Technician 2 - Richland, Washington

    M. C. Dean (Richland, WA)
    …for long-term system sustainability. Together we are creating the integrated systems and technologies that shape the built and cyber -physical world. We ... Inspections, Maintenance Operational Checks, and Failure Analysis, and repairs. * Certifies by signature to the customer that systems and components adhere to… more
    M. C. Dean (03/02/24)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Countermeasures Developer

    CACI International (St. Louis, MO)
    …to investigate and obtain information about potential sources of compromise on NGA systems , and develop or tune rules /signatures/scripts as needed; **More About ... valid alerts and false positives, and develop or tune rules /signatures/scripts as needed; + Assists the Cyber ...compromise; + Documents all work in the authorized ticketing system with a sufficient level of detail to ensure… more
    CACI International (02/24/24)
    - Save Job - Related Jobs - Block Source
  • Software Developer

    Alaka'ina Foundation Family of Companies (Omaha, NE)
    …HI. DESCRIPTION OF RESPONSIBILITIES: + Maintain and update SIEM tool software rules for optimal detection of malicious or unauthorized activity. + Consolidate ... 10 destinations, top attack vector, etc.) And all active cyber incidents, in near real time to the Theater...+ Update and validate plan at least annually. A signature test plan shall be developed. + Monitor sensor… more
    Alaka'ina Foundation Family of Companies (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Senior Network Engineer - Security

    St. Luke's University Health Network (Allentown, PA)
    …capture devices + Work with customers to form and fix appropriate policy and signature rules . This comprises tuning and development of the creation of custom ... or improvements to existing and current network security related products and systems . JOB DUTIES AND RESPONSIBILITIES: + Project, configure, implement, and maintain… more
    St. Luke's University Health Network (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Security Network Engineer

    Robert Half Technology (Allentown, PA)
    …packet capture devices Work with customers to form and fix appropriate policy and signature rules . This comprises tuning and development of the creation of ... software that ensures the stability and security of those network security systems Plan and appraise ongoing assessments in collaboration with the Information… more
    Robert Half Technology (04/25/24)
    - Save Job - Related Jobs - Block Source
  • Senior Security Content Engineer

    BlueVoyant (New York, NY)
    …Identify opportunities for client-specific needs to become base content, including rules , automations, and dashboards. + Identify opportunities for log content ... functional value resulting from research in the form of queries, signatures, rules , and contextual information. + Advancement of security policies, procedures, and… more
    BlueVoyant (05/10/24)
    - Save Job - Related Jobs - Block Source