This role functions as a technical expert who provides tactical planning, team management, threat emulation, and stakeholder communication, within a fast paced technical and cybersecurity proactive and reactive environment. RESPONSIBILITIES Operational Planning and Strategy Develop and lead Red Team strategies that align with the government customer's cybersecurity … in operational best practices, ethical hacking principles, and advanced offensive tactics. Promote a culture of continuous learning, encouraging team members to stay current on cybersecurity trends and developments in threat actor TTPs. Reporting and Communication Communicate findings, outcomes, and insights from Red Team operations to the government customer leadership … or equivalent experience Certifications preferred include: CISSP CISM CISA SANS GIAC certification (e.g., GPEN or GW APT) OSCP CEH Overview We are seeking a CybersecurityAnalyst SME (Red Team Lead) to join our team supporting a government customer. TekSynap is a fast-growing high-tech company that More ❯
opportunity to be a shareholder at CGI and join a family of 90,000 members strong. CGI Federal has an exciting opportunity for a CybersecurityAnalyst (Mid) to join a dynamic new program for one of our Federal Government clients. You will be part of a team … degree in a related field or equivalent demonstrated experience and knowledge 4 years as a Security Network Administrator or equivalent knowledge Strong knowledge of Cybersecurity best practices Strong verbal and written communication skills Desired qualifications/non-essential skills required: Security+ Certification CGI is required by law in some More ❯
Cybersecurity Operations Analyst II Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: CACI is seeking a Cybersecurity Operations Analyst to … join our team supporting the National Geospatial-Intelligence Agency (NGA) through our prime Transport & Cybersecurity Services (TCS) contract. In this role, you will provide cutting-edge information technology infrastructure services that are essential for delivering timely, relevant, and effective national security missions. Our TCS contract encompasses a wide range … of key services, including: innovative design and engineering, procurement and implementation, operations and sustainment, and the disposal of transport and cybersecurity IT services. These services will be deployed across multiple networks and security domains at various locations worldwide, directly supporting the NGA's vital mission. We offer flexibility in More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Apex Systems
Apex Systems is seeking a skilled Cybersecurity Metrics Analyst with a blend of business and technical expertise to support a metrics program by developing, collecting, analyzing, and reporting cybersecurity data. The ideal candidate will possess strong communication skills and thrive in a fast-paced, collaborative environment. … This role involves working closely with stakeholders to elicit, document, and refine requirements for enterprise cybersecurity metrics, ensuring alignment with organizational objectives. The candidate should feel comfortable engaging with senior-level executives, facilitating meetings, and presenting findings to decision-makers. In addition to completing tasks independently with minimal guidance … the candidate will work with the metrics team to optimize recurring processes and implement sustainable, long-term solutions. A solid understanding of cybersecurity issues and familiarity with dashboarding tools for metrics visualization is essential for success in this position. Position: Cybersecurity Metrics Analyst Location: Hybrid More ❯
our success in the impact of our service. Position Summary: ANSER is seeking a Workforce Analyst to support a federal program in cybersecurity planning, analysis, development, and promulgation of cybersecurity strategies. In this role, you will provide workforce subject matter expertise to advance research and specialized … analyses of cyber workforce policies, plans, and processes. Day to Day Responsibilities: Provide coordination and logistics to cybersecurity workforce efforts to advance them within DoD CIO. Support integration of cyber workforce policy, governance, recruitment, retention, and professional development programs into strategic plans and implementation initiatives. Provide specialized expertise to … development experience who can validate content and methodology. Assist in optimizing advance cyber training and certification programs. Develop strategic communication products on cyberspace and cybersecurity workforce initiatives and manage public-releasable content. Identify and execute strategic outreach activities that align with program goals. Coordinate with external offices to facilitate More ❯
Job Title: Cybersecurity System Analyst (Secure Software Development) Location: Offutt AFB, NE Clearance Required: Secret (minimum) Certifications: CASP CE, CISSP (or Associate), or CSSLP Position Summary: The Cybersecurity System Analyst will provide technical support for the development, assessment, and documentation of STIG compliance artifacts … enterprise. This role focuses on applying secure development methodologies, analyzing software baselines against STIG requirements, and producing compliance reports to support the Wing's cybersecurity posture and mission readiness. Key Responsibilities: Assist in developing required technical artifacts to meet DISA STIG and AFLCMC cybersecurity requirements Engage with software More ❯
