vision, sensor fusion, and networking technology to the military in months, not years. ABOUT THE TEAM ABOUT THE JOB Anduril's Insider Threat team is looking for a senior cybersecurityanalyst to protect our organization from internal security threats. This analyst will be a critical part of analyzing anomalous activities, running investigations, and working across … concerns and issues to a non-technical audience. Work along side other members of the team to build custom tooling to automate manual processes. REQUIRED QUALIFICATIONS Action-oriented analyst with the ability to work autonomously and take ownership of complex projects. Knowledge of modern adversary tradecraft and mitigating controls. Proven experience in insider threat investigations, digital forensics, and … in security operations, particularly for identifying and addressing insider threats. Bachelor's degree in Information Systems, Information Security, CyberSecurity, Computer Science, Computer Engineering and 5+ years of securityanalyst experience; or 7+ years of securityanalyst experience without a degree. US Salary Range $146,000 - $194,000 USD The salary range for this role is More ❯
The Tier 2 CybersecurityAnalyst role supports advanced threat detection and incident response within a Security Operations Center (SOC). This position serves as an escalation point for Tier 1 Analysts and is responsible for conducting deeper analysis and investigation of complex security events. Candidates should possess more than five years of experience in cybersecurity operations … and collaboratively in a high-tempo operational environment. Desired Qualifications: Industry certifications such as CompTIA Security+, CySA +, CEH, GCIH, GCIA, or CISSP. Experience supporting Department of Defense (DoD) cybersecurity missions. Familiarity with scripting or automation (e.g., Python, PowerShell) to support investigative workflows. Experience with threat intelligence platforms and integration into SOC operations. Familiarity with the following tools, software More ❯
ManTech seeks a motivated, career and customer-oriented Senior CybersecurityAnalyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will provide expert-level reach back support and guidance to our Network Operations Security Center (NOSC). The ideal candidate will possess extensive knowledge and experience in cybersecurity principles … driving security initiatives within the NOSC. This role reports to NOSC PM/DPM. Responsibilities include, but are not limited to: Serve as a Subject Matter Expert (SME) in cybersecurity, providing expert guidance and support to NOSC staff. Develop, implement, and maintain security policies, procedures, and standards for the NOSC. Design, implement, and manage security tools and technologies used … Collaborate with other teams outside of the NOSC to apply lessons learned, and ensure security is integrated into all aspects of NOSC operations. Minimum Qualifications: Bachelor's degree in Cybersecurity, Information Assurance, Computer Science, or a related field. 3+ years of experience in cybersecurity, with a focus on NOSC operations or related areas. Expert-level knowledge of securityMore ❯
Overview Integration Innovation Inc. (i3) is seeking a skilled and experienced Senior CybersecurityAnalyst/ISSO to support both our corporate enterprise IT network and our classified information systems operating within a secure space. The ideal candidate will possess expertise in implementing and managing security controls across diverse environments, ensuring compliance with NIST SP 800-171, DFARS … to detect, respond to, and mitigate threats. Perform continuous monitoring activities, analyze security events and logs, and respond to incidents in coordination with enterprise IT teams. Maintain and update cybersecurity policies, procedures, and plans (SSP, POA&M, IRP, CM, CP) for enterprise systems. Collaborate with cross-functional teams to enhance security architecture, enforce security baselines, and conduct enterprise risk … response within the classified environment. Support classified system configuration management, account management, and change control processes. Other duties as assigned. Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). 6-12 years of relevant experience. US Citizenship required. Active DoD Secret clearance and ability to obtain required. Candidate must have the More ❯
including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders. ACTIVITIES & RESPONSIBILITIES Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats. Conduct deep … led cyber exercises or red/blue team simulations. Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends. Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape. SKILLS Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and … classified or sensitive information appropriately. REQUIRED QUALIFICATIONS Bachelor's degree, preferably in an IT-related field 10+ years of experience in IT with a minimum of 4 years in Cybersecurity Active TS Clearance Experience with Splunk Enterprise Security PREFERRED QUALIFICATIONS & COMPETENCIES Experience with Microsoft Sentinel Related certifications, such as GIAC Cyber Threat Intelligence (GCTI) Overview We are seeking an More ❯
