- Applied Research Associates, Inc. (Madison, AL)
- …methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring , detection , and remediation tools and ... (CS124.16), + Introduction to Industrial Security (IS011.16), + Introduction to Information Security (IF011.16), + Introduction to Personnel Security … more
- Leidos (Ashburn, VA)
- …The ideal candidate will have a basic understanding of cyber threats, information security , and monitoring and detection . The candidate must be familiar ... contain and eradicate cyber threats to CBP networks through monitoring , intrusion detection and protective security... monitoring , intrusion detection and protective security services to CBP information systems including… more
- CACI International (Washington, DC)
- …Cyber Mission Forces exercises. + Expert understanding of cyber threats, information security , and monitoring and detection . The CPT Analyst Role will ... or for action. + Participate in a variety of Information System Security (ISS) activities, including: monitoring of systems status; escalating and reporting… more
- AbbVie (Mettawa, IL)
- …role will be responsible for the execution of the newly created, Business Application Security Monitoring (BASM) service. This is a technical role focused on ... available in the SIEM. Responsibilities + Onboarding new business application for security monitoring by following the application on-boarding process. +… more
- Amazon (Seattle, WA)
- …to identify sophisticated attack patterns and anomalous behaviors - Develop and optimize detection rules across multiple security monitoring platforms - ... capabilities that defend against sophisticated attacks at massive scale. As a Security Engineer on the Threat Discovery and Detection (TD2) team within… more
- DoorDash (New York, NY)
- …automations to strengthen the DoorDash security posture through proactive detection controls and effective monitoring . On call and weekend availability ... Threat Defense in the Security Operations organization, under the Chief Information Security Officer. You're excited about this opportunity because you will… more
- Amazon (Austin, TX)
- … (CLS) Detection Engineering protects Amazon's worldwide operations through advanced security monitoring and detection capabilities. We maintain ... protect Amazon's global operations through advanced SIEM management, enhancing our security monitoring capabilities and ensuring operational resilience. - Work… more
- Equitable (Syracuse, NY)
- …trendsetters; ability to apply industry knowledge appropriately to diverse situations. ** Information Security Management:** Knowledge of the processes, tools and ... limited to: + Lead and mature cybersecurity operations including monitoring , detection , response and recovery capabilities. +...techniques of information security management; ability to deploy and… more
- System One (Springfield, VA)
- …and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems ... and Networks. + Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure. + Receive tickets… more
- Marathon Petroleum Corporation (San Antonio, TX)
- …business operations are guarded and well protected against risks, threats and vulnerabilities. + Security Information & Event Management (SIEM) - A set of tools ... and services offering real-time visibility across an organization's information security systems, and event log management that consolidates data from numerous… more
- JPMorgan Chase (Columbus, OH)
- …in Computer Science, Engineering, or a technology-related field * Relevant experience in information security or technology controls * Knowledge of SQL, SQL ... during evenings and weekends, as required. Preferred * Knowledge of physical security technology systems (Access Control, CCTV, Intrusion Detection ), and basic… more
- MUFG (Tampa, FL)
- …packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.) + Ability to ... auditors to ensure documentation is complete and processes are in compliance with information security policies + Create reports analyzing activities or trends… more
- Indigo IT, LLC (Fort Meade, MD)
- …in real time. The ideal candidate will have deep expertise in network security , cyber threat intelligence, AI-driven detection tools, and large-scale sensor ... Founded in 2001, Indigo IT is an award winning information technology consulting and services company. We are a...Qualifications: + 10+ years of experience in cybersecurity, network security , or cyber threat detection . + Deep… more
- ManTech (Herndon, VA)
- …Systems Security Professional (CISSP), Certified Incident Handler (GCIH), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH) + ... to join our team in **Herndon, VA.** The NOSC Senior Cybersecurity Incident Detection and Response Analyst leads the monitoring , analysis, and response to… more
- ManTech (Stennis Space Center, MS)
- …Systems Security Professional (CISSP), Certified Incident Handler (GCIH), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH) + ... **ManTech** seeks a motivated, career and customer-oriented **Mid-Level** **Cyber Incident Detection and Response Analyst** to join our team in **Stennis, MS** . The… more
- Mount Sinai Health System (New York, NY)
- …team at Mount Sinai Health System. This role is responsible for leading the Security Monitoring , Investigation and Active Cyber Defense (ACD) program at Mount ... environments such as Azure, GCP or AWS and corresponding security monitoring tools + Deep understanding and...to effectively multitask + Strong technical understanding of the information security threat landscape (attack vectors and… more
- UIC Government Services and the Bowhead Family of Companies (Vicksburg, MS)
- …mitigate threats and/or attacks on DODIN. + Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of ... security controls + Participates in the development and monitoring of policies and procedures for department or department...IT and/or System administrator experience and 3 years relevant Information Security experience + Must have the… more
- The Boeing Company (Kent, WA)
- …standards and best practices + Assist in the implementation of security monitoring solutions, including security information and event management (SIEM) ... . This role will focus on defining, designing, and implementing a robust security monitoring and alerting solution specifically tailored for OT environments,… more
- Cayuse Holdings (Huntsville, AL)
- **Overview** This mid-level role supports mobile threat detection , incident response, and compliance tasks. The analyst will participate in daily monitoring of ... escalating mobile malware threats, support mobile forensic collections, and integrate security telemetry from MDM and application-level data. The role contributes to… more
- Cayuse Holdings (Huntsville, AL)
- …This role serves as the senior technical lead for mobile threat detection and response. The analyst is responsible for conducting advanced mobile forensics, ... The role includes integration of Mobile Device Management (MDM) data, anomaly detection using behavioral analytics, and full lifecycle mobile incident response. This… more
Related Job Searches:
Detection,
Information,
Information Security,
Monitoring,
Security,
Security Monitoring