Job Summary: ITS, LLC is seeking a CyberSecurityAnalyst to join our Colorado Springs, Colorado team. As a CyberSecurityAnalyst, you will be responsible for managing the Cybersecurity onboarding, alignment, and sustainment of traditional information technology and platform information technology for the Cybersecurity Service Provider (CSSP) program. Key Responsibilities: Provide cybersecurity expertise to mission system owners through CSSP onboarding and alignment procedures Gather and review cyber architectural artifacts for compliance with DoD and USSF governance and instructions Draft and maintain CSSP Service Level Agreements (SLA) in coordination … with subscriber mission partners Prepare and present briefings, reports, and informational analysis to cybersecurity stakeholders Preferred Qualifications: 2+ years of relevant Information Security or Cybersecurity experience in the DoD or Federal Government Communicate effectively, both orally and in writing, negotiate complex issues, and write comprehensive policies and procedures More ❯
An exciting opportunity has arisen for a CyberSecurityAnalyst with 2-3 years of experience in a 2nd line support role and security-focused role to join a well-established estate agency. This full-time role offers excellent benefits and a competitive salary. As a CyberSecurity … Provide basic security guidance to users and encourage adherence to security best practices. What we are looking for: Previously worked as a CyberSecurityAnalyst, IT SecurityAnalyst, SecurityAnalyst, SOC Analyst, IT Security Administrator, Network Security Administrator, Network Administrator, Cybersecurity … offer: Competitive salary 33 days holiday plus birthday off Pension scheme Employee assistance scheme Career progression opportunities Apply now for this exceptional CyberSecurityAnalyst opportunity to work with a dynamic team and further enhance your career. Important Information: We endeavour to process your personal data in a More ❯
An exciting opportunity has arisen for a CyberSecurityAnalyst with 2-3 years of experience in a 2nd line support role and security-focused role to join a well-established estate agency. This full-time role offers excellent benefits and a competitive salary. As a CyberSecurity … Provide basic security guidance to users and encourage adherence to security best practices. What we are looking for: Previously worked as a CyberSecurityAnalyst, IT SecurityAnalyst, SecurityAnalyst, SOC Analyst, IT Security Administrator, Network Security Administrator, Network Administrator, Cybersecurity … offer: Competitive salary 33 days holiday plus birthday off Pension scheme Employee assistance scheme Career progression opportunities Apply now for this exceptional CyberSecurityAnalyst opportunity to work with a dynamic team and further enhance your career. Important Information: We endeavour to process your personal data in a More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
who care deeply about improving the lives of others and making the world a better place. We're seeking an experienced Senior CyberSecurityAnalyst to support the research and development of new cyber analytic capabilities to help the US protect and defend its networks and critical information … actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at a large scale. As the Senior CyberSecurityAnalyst, you will work with our customers, developers, and researchers to evolve, automate, and enhance cybersecurity capabilities in defense or federal agencies. This … processes to support needs, capturing areas of improvement that can be translated into functional requirements for future planning Provide ad-hoc training to cyberanalyst teams on tools that support or enhance current processes Identify areas of technical training gaps and propose approaches to methods (hands-on, online More ❯
Purpose Manage day-to-day security operations including following up on triggered alerts, reviewing and monitoring SIEM logs, and ensuring the effective use of cybersecurity tools. Strengthen the companys security posture by working with NIST and CIS controls, leading efforts in the security awareness training program and ensuring end … user compliance with security best practices. Partner with the Cybersecurity Specialist on a wide range of security tasks. Essential Functions Regularly monitor and analyze security events and alerts from the SIEM tool and Security Operations Center (SOC) partner; respond promptly to alerts related to potential threats such as malware … unauthorized access, and system vulnerabilities Investigate security incidents triggered by alerts, perform root cause analysis, and collaborate with the Cybersecurity Specialist to resolve issues; follow up on unresolved alerts and ensure thorough documentation of findings and actions taken Support the implementation of NIST and CIS cybersecurity controls across More ❯
The Cybersecurity Network Analyst (CNA) performs systems and data threat analysis and enterprise-wide monitoring of Government systems and networks for insider threats. Performs baseline audits of usage of all Agency automated information systems and provides feedback in the form of written and oral reports and metrics. … technical exchange meetings. Provides product specific training on-site and off -site as required. Qualifications A Bachelor of Science (BS) degree in Computer Science, Cybersecurity, Engineering, or related field from an accredited college or university is required. Five (5) years of Cybersecurity Threat Analysis experience in the following … disciplines: Cybersecurity techniques and Network Analysis, Insider Threat Analysis software, TCP/IP fundamentals, Windows Operating Systems and supporting Office applications, real-world incident management and incident response. More ❯
City, Aberdeen, United Kingdom Hybrid / WFH Options
Baker Hughes Gruppe