Job Number: R CybersecurityAnalyst, Mid The Opportunity: As a cyber mission specialist, you understand the value of hunt-forward operations, and you know that battles are won in the grey. At Booz Allen, you can use your cyberspace operations experience to create solutions that will be executed on a worldwide stage. We're looking for a … cyber mission specialist like you to apply your experience in various Cybersecurity areas, including Department of Defense (DoD) Risk Management Framework (RMF) guidance, Security Test and Evaluation (ST&E), system vulnerability, and compliance in support of Authorization and Accreditation (A&A) throughout the System Development Life Cycle (SDLC). In this role, you'll be counted on to help … threats and develop a way forward to meet organizational goals. You'll work with headquarters-level decision makers on the technical implementation of solutions for promoting the sustainment of cybersecurity across multiple technology areas. This is an opportunity to use your research and analysis abilities to adequately assess and inform operators and senior leadership and commanders on dynamic adversarial More ❯
Overview i3 is seeking a detail-oriented and security-driven CybersecurityAnalyst and Data Transfer Officer to support our cybersecurity operations and data protection practices. This hybrid role bridges real-time threat monitoring with secure data handling - ideal for a candidate looking to grow in both cyber defense and compliance-driven environments. You'll be part … CFR 117) and the Defense Counter-Intelligence and Security Agency (DCSA) Assessment and Authorization Process Manual (DAAPM) This role is critical to protecting sensitive information and maintaining compliance with cybersecurity standards and DoD data handling requirements. This position is located at the i3 Corporate Office in Huntsville, AL. Responsibilities Perform and log data transfers between classified and unclassified environments … Citizenship Ability obtain and maintain a DoD Secret Clearance. Active Secret Clearance preferred 1-3 years of experience in IT security, SOC environments, or classified operations Strong understanding of cybersecurity principles and network fundamentals Familiarity with RMF, eMASS, data labeling, and cross-domain transfer tools Understanding of data formats, removable media, and file security tools Excellent attention to detail More ❯
ManTech seeks a motivated, career and customer-oriented Senior Cloud CybersecurityAnalyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will ensure that the architecture and design of cloud-hosted information systems are functional and secure. You will conduct strategic planning and recommend implementation strategies. You will provide advice … and networks, identify vulnerabilities, and support the development of new exploitation techniques Apply the MITRE D3FEND framework to develop and implement defensive measures against cyber threats; collaborate with other cybersecurity professionals, law enforcement agencies, and intelligence organizations to share information and coordinate response efforts. Provide advice, design, recommend, develop, and implement cloud and hybrid cybersecurity solutions optimizing the … assess scope of malware campaigns and determine necessary remediation actions; conduct remote compromise assessments and producing assessment reports. Minimum Qualifications: Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field 9+ years experience in cloud security analysis, threat detection and response, and implementation of cybersecurity controls across cloud platforms, ensuring compliance with government or industry More ❯
candidates to apply. As positions become available, our recruiting team will promptly review applications and reach out to promising candidates. About the Role: We are in search of a CybersecurityAnalyst to join our Defense Group task force at the Colorado Springs, CO location. Shift hours would primarily be 5:00 AM - 5:00 PM on an … into sensors and SIEMs. Triage and review system alerts to identify malicious actors on customer networks. Assist T1 analysts with triage and analysis. Complete moderate-level analysis of potential cybersecurity events that could threaten IT Systems. Report incidents to customers and USCYBERCOM. Motivated self-starter with strong written and verbal communication skills. Create complex technical reports on analytic findings. … work effectively both independently and as a collaborative team member, demonstrating initiative and a strong work ethic in both settings. Committed to continuous learning and self-improvement in the cybersecurity domain, as evidenced by ongoing pursuit of certifications, active participation in industry forums, and dedication to staying ahead of emerging threats and technologies. Excellent problem-solving skills, including the More ❯
Washington, Washington DC, United States Hybrid / WFH Options
NewGen Technologies, Inc
