Senior Security Engineer - Cyber Threat Mitigation Lead WASHINGTON, District Of Columbia, United States Apply Job Description ECS is seeking a Senior Security Engineer - Cyber Threat Mitigation Lead to work in our Washington, DC office. ECS Federal is a leading information security and information technology company in Washington, DC. We are looking to hire a Senior Security Engineer - Cyber Threat Mitigation Lead to lead a cross functional team (Cyber Threat Intelligence, Hunt, and Analytics) on a long-term contract in Washington DC. The position is full time/permanent and will support a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance. The successful candidate will … be a deeply technical leader with hands-on engineering experience, a clear understanding of attacker behavior, and the ability to convert threat intelligence into actionable detections and countermeasures. This position also owns the quality and clarity of team deliverables, ensuring all intelligence products, detections, and reports effectively communicate their value and impact. Lead and mentor a cross-functional More ❯
We have an outstanding Contract to Hire position for an Intelligence Analyst to join a leading Company located in the Montgomery, AL surrounding area. US Citizenship is required. Candidate must have the ability to obtain and maintain a Top Secret/SCI Security Clearance. Responsibilities: Characterize and analyze network traffic to identify anomalous and potential threats to network resources … Coordinate with enterprise wide cyber defense staff to validate network alerts Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact on the environment Perform cyber defense trend analysis and reporting Perform event correlation using information gathered from a variety of sources within the enterprise to … correlation across a wide range of variety of source data sets (indications and warnings) Basic Hiring Criteria: High School diploma or equivalent Minimum 5 years of experience with DoD cyber threat intelligence activities to include the life cycle of cybersecurity threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, and procedures More ❯
We are seeking passionate people to grow the Cyber Security team within WTW and provide an excellent service and trusted expertise to all parts of our business. As part of a business wide transformation, we have an exciting opening for a new role of Global Head of Threat Intelligence. As part of the Cyber Defence and Security Operations … department, you will be a senior leader managing the Threat Intelligence service ensuring WTW can prevent and better understand cyber-attacks against our environment. You will need to have a good technical aptitude, excellent communicative skills to technical and non-technical audiences, and a solid business acumen to deal with other senior stakeholders across the business. This role … managing geographically dispersed teams across different time-zones. The Role As the Global Head of Incident Response, your primary responsibilities will be: Manage and develop a global team of Cyber Threat Intelligence analysts, providing expert assistance during a cyber incident and for routine investigations escalated by the SOC. Manage a team of analysts spread out cross the More ❯
We are seeking passionate people to grow the Cyber Security team within WTW and provide an excellent service and trusted expertise to all parts of our business. As part of a business wide transformation, we have an exciting opening for a new role of Global Head of Threat Intelligence. As part of the Cyber Defence and Security Operations … department, you will be a senior leader managing the Threat Intelligence service ensuring WTW can prevent and better understand cyber-attacks against our environment. You will need to have a good technical aptitude, excellent communicative skills to technical and non-technical audiences, and a solid business acumen to deal with other senior stakeholders across the business. This role … managing geographically dispersed teams across different time-zones. The Role As the Global Head of Incident Response, your primary responsibilities will be: Manage and develop a global team of Cyber Threat Intelligence analysts, providing expert assistance during a cyber incident and for routine investigations escalated by the SOC. Manage a team of analysts spread out cross the More ❯
Title: Cyber Threat Intelligence Analyst Client: U.S. Army Location: Fort Belvoir, VA 22060 • Provides cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities and attacks. • Performs monitoring and analysis of threat intelligence monitoring tool services, product contracts and relationships. … mitigation TTPs for identified malicious logic within the customer's environment. • Maintains current knowledge of tools and best practices in advanced persistent threats. • Regularly develops and produces succinct written intelligence reports 706 constructed from technical analysis and collected threat information for ECMA internal consumers. • Contributes cyber security perspective to discussions and decisions regarding MITRE Telecommunication&CK for Cloud. … Partners with peer cyber operations teams understand events and support technical analysis of malicious cyber security incidents. • Tracks potential threats associated with attempted intrusions and network and host-based attacks, and coordinates incident response efforts with cyber security teams. Minimum Qualifications: • Foundational Cloud Certification • Network and/or systems certification(s), such as Cisco CCNP or Microsoft More ❯