Are you passionate about cybersecurity, risk & compliance? Are you passionate about being part of a successful team? Join us! A leader in the Energy Technology Industry, Baker Hughes offers opportunities for qualified people who want to grow in our high-performance organization. Our leading technologies and our ability to … part of our Digital Technology M&A team! You will be supporting the HQ DT M&A team in planning and execution of the cybersecurity section of deals, and Regional Compliance and Risk Management. You will oversee the M&A and Cybersecurity and Risk function across different Baker … Hughes business sites, presence and interests. As a M&A Cybersecurity and Compliance Analyst, you will be responsible for: Supporting the DT M&A team during all phases of deals, with responsibilities including all timely due-diligence responses, integration and separation strategies and plans, service delivery execution More ❯
Job Number: R Cybersecurity Telecommunications Analyst The Opportunity: When our country's cybersecurity is on the line, simply reacting is not enough-we need a plan. And when that plan needs to protect our defense telecommunications security, we need strategic policy development. That's why we … need you, a cybersecurity mobility spe cia list with the skills to analyze the policies that determine our cyber resilience. As a cyber strategic planning and policy development consult ant on our team, you'll assess cybersecurity, mobility, and telecommunications equities in current cyber policies , the coverage of … Join us. The world can't wait. You Have: 5+ years of experience working in a professional environment Experience with the DoD Knowledge of cybersecurity and telecommunications or mobility policies Ability to serve as a DoD action officer, facilitating senior-level forums and providing polished written products or verbal More ❯
various aspects of nuclear security, including stockpile management, nonproliferation, and nuclear security. The CyberAnalyst Tier 1 will enhance the organization's cybersecurity posture by performing comprehensive risk assessments, improving incident response protocols, and ensuring compliance with industry standards. This is an on-site position in Washington … DC . Requirements: Active Top Secret Clearance 1 - 3 years of Cybersecurity experience Monitor network traffic & security events to detect potential threats utilizing Splunk and SCOM. Conduct vulnerability scans and risk assessments utilizing Tenable and Nessus. Analyze logs utilizing Splunk, Panorama and Syslog to reconstruct timelines of security incidents. … Engage other cybersecurity experts frequently to share relevant knowledge, opinions, and recommendations, working to fulfill deliverables as a team. Support and enhance incident response strategies and threat detection capabilities. Apply network operations knowledge to predict potential attack vectors. Recommend improvements for threat data collection to support cybersecurity and More ❯
Candidate will design, develop, implement, or recommend cybersecurity control solutions that ensure protection of information and systems in support of the DoD's Positioning, Navigation and Timing (PNT) Enterprise. Work focus areas include: • Establish and satisfy complex enterprise-wide cybersecurity requirements based upon the analysis of user, policy … and new technology initiatives and recommends mitigation measures. • Applies expertise to government and commercial common user systems and dedicated special purpose systems requiring specialized cybersecurity features and procedures to include command and control-related networks. • Conducts cyberthreat analysis and recommends security control solutions that ensure protection of information and … systems. • Promote PNT resilience through drafting/editing of white papers, reports, staff packages for senior DoD leadership with a focus on cybersecurity areas. Location Pentagon Education and Experience • Bachelor's degree in a cybersecurity related discipline, or any Bachelor's degree and cyber related certification of CISSP More ❯
purpose of public service and not for profit, we measure our success in the impact of our service. Position Summary: ANSER is seeking a Cybersecurity Management Consultant to support a federal program in cybersecurity planning, analysis, development, and promulgation of cybersecurity strategies. In this role you will … performs similar organizational messaging activities. Support the development, implementation, and maintenance of strategy, doctrine, standards, policies, and procedures. Establish and satisfy complex enterprise-wide cybersecurity requirements based upon the analysis of user, policy, regulatory, and resource demands. Identify security risks, threats, and vulnerabilities of networks, systems, applications, and new … technology initiatives and recommends mitigation measures. Apply expertise to government and commercial common user systems and dedicated special purpose systems requiring specialized cybersecurity features and procedures. Support the development, implementation, and maintenance of strategy, doctrine, standards, policies, and procedures. Provide cybersecurity expertise during policy, initiative, manual, and instruction More ❯
expert advice and consultation on a diverse range of IT subjects, focusing on acquisition, policy, cybersecurity, engineering, and process development. The CyberSecurityAnalyst will support the USFF N6 Directorate Fleet Enterprise Support Team, Package Submitting Office (PSO) in the end-to-end Risk Management Framework (RMF … network architectures and technical/non-technical operating features adequately protect and defend against unauthorized access, ensure systems availability, and meet DoD/Navy Cybersecurity (CS) implementation policy requirements and data protection safeguards. Conduct CS compliance and A&A documentation validation assessments for Naval networks, legacy applications, and systems. … vulnerability assessment scanning tools and provide related reporting Proficient with Microsoft Office (Word, Excel, and PowerPoint) Good Communication Skills DoDM 8140 Systems Intermediate SecurityAnalyst Preferred: BS Degree in Computer Science, CyberSecurity, or related technical field CCSP, Cloud+, CySA+, or GICSP Familiarity with Afloat and Ashore Naval More ❯
