of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using … metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a malicious attack or activity based off network traffic - Identify network mapping and operating system (OS) fingerprinting activities - Assist in the construction of signatures which can be implemented on cyber More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
your choice 1,200 industry leading organizations including Charter Communications, Tesla, and COX Communications. Similar Career Fields Include: Information Security Analyst, Network and Systems Administrator, and Computer System Analyst. About Our Organization: The U.S. Army offers a variety of possibilities for to discover your true potential - whether you are looking to gain technical expertise, travel the world More ❯
science, engineering, business, and other data processing problems to implement and improve computer systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software. What you'll do Analyze, design, and troubleshoot IT systems and processes to enhance efficiency, productivity, and … applications, ensuring compliance with DoD and DHA standards. Collaborate with cross-functional teams-including researchers, clinicians, and IT professionals-to gather requirements and translate them into technical specifications. Oversee system integration, testing, and validation to ensure solutions meet organizational and federal security requirements. Provide advanced troubleshooting and technical support; serve as an escalation point for complex system issues. … Ensure compliance with cybersecurity policies (e.g., DoD 8570.01-M), privacy regulations (e.g., HIPAA), and industry best practices. Develop and maintain comprehensive system documentation, including configurations, workflows, and security protocols Stay current with emerging technologies and federal cybersecurity mandates relevant to military and health research environment Conduct feasibility studies, risk assessments, and cost-benefit analyses for proposed IT solutions. Qualifications More ❯
science, engineering, business, and other data processing problems to implement and improve computer systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software. What you'll do Analyze, design, and troubleshoot IT systems and processes to enhance efficiency, productivity, and … applications, ensuring compliance with DoD and DHA standards. Collaborate with cross-functional teams-including researchers, clinicians, and IT professionals-to gather requirements and translate them into technical specifications. Oversee system integration, testing, and validation to ensure solutions meet organizational and federal security requirements. Provide advanced troubleshooting and technical support; serve as an escalation point for complex system issues. … Ensure compliance with cybersecurity policies (e.g., DoD 8570.01-M), privacy regulations (e.g., HIPAA), and industry best practices. Develop and maintain comprehensive system documentation, including configurations, workflows, and security protocols Stay current with emerging technologies and federal cybersecurity mandates relevant to military and health research environment Conduct feasibility studies, risk assessments, and cost-benefit analyses for proposed IT solutions. Qualifications More ❯
Atlanta, Georgia, United States Hybrid / WFH Options
The Computer Merchant, Ltd
JOB TITLE: Remote HPC Scientific Applications SystemsAnalyst/Programmer JOB LOCATION: Remote WAGE RANGE : $55Hr TO $58Hr . W2 ONLY JOB NUMBER: 25-03379 REQUIRED EXPERIENCE: Must be able to obtain a Public Trust Cloud Applications, Cloud Computing, Computer Programming, Design, High-Performance Computing (HPC) Systems JOB DESCRIPTION HPC Scientific Applications SystemsAnalyst/Programmer More ❯
Job Number: 212 Job Title: SYSTEMS/BUSINESS ANALYST - VIRGINIA -URGENT Job Type: Full-time Clearance Level: TS/SCI with POLY Work Arrangement: On-site Job Location: Tysons VA Background Supports an application delivery program by understanding and documenting requirements, dependencies and constraints Acts as a liaison between clients, stakeholders, and the development team to ensure alignment More ❯
SVAM International, Inc. a Great Neck, NY firm is looking for a Computer SystemsAnalyst with experience in the following areas: Job Title: Computer Systems Analyst. Requires a Bachelor's Degree in Computer Science, Computer Engineering, or Information Technology, and 2 years of experience in .NET C#, Angular, MVC Razor/Blazor, Postgre SQL, HTML/JavaScript, and More ❯
environments, information systems and technologies as they are introduced into the SIE. Experience and Skills: - Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired. - Technical background with system administration experience, architecture and engineering preferred - Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility. - Working knowledge of the RMF. - Knowledge of the Telos … Xacta or Enterprise Mission Assurance Support Services (eMASS) system is desired. Education, Certifications, and Clearance: - (8+) years of experience - Bachelors of Science or Bachelors of Art - Req. certification(s): Current DoD 8570.01-M, DoD IAT Level III or IAM Level III Required Clearance: - Active TS/SCI - Maintain applicable security clearance(s) at the level required by the client More ❯
