developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Leeds, Horsforth, West Yorkshire, United Kingdom Hybrid / WFH Options
Headway Recruitment
security standards, including Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. In-depth knowledge of the Microsoft O365 environment and security solutions, threatintelligence analysis, Security Incident Response processes, disaster recovery, and business continuity principles. Familiarity with security testing principles, vulnerability scanning, risk identification, resolution, and more »
the Security Operations Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threatintelligence, and vulnerability management activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC … response efforts. Conduct post-incident reviews and implement corrective actions to prevent recurrence. Stay abreast of cybersecurity threats, vulnerabilities, and trends, implementing and maintaining threatintelligence feeds and tools. Develop and refine SOC procedures and playbooks based on emerging threats and attack patterns. Evaluate new security solutions and … technologies to enhance threat detection and response capabilities. Collaborate with IT and security teams to integrate security controls and automate workflow processes. Prepare and deliver regular reports on security incidents, trends, and metrics to senior management. Ensure compliance with regulatory requirements and industry standards for incident reporting and documentation. more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Supervise the collection of intelligence on events occurring both internal and external to Department of Defense networks. Oversee all-source intelligence support to JFHQ-DODIN operations, Cyber Protection … CCRIs), and Command Cyber Operational Readiness Inspection (CCORIs). Enhance situational awareness, situational understanding, and identify possible relationships, trends, and adversary TTPs based on threatintelligence information. Direct and develop the process of open-source intelligence research in support of threat discovery or research. Research, analyze … corroborate, and assess vulnerability information as it relates to intelligence reporting. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Ensure JFHQ-DODIN information provided to foreign entities is compliant with federal statues and restrictions. Basic Qualifications Active DoD TS/SCI clearance more »
Description Leidos is seeking a talented Cyber ThreatIntelligence Analyst to join our team to support a federal customer within the customers Security Operations. The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following: Identify, track and investigate high priority … threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures). A comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cyber security posture of the organization's IT … Information Technology, Cybersecurity, with 8-12 years of professional experience and at least 5 years in incident detection and response and/or cyber intelligence analysis. Maintain and drive the development of new reports of Cyber ThreatIntelligence analysis to peers, management, and customer teams for purposes more »
for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities: Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations Author, update, and maintain SOPs, playbooks, work instructions Utilize ThreatIntelligence and Threat Models to create threat hypotheses Plan and scope Threat Hunt Missions to verify threat hypotheses Proactively and iteratively search through systems and networks to detect advanced threats Analyze host, network, and application logs in addition to malware and code Prepare and … report risk analysis and threat findings to appropriate stakeholders Lead cyber threat hunt missions with minimal supervision or guidance and recommend courses of action, best practices, and mitigating actions to improve security practices. Established ability to write clearly and concisely regarding technical and non-technical products based on more »
overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities: Will conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness . Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's IT operating environment. Identify , track and investigate , and write technical products … for dissemination to stakeholders regarding high priority threat campaigns, malicious actors , APTs , emerging threats, etc . Bring a comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cybersecurity posture of the organization's more »
Description Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Department of Homeland Security (DHS … for the overall security of DHS Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations. Primary Responsibilities: Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations Author, update, and maintain SOPs, playbooks, work instructions Utilize ThreatIntelligence and Threat Models to create threat hypotheses Plan and scope Threat Hunt Missions to verify threat hypotheses Proactively and iteratively search through systems and networks to detect advanced threats Analyze host, network, and application logs in addition to malware and code Prepare and more »
Information Systems Agency (DISA) GSM-O II program, and DISA Global Defensive Cyber Operations (DCO) organization based out of Scott AFB, IL with Cyber ThreatIntelligence products, management of adversary indicators of compromise, tracking and monitoring of adversary tactics, techniques, and procedures, and leading cyber threatintelligence … in support of the Department of Defense (DoD) and Combatant Commands (CoCOMs). PRIMARY RESPONSIBILITIES: Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN. Support mission-critical Continuity … by creating incident reports, wiki updates, collaboration/chat tippers and notifications, DoD incident handling database queries, metrics, and trend reports. Assist in providing threat and vulnerability analysis as well as security advisory services and recommendations. Train and mentor other team members. BASIC QUALIFICATIONS: Active TS/SCI clearance more »
Information Systems Agency (DISA) GSM-O II program, and DISA Global Defensive Cyber Operations (DCO) organization based out of Scott AFB, IL with Cyber ThreatIntelligence products, management of adversary indicators of compromise, tracking and monitoring of adversary tactics, techniques, and procedures, and leading cyber threatintelligence … in support of the Department of Defense (DoD) and Combatant Commands (CoCOMs). PRIMARY RESPONSIBILITIES: Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN. Support mission-critical Continuity … by creating incident reports, wiki updates, collaboration/chat tippers and notifications, DoD incident handling database queries, metrics, and trend reports. Assist in providing threat and vulnerability analysis as well as security advisory services and recommendations. Train and mentor other team members. BASIC QUALIFICATIONS: Active TS/SCI clearance more »
and automation. Develop new processes, procedures, and playbooks for countermeasure implementation as new technologies are deployed in the environment. Understand intrusion sets, TTPs, and threat actors to better tailor countermeasure deployment across the enterprise. Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and … Assess, analyze, and effectively communicate risks associated with various types of countermeasures and their deployment in the environment. Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise . Proactively and iteratively search through systems and networks to detect advanced threats and … for implementation . Analyze host, network, and application logs in addition to malware and code. Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the more »
a Space Force Cybersecurity Policy Expert at Fort Meade, MD. This position is part of a large program supporting Air Combat Command's (ACC) Intelligence Surveillance and Reconnaissance (ISR) mission. The Space Force Cybersecurity Policy Expert will develop and implement US Space Force (USSF) Cybersecurity policy and guidance and … mission partners to deliver tailored Cybersecurity Service Provider (CSSP) solutions to USSF components. Workload will encompass Protective Domain Name Services, Attack Surface Management and ThreatIntelligence Collaboration activities. Primary Responsibilities: Document and execute policies compliant with DoD, USSF, NSA, NISSPOM, and NIST Special Publications. Promote rigorous awareness of … Cybersecurity Vulnerability Management alerts, bulletins, and Security Technical Implementation Guides (STIGS). Analyze unit host systems for indicators of Malicious Cyber Activity (MCA), Insider Threat, or lack of Defensive Cyber Operations best practices, document and report findings, and help implement risk mitigating corrective actions. Oversee Risk Management Framework (RMF more »
the collection, parsing, correlation, and visualization of events for a critical operational system; demonstrate strong skills in system administration, log management, event correlation, and threat detection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the systems … and talent in data visualization. Experience creating workflows for Incident Response within a SIEM Tool. Security+ Certification. GIAC Certified Incident Handler Certification. GIAC Cyber ThreatIntelligence Certification. Cybersecurity certifications. Formal SIEM training. Experience working on an Agile team/program. CSSKEY CONMD Original Posting Date more »