What you will be doing! As a Cybersecurity Network Analyst (CNA), you will conduct threat analysis on systems and data while monitoring government systems and networks for potential insider threats across the enterprise. Additionally, you will perform baseline audits to evaluate the security of all automated information … passwords and monitor resource use. Back up files as required. Work with management to define requests for information. Education and Experience: 2+ years of Cybersecurity Threat Analysis experience in the following disciplines: Cybersecurity techniques and Network Analysis, Insider Threat Analysis software, TCP/IP fundamentals, Windows Operating Systems … and supporting Office applications, real-world incident management, and incident response. A Bachelor of Science (BS) degree in Computer Science, Cybersecurity, Engineering, or related field from an accredited college or university is required. Information Technology Experience creating knowledge objects and robust queries/searches, creating reports and generating charts More ❯
Cybersecurity Network Defense Analyst - Night Shift Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local CACI has an exciting and immediate opportunity for a Cybersecurity Network Defense Analyst to support the USAF Network Operations Security Center (NOSC). This position works on site and is a shift work position in a work center providing 24x7x365 support at Lackland Air Force Base in San Antonio, Texas. If you want to use your advanced More ❯
us to create and maintain secure digital ecosystems using our comprehensive cybersecurity platform and mitigation services. We are looking for a SOC Analyst L2 to join our SOC, which monitors, investigates, and resolves security incidents, violations, and suspicious activities. Our global SOC group takes innovative approaches and … detection, triage, analysis, and response. Address security-related concerns and provide solutions to customers directly. What do we expect from you: 3+ years in Cybersecurity/SOC, with at least 2 years in SOC operations. Hands-on experience with tools like Splunk, EDR (e.g., SentinelOne), and Microsoft Security products. … SIEM tools, or similar. Understanding of ISMS principles (e.g., ISO27001 frameworks). Proficient in incident detection, response, and management. Up-to-date knowledge of cybersecurity trends, risks, and incidents. Strong verbal and written communication in English. Excellent interpersonal and presentation skills. Ability to work with minimal supervision. Complete learning More ❯
Permanent Job Description CyberSecurityAnalyst In this role as a CyberSecurityAnalyst, you'll be instrumental in safeguarding digital assets, ensuring data confidentiality, and maintaining system integrity. You'll work within a team to monitor, analyze, and respond to security incidents while implementing critical More ❯
higher certification (such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC, etc.) prior to starting. Must be able to obtain DoD 8570 CSSP-Analyst certification (such as CEH, CySA+, GCIA, etc.) within 6 months of starting. Required Qualifications: Bachelor's degree and 3+ years of prior relevant experience … skills, and the ability to create complex technical reports on analytic findings Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain and an ability to think and work independently Strong analytical and troubleshooting skills. Willing to perform shift work, including weekend hours. Preferred Qualifications … IT products, services and solutions to the Pentagon and other National Capitol Region DoD offices for them to meet mission and business requirements. Our Cybersecurity team performs cyber defensive actions in support of J6, including monitoring network and end point data to prevent, detect, respond and recover from adversarial More ❯
Tyto Athene is searching for several Cybersecurity Analysts at Ford Island in Honolulu, Hawaii to support GSM-O II Network Assurance in providing for the integrity and security of cyber systems and networks for the Defense Information Systems Agency's (DISA) global Information Technology enterprise. Responsibilities: Monitors systems and … anti-virus systems in support of investigations for information systems security violations and incidents. Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts, and reports and tracks incident findings and resolutions to customers that include trends … vectors, and methods of exploitation with a comprehension of cyber threat actor tactics, techniques, and procedures. Assesses, plans, and enacts measures including refinements to cybersecurity architecture, tools configurations, and detection signatures to help protect customers from security breaches and attacks on its computer networks and systems. Identifies and assesses More ❯
industry thought-leader. At Northrop Grumman, you will have the resources, support, and team to do some of the best work of your career. Cybersecurity Professionals, We Want You! Cyber assets everywhere are under siege from a wide spectrum of threats. Almost daily, these threats grow in sophistication, breadth … bring your best, with resources, support, and talented team members that will launch your career. At Northrop Grumman, we take a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the whole security realm of offense, defense, and exploitation. Thought leadership demands … and maintain, access to Special Programs as a condition of continued employment Preferred Qualifications: The ideal candidate will have a Bachelor's degree in Cybersecurity, a CISSP, and 6 years of experience with Certification & Accreditation of classified systems and eMASS/Risk Management Framework in a classified environment Knowledge More ❯