This is a combination role of Cybersecurity Data Analyst and Privacy Data Analyst positions. Remote work is possible but candidates must be local to the Washington DC area as there is some onsite work. This opportunity is part of a multi-year contract. The Cybersecurity Data Analyst is responsible for conducting analysis … on data for improving and optimizing the judiciary's cybersecurity efforts. This position will be responsible for developing and reporting on key performance indicators to measure the effectiveness of the program. This role is also responsible for conducting analysis on cybersecurity data to ensure that personally identifiable information and other privacy related data are masked or removed from … cybersecurity datasets. Requirements US Citizenship At least 3 years of experience in cybersecurity with at least 1 year of experience in data analysis and privacy analysis Extensive understanding of applicable governing instructions including NIST Privacy Framework, the NIST Risk Management Framework and the NIST Cybersecurity Framework Good communication and customer relationship skills Working knowledge of Splunk Search More ❯
Safeguard the Nation's Mapping Data Here is your opportunity to take a leading role in federal cybersecurity and help protect one of the nation's most important resources, The National Map. This vital elevation data supports infrastructure, environmental planning, disaster response, and national defense, making its security a matter of national importance. As a CybersecurityAnalyst … your chance to directly contribute to protecting the systems that help safeguard our nation. Apply today or send your resume directly to Antoine Thomas: Requirements: -Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field -Experience finding and fixing security vulnerabilities -Skilled in reviewing and verifying patches to ensure systems stay up-to-date and protected More ❯
Cybersecurity ISSO/SOC Analyst OASYS, INC., a Leading-Edge Government contractor, is seeking applicants for a Cybersecurity ISSO/SOC Analyst position to support our Army customer at Camp Roberts in San Miguel, California. Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role by ensuring continuous monitoring in … analysis support for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of an ISSO, Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Performs tasks in a variety of areas to include: Serve as the ISSO in support of … SIEM, firewalls, IDS/IPS). Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices. Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements. A high-level performer with the ability to be proactive and respond rapidly to changing conditions in a fast-paced environment May require CONUS and/or More ❯
Job Number: R Cybersecurity Operations Center Analyst The Opportunity: As a Cybersecurity Operations analyst on our team, you'll improve tier monitoring strategies and analyze threats, using state-of-the-art tools and platforms. You'll work with the team to comprehend, mitigate, and resp ond to threats quickly, restoring operations and limiting the … intelligence, event data, and assessments of events to identify patterns to understand attackers' goals to stop them from succeeding. This is a great opportunity to continue to build your Cybersecurity skills with hands-on experience in threat assessment and incident response. Join us as we protect clients from malicious actors. In this role, you'll lead a team of … professionals as they use cyberspace capabilities to evaluate potential weaknesses as well as the effectiveness of mitigations for cybersecurity solutions. You will leverage cyberspace operations systems to aggregate threat feeds that inform briefings for senior leadership aligned with our Army client. This is an opportunity to use your research and analysis abilities to adequately assess and inform operators and More ❯
in networking and cybersecurity. ANS was founded to disrupt the status quo. For over 20 years, our team provides expertise in network, system engineering and both offensive and defensive cybersecurity operations. What we do: Our vision is for a future in which talent and customers alike come to ANS because of our reputation for delivering technical excellence, solving our … develop, test, secure, integrate, implement, operate, and maintain the custom solutions that ANS delivers. Together, let's ensure today is safe and tomorrow is smarter. As an Intrusion Analyst on our team, you will: be trusted to analyze target digital network data to discover, analyze and document malicious or unauthorized activity using information collected from a variety of More ❯
Job Family : Cyber Consulting Travel Required : Up to 10% Clearance Required : Active Top Secret (TS) What You Will Do : Guidehouse Cybersecurity consultants help our clients solve complex technology and business issues from strategy through execution. A successful cybersecurity consultant at Guidehouse displays the following traits: flexibility, curiosity, ability to learn quickly, ability to think critically, strong communication skills … and subject matter expertise. Responsibilities of this role are as follows, to include but not limited to: Monitor computer networks for security issues, including investigating security breaches and other cybersecurity incidents. Document security breaches and assess the consequences/impacts; work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing, and remediate detected … security posture trends. Apply security policies to meet security objectives of the system. Ensure all systems security operations and maintenance activities are properly documented and updated as necessary. Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system More ❯
