for all electronic communications systems at the site, as well as taking a leading role in delivering technology change/improvement projects and managing external support agreements. The Cyber Security Analyst is required to focus on the detection, investigation and response to cyber security events and incidents. Other tasks involve BAU security tasks, supporting cyber security projects and assisting with regulatory compliance. Daily tasks will involve the following: * Endpoint monitoring and analysis. * Incident readiness and handling as part of the ComputerSecurity Incident Response (CSIRT) team. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking … and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert notifications. * Advise incident responders & other teams on threat. * Triage security events and incidents apply containment and mitigation/remediation strategies. * Generate reports and document security incidents/events. * Proactively monitoring the performance of systems, and make regular routine inspections of installed equipment and take corrective avoidance More ❯
Kansas City, Missouri, United States Hybrid/Remote Options
City of North Kansas City
in-vehicle mobile data systems; Perform basic network cabling tasks; Assist with live streaming of public meetings; Manage employee accounts within various software platforms; Enforce policies relating to Acceptable Computer Usage; Train new employees with procedures and appropriate use of technology equipment; Manage mobile device accounts Maintain an inventory of equipment, coordinate requests for equipment, and set up equipment … Windows OS, Apple IOS and Microsoft 365 productivity software; Proficiency with PC, laptop, phone and tablet hardware; Proficiency with Active Directory and related Directory management tools; Thorough knowledge of computersecurity practices with a "security first" attitude; Strong understanding of networking basics; Able to use basic hand tools (e.g., screwdrivers, cable testers, crimpers, punch-down tools); Interpersonal … or stress; Ability to support remote workers as needed; Ability to accurately assess user needs and assist users to seek solutions to problems; Ability to interpret and explain complex computer operations and applications in layman's terms; Ability to consistently demonstrate sound ethics and judgment, think analytically make effective decisions, and act with integrity; Ability to comprehend, process, and More ❯
Job Title: FIPS 140 Security Engineer Location: Columbia, MD (Remote) Compensation: $60.00-$68.00/HR Duration: 6 month contract to hire In joining the team, you will get an exciting opportunity to work in the growing IT Security field in support of National defense. The products you will touch will be deployed into larger systems and/or … technology types and be able to use your skillset in a hands-on lab environment. Job Responsibilities: The selected candidate will work on varied FIPS 140 validation projects. General security analysis Design work (product architecture) Vulnerability testing Physical security testing System-level logical analysis Product evaluations against Technology Type standards (Protection Profiles) Cryptographic and Public Key Infrastructure (PKI … key exchange algorithms, hashing/message authentication algorithms, PKI, random number generators, etc. Experience with various programming languages (C, C++, Python or Java) and development environments. Ability to comprehend security standard requirements and apply them to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security related protocols and their design (i.e. More ❯
Atomic Weapons Establishment, Aldermaston, Reading, Berkshire, England
AWE PLC
into different placements within the HPC group. During these placements, you will learn a range of skills, including: Linux operating system administration (installation, configuration and management) Linux shell scripting Computer hardware (building/repairing) Networking File system management Computersecurity concepts System monitoring and fault diagnosis Customer interaction and problem investigation Training is primarily in-house but … one extraordinary mission: keeping the UK safe and secure. The UK’s independent nuclear deterrent has existed for 75 years to deter the most extreme threats to our national security and way of life, helping to guarantee our safety, and that of our NATO allies. Our work is critical. We’re delivering Astraea, the next warhead for the UK More ❯