Arlington, Virginia, United States Hybrid / WFH Options
KBR
Title: All Source Analyst - Insider Threat Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's … be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense. Key Responsibilities: Comprehensive All Source Analysis: Conduct comprehensive all source analysis in support of the InT mission Analytic Products: Produce all source analytic products in support of the InT … Work Environment: Location: Hybrid Travel Requirements: Minimal Working Hours: Standard Qualifications: Required: Clearance: TS/SCI Experience: Minimum 8 years Tactical and Strategic Insider Threat: Conducting analysis in a mission space supporting Insider Threat at tactical and/or strategic levels Threat Management: Personnel Security, ThreatMore ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition Job Title: Cyber Threat Intelligence Analyst IV Exempt Location: Hybrid 2x week onsite - 600 Dulany Street Alexandria, Virginia 22314 Clearance Level: Active DoD - Top Secret Required Certification(s … N/A SUMMARY The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a Cyber Threat Intelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyber threatanalysis, identifying mitigation and remediation courses of action, sharing actionable cyber threat … organizational IT asset protection, trending strategic cyber threats and situational awareness. A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position are Monday through Friday core hours but the ideal candidate will provide More ❯
Peterborough, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
a Level 3 Security Analyst, you will be at the forefront of our Security Operations Center (SOC), monitoring and responding to security incidents, performing threatanalysis, and contributing to the continuous improvement of our cybersecurity services. You will work within a dynamic team, ensuring the protection of our … Responsibilities: Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs. Conduct thorough threatanalysis and vulnerability assessments to identify potential security risks and implement mitigation strategies. Develop and refine incident response plans and playbooks to enhance … SOC effectiveness. Perform root cause analysis (RCA) for high-priority incidents and contribute to service improvements. Provide expert recommendations on security measures and solutions to clients and colleagues. Engage in knowledge sharing within the SOC and wider teams to enhance security awareness. Participate in on-call rota for critical More ❯
watchTowr's alignment to numerous industry standards, including ISO27001 and SOC2 Type 2, while going steps further where relevant due to watchTowr's unique threat model. You will oversee security monitoring, threatanalysis, threat hunting, penetration testing, and vulnerability management to align cyber risk management with More ❯
from cyber threats. With a minimum of 3 years of experience in cyber security and fluency in both English and French, you will conduct threat assessments, respond to incidents, and communicate findings to diverse, multilingual teams. This is a fully remote role based in the UK, offering flexibility and … the opportunity to work with cutting-edge security technologies. Key Responsibilities · Perform threat and vulnerability assessments to identify and mitigate risks across systems and networks. · Monitor network traffic using SIEM platforms (e.g., Splunk, ArcSight) to detect and respond to anomalies and cyber threats in real-time. · Conduct root cause … analysis of security incidents and implement remediation strategies. · Develop and maintain security policies, procedures, and tools to ensure compliance with standards such as NIST, ISO 27001, or Cyber Essentials. · Collaborate with cross-functional teams to enhance security posture, including cloud and application security. · Communicate technical findings, recommendations, and reports More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Cyber Threat Intelligence Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threatanalysis and working with … characterize threats. Support incident detection, response operations, and signature development and provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. … Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research focused on nation-state, criminal, or malicious Cyber activities Experience with translating complex technical cyber events into a narrative format for technical and executive audiences Experience with the technical capabilities and limitations of the More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Metronome LLC
Science experience to apply strong cyber security, Defensive Cyber Operations (DCO) and networking domain knowledge to support cyber analytics product development and model development, threatanalysis, and direct customer mission support. Work is performed mostly on customer site in Colorado Springs, CO. Must be open to some travel … in related field or 3 years experience with Masters; or High School Diploma and 9 years experience. Knowledge of Defensive Cyber Operations (DCO), including threat hunting methodologies. Technical experience with cyber data analysis to include continuous monitoring, intelligence, and reporting. Proficient in various query languages (SQL, KQL (Kusto … . Python experience, and bonus for experience using Jupyter notebooks. Experience with dashboarding/visualizations (Power-Bi, Superset, Kibana). Ability to abstract threat hunting concepts to look at the 'big picture' and discover threats that aren't captured by traditional methods (e.g. SIEMs). Experience in big data More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Enlighten, an HII - Mission Technologies Company
Science experience to apply strong cyber security, Defensive Cyber Operations (DCO) and networking domain knowledge to support cyber analytics product development and model development, threatanalysis, and direct customer mission support. Work is performed mostly on customer site in Colorado Springs, CO. Must be open to some travel … in related field or 3 years experience with Masters; or High School Diploma and 9 years experience. Knowledge of Defensive Cyber Operations (DCO), including threat hunting methodologies. Technical experience with cyber data analysis to include continuous monitoring, intelligence, and reporting. Proficient in various query languages (SQL, KQL (Kusto … . Python experience, and bonus for experience using Jupyter notebooks. Experience with dashboarding/visualizations (Power-Bi, Superset, Kibana). Ability to abstract threat hunting concepts to look at the 'big picture' and discover threats that aren't captured by traditional methods (e.g. SIEMs). Experience in big data More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