Job Number: R Cybersecurity Policy Analyst The Opportunity: When our country's cybersecurity is on the line, simply reacting is not enough-we need a plan. And when that plan needs to protect our defense telecommunications security, we need strategic policy . That's why we need you, a cybersecurity mobility spe cia list with … the skills to analyze the policies that determine our cyber resilience. As a cyber strategic planning and policy analyst on our team, you'll assess cybersecurity, mobility, and telecommunications equities in current cyber policies , the coverage of those policies , and areas of risks. You'll evaluate how policies stack up to regulations, best practices, and industry standards. … strategic cyber policy support . Join us. The world can't wait. You Have: 10+ years of experience in a professional work environment Experience with the DoD Knowledge of cybersecurity policies Ability to serve as a DoD action officer, facilitating senior-level forums and providing polished written products or verbal presentations Top Secret clearance Bachelor's degree Nice If More ❯
Responsibilities & Qualifications RESPONSIBILITIES In support of the DTRA IOC Cybersecurity department, the CyberSecurity Specialist will provide the required resources and expertise to support 24x7x365 cybersecurity monitoring and response across DTRA's distributed network operations environment. Working with the DTRA IOC, contractor CSSP analysts and engineers shall collaborate with various teams throughout the agency to process intelligence, determine … In addition, the CyberSecurity Specialist will provide support within the existing CSSP structure which includes four simultaneously running processes tooled to assist and defend the system subscriber. The CybersecurityAnalyst is responsible for network threat monitoring across a variety of tools. The analyst is expected to understand how to use standard threat hunting tools … security systems, experience with SIEMs, basic knowledge of network topography, intermediate understanding of network protocols, and through understanding of the OSI model. Minimum 2-3 years of cybersecurityanalyst experience Overview We are seeking a Senior CyberSecurityAnalyst to join our Prime Contract with the Defense Threat Reduction Agency. T ekSynap is a fast More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
Doing: Lockheed Martin invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. As a cybersecurity professional at Lockheed Martin, you'll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted … flow of energy that keeps modern life moving. Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll draw on all of your education and experience as well as the resources of Lockheed Martin to keep the threats at bay. The Work: We are … in search of a CybersecurityAnalyst to join our Defense Group task force at the Colorado Springs, CO location. Shift hours would primary be 5:00 AM - 5:00 PM on a alternating Panama schedule. As a valued member, you'll be on the front lines, defending Department of Defense networks from evolving cyber threats. You will More ❯
Job Number: R Cybersecurity Engineering Analyst Key Role: Provide subject matter expertise in support of cybersecurity activities. Review and evaluate defensive measures and information collection from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. C ond uct … are required to effectively manage the Computer Network Defense Service Provider ( CNDSP ) network and resources. Monitor network to actively remediate unauthorized activities. Basic Qualifications: 3+ years of experience with cybersecurity operations processes, procedures, guidelines, and solutions Experience with Transmission Control Protocol and Internet Protocol ( TCP/IP ) networking and core internet protocols, including User Datagram Protocol ( UDP ) and Internet More ❯
The Cybersecurity Network Analyst (CNA) performs systems and data threat analysis and enterprise-wide monitoring of Government systems and networks for insider threats. Performs baseline audits of usage of all Agency automated information systems and provides feedback in the form of written and oral reports and metrics. Performs focused monitoring capabilities on a case-by-case basis. … Participates in customer program and technical exchange meetings. Provides product specific training on-site and off -site as required. Qualifications A Bachelor of Science (BS) degree in Computer Science, Cybersecurity, Engineering, or related field from an accredited college or university is required. Five (5) years of Cybersecurity Threat Analysis experience in the following disciplines: Cybersecurity techniques and More ❯