We're seeking a proactive Tasking Coordinator to support a government client in coordinating responses to cyber threats across departments. This isn't a traditional SOC role - it's about enabling defenders to act as one and sharing intelligence that drives action. Key Responsibilities: Triage and escalate reports as part of the Watch Officer rota. Monitor and assess … emerging cyber threats. Share actionable threat intelligence via reports and briefings. Manage tooling (e.g. malware sandboxes, TIPs) and collaborate across teams. Represent the organisation in wider cyberintelligence communities. What You'll Bring: Cyber security experience, ideally in a SOC or threat intelligence setting. Strong IT foundations and stakeholder engagement skills. Clear, concise communication … written and verbal. Familiarity with adversary TTPs and threat intelligence platforms. If you're a hands-on operator who thrives in fast-paced environments and enjoys working across teams, apply now to make an impact. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
annapolis junction, maryland, united states Hybrid / WFH Options
Lockheed Martin
Linux-based environments for development, deployment, and operational support. WHO WE ARE At Lockheed Martin, we're a leading aerospace and defense company that's shaping the future of cyber and intelligence. We're committed to: Innovating at the Edge: Harnessing the latest advancements in cyber, artificial intelligence, and machine learning to stay ahead of emerging threats … and opportunities. Supporting Our Mission: Equipping our employees with the tools, resources, and expertise they need to deliver innovative cyber and intelligence solutions that protect our nation, our allies, and our way of life. WHO YOU ARE Experience in-depth technical assessments at all levels, from initial concept through design, fabrication, testing, installation, operation, maintenance, and eventual system … disposal. WHY JOIN US Empowering Career Growth: Providing ongoing training, mentorship, and development opportunities to help our cyber and intelligence professionals stay at the forefront of their field and achieve their career goals. Competitive and comprehensive benefits package. Rewards and recognition for your hard work. Medical and dental coverage. 401k retirement savings plan. Paid time off for work More ❯
Analyst with China Specialty Overview: We are seeking a highly skilled and experienced All-Source and Threat Analyst with China Specialty to join our team in support of a cyberintelligence program. As an All-Source and Threat Analyst, you will play a critical role in analyzing and disseminating critical intelligence to support national security efforts. You … contribute to the protection of national security. Responsibilities: - Conduct research and analysis on various sources of information to identify and assess threats to national security. - Develop and disseminate strategic intelligence products, including written reports and oral briefings. - Build and maintain subject matter expertise in China-related issues - Collaborate with other Intelligence Analysts and stakeholders to drive intelligence … Staff Operations Specialists, and Supervisory Special Agents. Education and Experience Requirements: - Bachelor's degree in any major from a regionally accredited college or university. - Minimum of 2 years of intelligence analysis experience within the USIC, or 3 years of intelligence analysis experience supporting offices focused on cyber threats in lieu of degree. - One or more of the More ❯
annapolis junction, maryland, united states Hybrid / WFH Options
Lockheed Martin
Linux-based environments for development, deployment, and operational support. WHO WE ARE At Lockheed Martin, we're a leading aerospace and defense company that's shaping the future of cyber and intelligence. We're committed to: Innovating at the Edge: Harnessing the latest advancements in cyber, artificial intelligence, and machine learning to stay ahead of emerging threats … and opportunities. Supporting Our Mission: Equipping our employees with the tools, resources, and expertise they need to deliver innovative cyber and intelligence solutions that protect our nation, our allies, and our way of life. WHO YOU ARE Experience in-depth technical assessments at all levels, from initial concept through design, fabrication, testing, installation, operation, maintenance, and eventual system … disposal. WHY JOIN US Empowering Career Growth: Providing ongoing training, mentorship, and development opportunities to help our cyber and intelligence professionals stay at the forefront of their field and achieve their career goals. Competitive and comprehensive benefits package. Rewards and recognition for your hard work. Medical and dental coverage. 401k retirement savings plan. Paid time off for work More ❯