cover mainly the operational dimension of CPEL Cybersecurity. The role will collaborate with the Managed Cybersecurity Service Provider MSSP to protect the organization. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet our regulatory compliance requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threatanalysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen … REQUIREMENTS You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
cover mainly the operational dimension of CPEL Cybersecurity. The role will collaborate with the Managed Cybersecurity Service Provider [MSSP] to protect the organization. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet our regulatory compliance requirements. RESPONSIBILITIES The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threatanalysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen … REQUIREMENTS You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯
strategy of enhancing the bank's IT security further. Using a combination of third-party tooling and custom solutions to assist you with security threatanalysis and detection, you will help drive the security strategy for current and future product implementations. With good mentoring and coaching capabilities, you … to monitor, detect, and respond to potential threats in real-time. Lead the establishment of a Security Operations Center (SOC) for continuous monitoring and threat intelligence. Continuously evaluate and enhance security tools, technologies, and processes to stay ahead of evolving threats. Application and Cloud Security Implement best practices for … Incident Response Plans (CSIRP) and Disaster Recovery Plans (DRP). Lead the response to cybersecurity incidents, ensuring rapid containment and recovery. Conduct post-incident analysis along with the incident team to identify root causes and enhance defenses. Third-Party Security and Due Diligence Conduct risk assessments and due diligence More ❯
things you'll be doing: Design and implement security measures to protect applications and infrastructure from vulnerabilities, attacks, and other risks. Perform vulnerability assessments, threatanalysis, and incident response. Plan, scope and conduct Penetration Testing campaigns. Develop and integrate security requirements into the CI/CD pipelines. Collaborate More ❯
vulnerability testing and penetration testing: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threatanalysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and More ❯
london, south east england, united kingdom Hybrid / WFH Options
Global TechForce
vulnerability testing and penetration testing: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threatanalysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Erin Associates
an agile development environment Key Requirements: 3+ years in a similar role Strong skills in Python, AWS, Kubernetes, Terraform, Linux, and Ansible Experience with threatanalysis, vulnerability management, and Agile environments Relevant certifications are a plus Package & Benefits: £60,000 - £70,000 salary Flexible hybrid working (remote options More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SixGen Inc
We are seeking a Cyber Warfare Threat Analyst to join our growing team. As a Cyber Warfare Threat Analyst, you will be challenged in a variety of cyber security focuses. From your knowledge of foreign threats, avenues of attack, using your intelligence experience, you will create intelligence products … and briefings. You will work with Intelligence production centers to solve complex programs using data sources and intel tools. You will create threat analyses across the cyber domain and communicate technical information to wide-ranging audiences. This role resides in our delivery team and reports to one of our …/Disabled Employer. Core Responsibilities: Perform as part of a local or distributed team to develop intelligence briefings and analytic products to define operational threat environments. Review and provide expert input into critical T&E and intelligence documents including Initial Capabilities Documents, Capabilities Development Documents. Conduct intelligence analysisMore ❯
scale. And if something doesn't go to plan, this role will be accountable alongside the executive team to contain, control and disrupt any threat-and restore normal operations. Responsibilities will include: Championing our security culture-training our team to be the best form of defence. Conducting threat … and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a … us to achieve objectives, whilst also keeping us safe. Has good research and analytical skills utilising a variety of sources: online research, industry forums, threat intel feeds etc. using these to maintain oversight of current and future threats and opportunities to mitigate them. Has an enthusiastic 'roll up your More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SixGen Inc
We are seeking a Land and Expeditionary Warfare Analyst to join our growing team. As a Land & Expeditionary Warfare Threat Analyst, you will work in a team of other Threat Analyst Subject Matter Experts. From your knowledge of foreign threats, avenues of attack, using your intelligence experience, you … intelligence products and briefings. You will work with Intelligence production centers to solve complex programs using data sources and intel tools. You will create threat analyses using your warfare expertise and communicate technical information to wide-ranging audiences. This role resides in our Delivery Team and reports to our … sustain new technologies. Formulate, guide, and direct the technical approach; and define and negotiate with activity and agency personnel for necessary resources. Lead the analysis of vulnerabilities and threats to undersea platforms and systems. Responsible for assessing the operational utility and technical feasibility of new technologies. Responsible for the More ❯