Computer Security Jobs

1 to 25 of 129 Computer Security Jobs

Security Engineer, Incident Response , Security Incident Response Team (SIRT)

London, United Kingdom
Amazon
Security Engineer, Incident Response , Security Incident Response Team (SIRT) Job ID: Amazon Development Centre Ireland Limited Amazon is seeking a qualified Security Engineer to join our innovative, high energy Information Security team. In this role you will work within the Amazon Security Incident Response Team (SIRT). SIRT Security Engineers respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. SIRT Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event … data and conducting root-cause analysis. With your technical expertise, you will be solving security challenges at scale, working to protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence. Key More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst with Security Clearance

Camarillo, California, United States
Brandes Associates Inc
Information Security Analyst Job Locations US-CA-Point Mugu Req No. Category Information Technology Type Regular Full-Time Clearance Level Top Secret Overview BAI, a defense contractor, is seeking an Information Security Analyst with 3+ years of experience with DevSecOps Automation and Continuous Integration Continuous Delivery (CI/CD) experience to work Department of Defense (DoD) programs at … be based on current qualifications, directly related experience, geographic location, and possible contractual requirements which could fall outside of this range. Responsibilities Information Assurance Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure May respond to computer security breaches and viruses Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses DevSecOps Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Research Scientist/Research Engineer- Safeguards

London, United Kingdom
AI Safety Institute
current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computer security, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computer security, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Sr. Information Security Engineer

Maidstone, Kent, United Kingdom
Driscoll's
Experience Years: 3-5 Years of Experience Employee Type: Regular Remote Type: Onsite About the Opportunity The role of Information Security Engineer will be responsible for identifying, investigating, and managing cybersecurity related events and incidents. As an Information Security Engineer, you will be responsible for security operations, using and managing security systems, identifying and managing risks … and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cyber security risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. About the Opportunity The role of Information Security Engineer will be responsible for identifying, investigating, and managing cybersecurity related events and incidents. As an Information … Security Engineer, you will be responsible for security operations, using and managing security systems, identifying and managing risks and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cyber security risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. Responsibilities Strong collaboration, teamwork and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

INFORMATION SECURITY ANALYST (514) - CALIFORNIA - URGENT with Security Clearance

Point Arena, California, United States
Cyberstrike Group
Job Number: 514 Job Title: INFORMATION SECURITY ANALYST (514) - CALIFORNIA - URGENT Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and … implement risk mitigation strategies Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses ntegrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Ensure the entire DevOps team, including developers and operations teams, share responsibility for following security best practices Enable automated security checks at each stage of software delivery by integrating security controls, tools, and processes into the DevOps workflow Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline Between 3 and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst (EA) with Security Clearance

Annapolis Junction, Maryland, United States
BlueHalo
for the details and apply to make the most out of your career. You'd like to do this Conduct in-depth target analysis and research. Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. Develop innovative tradecraft, exploitation techniques, and concepts of operation. Leverage knowledge of AMOD and proficiency in AMOD tools. Work closely with … You're required to have this Clearance: Active TS/SCI with polygraph Degree Type: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Years of Experience by Level: Level … Bachelor's degree and 2 years of experience in computer or information systems design/development/analysis or related fields. 2 additional years of experience may be substituted if you have an associates degree. Level 2 - Bachelor's degree and 5 years of experience in computer or information systems design/development/analysis 2 additional years More ❯
Employment Type: Permanent
Salary: USD 220,000 Annual
Posted:

Network Evaluator with Security Clearance

Maryland, United States
Tailored Access, LLC
Experience must be working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic software utilities (e.g., SNORT … and trace-route). Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics (including Applied Math); or a related field (i.e., other Engineering or Math) with at least one programming and at least four upper-level math classes (Calculus and above). Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SECURITY ANALYST, JOURNEYMAN (96) - CALIFORNIA - URG with Security Clearance

Point Arena, California, United States
Cyberstrike Group
Job Number: 96 Job Title: INFORMATION SECURITY ANALYST Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and implement risk mitigation … strategies Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Work with ISSO and … Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of computer More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Ongoing Need! Security Engineer - Splunk with Security Clearance

Fayetteville, North Carolina, United States
Anonymous Employer
Primary Responsibilities • Provides technical/management leadership on major tasks or technology assignments • Leads integration effort between all customer defined Security Operations Center tools with the Splunk Security Information and Event Management (SIEM) platform • Performs technical troubleshoot efforts in support of customer resources for complete network environments to identify and inform relevant parties of network or security configuration issues for SIEM data collection • Responsible for SIEM security design review and recommendations, technical data gathering, security and policy review and configuration, security device implementation planning, configuration and implementation of security products, and technical quality assurance • Designs, architects, and implements Splunk solutions in support of cyber-security and IT operations and data scientists … Expected to demonstrate security related knowledge and skills, and good interpersonal and coordination skills • Create custom parsers and correlation rules for alerting security personal to potential security incidents. • Research cyber security related emerging trends • Provide experience architecting and managing Splunk Core and Splunk ES • Assist in managing TAs, source types and data formats, search, index clustering More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Target Digital Network Analyst (TDNA) - multiple levels - CLEARA with Security Clearance