THreat Intelligence Lead £65000 GBP Onsite WORKING Location: Manchester, North West - United Kingdom Type: Permanent Cyber Threat Intelligence & Vulnerability Lead Leeds - Fully Onsite £65,000 Join a dedicated Security Operations Centre protecting UK Critical National Infrastructure. You'll lead a highly skilled Cyber Threat Intelligence and Vulnerability team, working with DV-cleared professionals on meaningful … mission-critical projects. What you'll be doing Leading CTI and vulnerability operations within a 24/7 SOC Overseeing intelligence gathering, analysis, and threat actor profiling (including use of tools like Cobalt Strike) Driving vulnerability management programmes, ensuring timely remediation of security risks Liaising with senior stakeholders across government and defence sectors Ensuring operational excellence and adherence to More ❯
Duration: 12 months Location: St Charles, MO As a Cybersecurity Engineer, you will: • Assess organization-wide security and privacy risk and update assessment results on an ongoing basis. • Perform cyber risk assessments and develop risk mitigation plans (i.e., POA&Ms, SCRM, etc.) using a variety of tools. • Perform system analysis and develop system test for cyber threats, cyber … and solutions. • Support and facilitate various ATO/IATT packages including processing IAVMs and CTOs for the same. • Applying Security Technical Implementation Guides (STIGs). • Managing and addressing any Cyber Tasking Orders (CTOs) related to the Cyber Tools. • Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations. • Support, as required … and operations deliveries. • Support the engineering installation & analysis of patches and various system updates and upgrades to determine system consequence of these changes. • Support the development and maintenance of cyber scanning, patching, remediation, tools and applications. • Attend, collect data from, out brief, and facilitate collaboration and project management from various program boards. • Providing feedback to Cyber Leadership and More ❯
Assess organization-wide security and privacy risk and update assessment results on an ongoing basis Perform system analysis and develop system test for cyber threats, cyber test activities, and the cybersecurity of large-scale events Support and facilitate various ATO/IATT packages including processing IAVMs and CTOs for the same Perform cyber risk assessments and develop … of these changes Attend, collect data from, out brief, and facilitate collaboration and project management from various program boards Applying Security Technical Implementation Guides (STIGs) Managing and addressing any Cyber Tasking Orders (CTOs) related to the Cyber Tools Documentation and verification of all installation and configuration steps for the labs and operations deliveries Providing feedback to Cyber Leadership and engineers to improve the cybersecurity tools and processes Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations Support cyber threat intelligence activities Support the development and maintenance of cyber scanning, patching, remediation, tools and applications Support, as required, TEMPEST, DFARS, COMSEC, CNSSI, and other compliance drivers More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Our client, a leading global organization, is partnering with a prestigious end client based in Reading. Were excited to offer an outstanding opportunity for askilled Threat Intelligence Specialist to join a dynamic IT team . If you are interested and have the relevant skills and experience, please apply promptly to discuss further. Job Title: Threat Intelligence Specialist Location … Reading, UK (Hybrid 4 days onsite) Duration: 6 months Rate: £465 per day Inside IR35 We are seeking a Threat Intelligence Specialist to join a global security team on a 6-month contract. This is a hands-on role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable … intelligence. Youll work closely with incident response, security operations, vulnerability management, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable threat intelligence with stakeholders across security operations, incident response, and fraud prevention. Conduct dark web investigations and OSINT gathering to More ❯
Rickmansworth, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Senior plc
developing yourself along the way. Why Join Us? Work with a talented team of security professionals in a threat-driven environment. Ability to help shape the future of our cyber defence capabilities across a wide and diverse range of businesses. Competitive compensation and benefits package. Flexible work environment with opportunities for remote work and professional development. Key responsibilities: Reporting … to the Director of Information Security & Information Technology, you will be responsible for: - Build and own Seniors threat intelligence strategy. Develop and own the threat management program with regular assessments, threat modelling, risk prioritisation and remediation activities. The individual will serve as a subject matter expert incyber threat management, advising our various businesses on adversary activities, situational awareness and … defensive actions. Designing tactical and strategic responses to emerging security threats Define, implement and manage our cyber threat capability working with our local IT teams, MSSP partners, vendors and other key stakeholders. Provide our IT teams with guidance on adversary intentions, objectives and potential opportunities. Maintain processes, procedures and tools for timely threat identification, assessment, avoidance and remediation, aligned More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