Job Number: R Cybersecurity Risk Analyst, Mid The Opportunity: Are you looking for an opportunity to advance your experience in cybersecurity and security engineering that will safeguard our nation? As a systems security and network security engineer, you can identify the tools, applications, and systems needed to assess vulnerabilities and recommend the best solution and security … your experience to develop and implement security solutions that will protect our military. On our team, you'll troubleshoot and analyze complex challenges for customers using your knowledge of cybersecurity policy and risk management. You'll use your curiosity for technology and market trends to further research and develop security solutions. Using your knowledge and experience in ACAS, STIGging … and scanning, you'll assess security threats and implement infrastructure controls. In this role, you'll closely impact Navy missions by championing cybersecurity, discovering cyber risks, and providing hands-on support to critical mission areas. With mentoring, challenging hands-on problem-solving, and opportunities to learn new tools and skills, we focus on growing as a team to make More ❯
Tygart is seeking a CyberSecurityAnalyst to support a DOJ office in Clarksburg, WV. The ideal candidate must possess a current a Top-Secret clearance. Key Responsibilities: Support ISSOs in the evaluation of delivered software for security and compliance. Conduct dynamic, manual, and automated reverse engineering of binary files to identify vulnerabilities or malicious logic. Analyze and More ❯
Evolver Federal is seeking a Cybersecurity Risk Management Analyst to support its Federal client in Springfield, VA in managing all aspects of cybersecurity risk and compliance including, but not limited to: maintaining an accurate FISMA Inventory, managing the government's Common Control Program, maintaining the client's Cybersecurity policies, procedures, guidance, and related templates, assist … Risk Management Framework (RMF) and NIST 800-53 Rev 5, as well as previous experience managing POA&Ms across an enterprise portfolio and experience developing and maintaining cybersecurity policies and procedures. Responsibilities Apply knowledge of NIST 800-53 security controls and recommend appropriate allocation to support and enterprise-wide common controls program. Advise the government client on which controls … controls, and review/validate control inheritance. Review Control Implementation Statements to ensure proper implementation in alignment with NIST 800-53. Develop, maintain, and make recommendations for enhancing Cybersecurity Policies, Develop FISMA Metrics and Asset Management reports in compliance with requirements outlined in DHS 4300A/B. Monitor and manage FISMA Inventory and system designations (e.g., CFO, High More ❯
and transformation, critical communications, and logistics. Our people bring unparalleled expertise and dedication and we are always looking to expand our team. Consulting Services Group (CSG) is seeking a cybersecurityanalyst to execute vulnerability scanning and remediation operations within a geographically dispersed enterprise environment. This role encompasses network planning, assessments, and documentation support for compliance and accreditation … CK and NIST frameworks. Knowledge of vulnerability management and scanning best practices, such as the CVE database and the CVSS System used for scoring vulnerabilities. Has command of various cybersecurity principles, protocols, concepts, and theories in multiple disciplines. Ability to integrate the work of specialized personnel to produce the desired results. Knowledge of network-based services and client/… server applications, familiarity with intrusion detection systems, network architecture, and security infrastructure placement. Knowledge of cybersecurity vulnerabilities, mitigation strategies, network architecture, and how to apply security controls. Education: Bachelor's degree or equivalent training and experience in a computer-related field and at least 2 years of related experience. Desired Qualifications: Prior military experience in a cyber, signal, or More ❯
Evolver Federal is seeking a Cybersecurity Risk Management Analyst - Component Level to support its Federal client in Springfield, VA in managing all aspects of cybersecurity risk and compliance including, but not limited to developing and maintaining processes and tools, being the primary point person in stakeholder engagement and communication, developing and facilitating FISMA metrics and reporting … experience leveraging their in-depth working knowledge of NIST 800-37 (Risk Management Framework (RMF) and NIST 800-53 Rev 5, as well as previous experience developing and maintaining cybersecurity policies and procedures and reporting on FISMA metrics. Responsibilities Prepare and maintain security authorization packages for Federal review and approval. Develop authorization memos, collect artifacts, and identify risk weaknesses. … ATO, POA&Ms, PTA expirations) and advise stakeholders on expiring CP/CPT, POA&Ms, and privacy documents. Support updates to ISSO, ISSM, and System Owner Designation Letters. Provide cybersecurity SME support to programs and systems. Communicate clearly with system owners, developers, and executive leadership on various cybersecurity, risk and compliance topics. Support development of compliance processes and More ❯