Maryland, United States
Constellation Technologies Inc
JCAC, XKS, Dx, 8140, 8570, OSI, WireShark, port, protocol, packets, exploitation, Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph This position is open to multiple levels of years … analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. Relevant experience could also be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis … penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience. Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities More ❯
Employment Type: Permanent
Salary: USD 250,000 Annual
Posted:

Information Systems Security Manager - Tysons, VA with Security Clearance

Fairfax, Virginia, United States
M.C. Dean
operate, and maintain cyber-physical solutions for the nation's most recognizable mission critical facilities, secure environments, complex infrastructure, and global enterprises. The company's capabilities include electrical, electronic security, telecommunications, life safety, automation and controls, audio visual, and IT systems. M.C. Dean is headquartered in Tysons, Virginia, and employs more than 5,800 professionals who engineer and deploy … and change the world for the better. We are driven by our core values of agility, expertise, and trust. Clearance Requirement: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; Active TS/SCI clearance required. Responsibilities The Information System Security Manager (ISSM) is … responsible for the development, implementation, and continuous improvement of cybersecurity functions for multiple critical systems and for providing strategic and tactical leadership to a cybersecurity staff, including Information System Security Officer(s) and cybersecurity analysts. In collaboration with the Facility Security Officer (FSO) and business leadership, take responsibility for establishing Information Systems Security Program identifying, pursuing, and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Product Security Engineer

Boston, Massachusetts, United States
Bosch Group
yourself: At Bosch, we value values. Shape tomorrow: At Bosch, you change lives. Come Join us in Watertown, MA and learn how we work ! Job Description As a product security engineer you will play a key role in the evaluation, support, management, and implementation of cybersecurity measures pertaining to HVAC control and communicating systems for Bosch Home Comfort North … America. The selected individual will possess some experience in the design and validation of security services executing on different hardware platforms. He or she will assume the role of Security Manager for current and future projects, and be responsible for security feature implementation according to the product life cycle for various HVAC connected systems. Job Responsibilities Security … Secure design, architecture, implementation, and penetration testing of HVAC connectivity systems (i.e. IoT devices, AWS cloud, Mobile App). Secure development life-cycle (SDLC) practices including threat modeling and security testing. Influence decision-makers and stakeholders throughout the organization across project teams to achieve a consistently high security bar. Assist in security review engagements and lead remediation More ❯
Employment Type: Permanent
Salary: USD Hourly
Posted:

Product Security Engineer

Watertown, Massachusetts, United States
Bosch Group
yourself: At Bosch, we value values. Shape tomorrow: At Bosch, you change lives. Come Join us in Watertown, MA and learn how we work ! Job Description As a product security engineer you will play a key role in the evaluation, support, management, and implementation of cybersecurity measures pertaining to HVAC control and communicating systems for Bosch Home Comfort North … America. The selected individual will possess some experience in the design and validation of security services executing on different hardware platforms. He or she will assume the role of Security Manager for current and future projects, and be responsible for security feature implementation according to the product life cycle for various HVAC connected systems. Job Responsibilities Security … Secure design, architecture, implementation, and penetration testing of HVAC connectivity systems (i.e. IoT devices, AWS cloud, Mobile App). Secure development life-cycle (SDLC) practices including threat modeling and security testing. Influence decision-makers and stakeholders throughout the organization across project teams to achieve a consistently high security bar. Assist in security review engagements and lead remediation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst/CNDA (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
Weeghman & Briggs is seeking Computer Network Defense Analysts (CNDA) of multiple levels. Join our growing team and support an important mission within the Federal Government. Location: Annapolis Junction Clearance Required: TS/SCI w/Polygraph As a Computer Network Defense Analyst (CNDA), your responsibilities will include: Use information collected from a variety sources (e.g., intrusion detection systems … such as video teleconferencing, and the hardware and software that support it all. You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission … including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers. Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:

Exploitation Analyst (EA) Level 1 - 4 with Security Clearance

Columbia, Maryland, United States
Tailored Access, LLC
teammates, stakeholders, and intelligence consumers Locations: MD, VA, GA, TX, OH, UT, HI, AK Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree. Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree. Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer … an associate degree Benefits: Weeghman & Briggs was established in 2016. We are a team of like-minded people who do business, generate ideas and realize them. Consulting and Cyber Security are our main directions and we know how to deal with many current issues and provide the best services in offering resolutions. Weeghman & Briggs is an Equal Employment Opportunity More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:

Computer Network Defense Analyst (CNDA) Level 1 - 4 with Security Clearance

Columbia, Maryland, United States
Tailored Access, LLC
collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission … teammates, stakeholders, and intelligence consumers. Locations: MD, VA, GA, TX, OH, UT, HI, AK Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Information System Security Officer with Security Clearance

Linthicum Heights, Maryland, United States
Cyber Bat Inc
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves. • Provide guidance and technical expertise on all matters that impact or effect the security of the information system. • Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a … routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant information system software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A Bachelor More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Security System Specialist with Security Clearance

Bethesda, Maryland, United States
Mission Services LLC (MSI)
Tittle: Computer Security System Specialist Location: Bethesda, MD/McLean, VA (Hybrid) US Citizen or Green Card - Education: Bachelor's degree in Cybersecurity, Information Technology, or a related field (Master's preferred). - Experience: 4+ years in cybersecurity, focusing on vulnerability management, patch management, and threat detection in federal systems. - Technical Expertise: Expert knowledge of tools like Tenable … Security Center, BigFix, JAMF, and Splunk for real-time monitoring and compliance management. Familiar with DoD RMF and FISMA cybersecurity standards. - Leadership: Proven ability to lead vulnerability management teams, implement security controls, and develop incident response strategies. Experience conducting security assessments and ensuring compliance with federal cybersecurity regulations. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Reverse Engineer - multiple levels - CLEARANCE and POLYGRAPH REQ with Security Clearance

Annapolis Junction, Maryland, United States
Constellation Technologies Inc
IDA, IDA Pro, WINDbg, x64dgb, 011yDbg, Immunity Debugger, FireEye AX, Ghidra, CISSP, GIAC, GREM, CREA Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph This position is open to …/Degree Level 01 requires a minimum four (04) years of experience w/Degree Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Experience with any of the following: IDA … An Information Assurance Certification may also be required for some specific openings. Support Endpoint Exploitation Activities (EEA) with expertise in malware exploitation (MEX) or mobile-focused capabilities. Experience in Computer Network Operations (CNO) reverse engineering and development-primarily using Python-to enhance access capabilities and drive innovative solutions. Analyzing and advancing endpoint and mobile toolsets to meet evolving needs. More ❯
Employment Type: Permanent
Salary: USD 205,000 Annual
Posted:

Exploitation Analyst Level 3 with Security Clearance

Georgia, United States
ELEVI Associates, LLC
that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst Level 3 with Security Clearance

Annapolis Junction, Maryland, United States
ELEVI Associates, LLC
that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or More ❯
Employment Type: Permanent
Salary: USD 176,000 Annual
Posted:

SOC and Vulnerability Analyst

Greater Bristol Area, United Kingdom
Logiq
a varied and interesting workload, but we can nurture your inquisitive nature and help you create change in the workplace - making it better for all. Logiq Consulting are Cyber Security and Information Assurance experts. We specialise in providing leading edge consultancy to high-threat clients, as well as delivering a range of security services and products throughout the … Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in a SOC environment and/or have a strong … focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and prioritisation of security incidents and vulnerabilities. Collaborate with other More ❯
Posted:

Computer Network Defense Analyst Level 3 with Security Clearance

Wahiawa, Hawaii, United States
ELEVI Associates, LLC
Because You Deserve More Than Just a Job As a Computer Network Defense Analyst (CNDA), you will: Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network … such as video teleconferencing, and the hardware and software that support it all. You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission … that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Target Defense Network Analyst (TDNA) with Security Clearance

Reston, Virginia, United States
Clarity Innovations
Clarity Innovations is a trusted national security partner, dedicated to safeguarding our nation's interests and delivering innovative solutions that empower the Intelligence Community (IC) and Department of Defense (DoD) to transform data into actionable intelligence, ensuring mission success in an evolving world. We focus on challenges in Information Warfare, Cyber Operations, Operational Security, and Data Structuring, enabling … end-to-end solutions that drive operational impact. We are committed to delivering cutting-edge tools and capabilities that address the most complex national security challenges, empowering our partners to stay ahead of emerging threats and ensuring the success of their critical missions. At Clarity, we are people-focused and set on being a destination employer for top talent … to the soundness of system and network designs. You will have an opportunity to merge your skills with a team of other analysts, systems engineers, software engineers, and systems security engineers to ensure the customer's systems are always mission ready. Experience: Must have completed basic customer target development training or equivalent. Demonstrated proficiency in application customer target development More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Computer Security
25th Percentile
£24,460
Median
£25,640
75th Percentile
£58,313
90th Percentile
£62,025