Threat Intelligence Specialist - Reading | 6-Month Contract | £470/day Inside IR35 We are seeking a Threat Intelligence Specialist to join a global security team in Reading on a contract basis. This hybrid role (4 days on-site) focuses on strengthening cyber resilience through intelligence collection, analysis, and actionable insights. Key Responsibilities: Collect, process, and analyse … data to identify threats and vulnerabilities. Deliver actionable intelligence to support incident response, security operations, and fraud prevention. Conduct OSINT and dark web investigations. Develop and share threat reports, identifying trends and behaviours. Collaborate with government, industry, and security partners to exchange intelligence. Your Profile: 2+ years' experience in cyber threat intelligence or incident response. Strong analytical More ❯
and defending vital networks. This work enhances the nation's ability to address the challenges of an increasingly complex global security landscape. About the Role This program provides the Intelligence Community with mission-critical Next Generation SIGINT Analysts and Cyber professionals dedicated to national defense. Join a team of experts in SIGINT, intelligence, and cybersecurity, delivering cutting … edge solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintain appropriate databases for targeting … tasking, and analysis Identify intelligence gaps to tailor current collection or enable new collection to close the gaps Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Apply your knowledge and understanding of IC needs and missions Work as part of a team, with government, military, and contractor personnel to develop shared More ❯
and defending vital networks. This work enhances the nation's ability to address the challenges of an increasingly complex global security landscape. About the Role This program provides the Intelligence Community with mission-critical Next Generation SIGINT Analysts and Cyber professionals dedicated to national defense. Join a team of experts in SIGINT, intelligence, and cybersecurity, delivering cutting … edge solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads. Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information. Maintain appropriate databases for targeting … tasking, and analysis. Identify intelligence gaps to tailor current collection or enable new collection to close the gaps. Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints. Apply your knowledge and understanding of IC needs and missions. Work as part of a team, with government, military, and contractor personnel to develop shared More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
IBEX RECRUITMENT LTD
Threat and Incident Response Lead Analyst Permanent or Contract | Hybrid 12 Days in Office (North West) Threat and Incident Response Lead Analyst is needed for a growing Cyber team who are looking to strengthen its cyber defence capabilities with the hire of a Threat and Incident Response Lead Analyst . This is a pivotal, hands-on role in … a growing cyber team. Youll lead threat intelligence and incident response efforts, shape defensive strategy and play a critical role in ensuring the organisation stays ahead of evolving threats. What Youll Be Doing: Lead all aspects of Threat Intelligence and Incident Response Perform gap analysis across tooling, processes and detection capabilities Implement and embed modern IR and … detection rules and improve response workflows Work with tools such as Microsoft Sentinel, Defender, Splunk, or similar What Were Looking For: Proven experience in hands-on incident response and cyber threat intelligence Strong understanding of modern detection and response strategies Familiarity with SOC tooling (Sentinel, Defender, QRadar, Cortex XDR, etc.) Knowledge of threat frameworks like MITRE ATT&CK More ❯
best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry. If you're a technical changemaker with a passion for Cyber Operations, Cloud and Data Analytics, or Engineering, we're looking for you! Love what you do AND where you work - alongside a supportive, innovative team of like-minded individuals. … Reporter (TAR) to join our team in the Annapolis Junction area and other field sites. The day-to-day: • Prepare synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with Agency missions of Signals Intelligence, Information Assurance and Computer Network Operations. • Prioritize … and courses of action, if applicable. • Help develop databases or working aids on target activity to enhance and build target knowledge and improve collection to execute Agency and the Intelligence Community's missions. • Perform pre-release quality control functions. The qualifications (required): • Must be a US Citizen • Must have TS/SCI clearance w/active polygraph • This position More ❯