Exalync, Inc. has mult F/T perm. openings for Buss. Systems/BI/Systems/Quality/IT/Buss. Analysts positions. Job loc'n: Tampa, FL & various unantcpt'd loc'n in the US. Reloc'n poss. More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Harnham - Data & Analytics Recruitment
SENIOR RISK DECISIONS SYSTEMSANALYST £48,000 SURREY THE COMPANY This company is a growing auto finance business who have an established presence in the UK. This company are particularly notable for their strong work culture and excellent progression and development. This role offers a rare opportunity to work on a range of projects as part of an More ❯
etc.) and uses discovered data to enable mitigation of potential incidents • Collects network device integrity data and analyze for signs of tampering or compromise • Analyzes identified malicious network and system log activity to determine weaknesses exploited, exploitation methods, effects on system and information • Tracking and documenting on-site incident response activities and providing updates to leadership through executive … identifying different classes and characterization of attacks and attack stages • CND policies, procedures and regulations • proactive analysis of systems and networks, to include creating trust levels of critical resources • system and application security threats and vulnerabilities of network topologies, Wi-Fi Networking, and TCP/IP protocols • Splunk (or other SIEMs) • Vulnerability scanning, assessment and monitoring tools such as More ❯
STI is seeking a Host Based SystemsAnalyst to perform investigations to develop a preliminary diagnosis of the severity of breaches. Provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. STI provides front-line response for digital forensics/incident … methodologies and protocols Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement Evaluating, extracting, and analyzing suspected malicious code Host-Based SystemsAnalyst 10+ years of network investigations experience. Required Skills: - U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - Directly relevant experience … analysis and characterization of cyber attacks - Experience with proper evidence handling procedures and chain of custody protocols - Skilled in identifying different classes of attacks and attack stages - Knowledge of system and application security threats and vulnerabilities - Knowledgeable in proactive analysis of systems and networks, including creating trust levels of critical resources - Must be able to work collaboratively across physical More ❯
Near Portland, OR - Forbes Magazine says Portland is the most livable city. SAP S4 Hana Supply Chain PP MM SystemsAnalyst $130K - $135K + 20% Bonus + 401K matching. See others below Onsite Hybrid - Full-Time Employee To Be Considered Please send a Word resume only. rather then hitting apply. Subject line should say I'm interested in … ther SAP SystemsAnalyst position. Make sure the required skills you have are on your resume Do you consent to receiving text messages related to employment opportunities from Computer Recruiters, Inc. Y/N Salary Review twice a year 6 month Salary Review Twice a year. One is merit and one is promotion SystemsAnalyst Supply …/4 HANA standard functions. Manages all aspects of existing SAP setup for our manufacturing operations You will be collaborating with department heads to plan and execute projects for system improvements as well as manage daily support for our SAP environment. You will be joining the company in the early stages of our S/4 HANA digital transformation More ❯
Tele-Consultants, Inc. (TCI) is seeking a highly skilled SystemsAnalyst with extensive expertise in HTML, CSS, and JavaScript to join our team that develops interactive electronic technical manuals (IETMs) in support of the Naval Undersea Warfare Center Division Newport (NUWCDIVNPT). Job responsibilities include, but are not limited to: • Support modernization efforts for an existing DoD IETM … system • Develop and implement an HTML-based solution to replace existing XML/XSLT-based IETMs to include converting structured XML content into HTML/CSS/JavaScript content • Collaborate with subject matter experts (SMEs) and engineering teams to maintain fidelity of technical data • Ensure that code meets browser compatibility specifications and limitations • Support quality assurance and integration testing … modern browser limitations and security considerations (e.g. XML parsing restrictions) Additional Preferred Qualifications: • Have a current security clearance eligibility • Prior experience supporting NUWCDIVNPT, especially within the Undersea Warfare Electromagnetic System Department (Code 34) • Experience developing DoD IETMs or other military technical writing products • Experience with the U.S. Navy's Common Submarine Radio Room (CSRR) The primary location for performance More ❯