effort and expertise are crucial to the success and execution of this impactful mission. This opportunity supports a team of Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation's Security . Job Description: We are seeking a dynamic Cryptologic … Cyber Planner with hands-on experience in supporting Government missions or similar efforts. In this role, you will be at the forefront of strategic and operational planning, driving collaboration across agencies, and working closely with external partners to deliver impactful cyber and intelligence solutions. Your expertise will be vital in shaping mission success through innovative approaches in … collection, analysis, and external customer engagement. The Level 3 Cryptologic Cyber Planner shall possess the following capabilities: Relevant experience must be in an area directly related to a DoD mission (e.g. collection, cyber and intelligence analysis) and/or similar mission and include strategic and/or operational level planning (e.g. joint operations). External engagement/ More ❯
annapolis junction, maryland, united states Hybrid / WFH Options
Lockheed Martin
collaborating with cross-functional teams to drive mission objectives. WHO WE ARE At Lockheed Martin, we're a leading aerospace and defense company that's shaping the future of cyber and intelligence. We're committed to innovating at the Edge: Harnessing the latest advancements in cyber, artificial intelligence, and machine learning to stay ahead of emerging threats … Linux and Unix operating systems. Strong Familiarity with programming languages such as Java, Python and Hadoop. WHY JOIN US Providing ongoing training, mentorship, and development opportunities to help our cyber and intelligence professionals stay at the forefront of their field and achieve their career goals. Competitive and comprehensive benefits package. Rewards and recognition for your hard work. Medical More ❯
ob Title: Cyber Security Analyst - DV Location: Fully remote Contract Duration : Until Feb 2026 (ad-hoc days as and when needed. Around 10 days/month) Daily Rate: £730.40/day (Umbrella - Maximum) IR35 Status : Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents. Have experience in analysing malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM … will help inform more effective responses by government, law enforcement and developers alike to combat cybercrime. Researching malicious Internet infrastructure is a highly specialised field that blends cybersecurity, threat intelligence, and network analysis. A specialist in this area should possess a combination of technical skills, analytical capabilities, and practical experience. The key objective is to derive new insights into More ❯
USCC, Cyber Command, J3, 8570, 8140, SEC+, IAT, IAM Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Minimum fifteen (15) years of experience with Fires and/or … Targeting or a related functional area Minimum of DOD 8140/DOD 8570 IAT Level II Assist with all aspects of cyber advanced targeting to include: interagency planning, joint targeting board support, cyber weapons capability analysis and pairing, target systems analysis, target materials production, collateral effects estimate, and joint planning group support Assist in the coordination of joint … strategic and operational planning and execution of joint fires, targeting, capability pairing, and threat mitigation in support of the Cyber Mission Force and partner operations Provide advice to leadership on all principles of the Joint Targeting Cycle to include: Focused, Effects-Based, Interdisciplinary, and Systematic Provides support to future operations planners integrating cyber capabilities into Combatant Command and More ❯
showcase your SIGINT Analysis/Reporting expertise while supporting missions that are vital to our national security. Position Description: Prepare synthesized products for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with customer missions of Signals Intelligence, Information Assurance, and Computer Network Operations. Prioritize … execute the customer and IC partners' mission. Perform pre-release quality control functions.Qualifications: Relevant experience must be in an area directly related to the customer's mission (e.g., collection, cyber and intelligence analysis) and/or a similar mission in the IC or DoD, and/or drafting/editing intelligence reports. A TS/SCI with … years of relevant experience Bachelor's Degree + 2 years of relevant experienceAbout the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis. We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors. Our More ❯
annapolis junction, maryland, united states Hybrid / WFH Options
Lockheed Martin
data analytics solutions and contributing to agile development projects. WHO WE ARE At Lockheed Martin, we're a leading aerospace and defense company that's shaping the future of cyber and intelligence. We're committed to innovating at the Edge: Harnessing the latest advancements in cyber, artificial intelligence, and machine learning to stay ahead of emerging threats … Unix operating systems. Strong Familiarity with programming languages such as Java, Python and or analytic development. WHY JOIN US Providing ongoing training, mentorship, and development opportunities to help our cyber and intelligence professionals stay at the forefront of their field and achieve their career goals. Competitive and comprehensive benefits package. Rewards and recognition for your hard work. Medical More ❯