trends identified via CTI and hunting campaigns, directly feeding into the vulnerability management and security engineering... prioritizing vulnerabilities, Common Vulnerabilities and Exposures (CVEs), in a vulnerability management program based on CTI feeds...
to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst...
to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst...
to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst...
as a trusted analyst providing technical and analytic rigor to guide decision-making for senior leaders, helping to shape...-developed solutions. Serve as a trusted analyst, providing technical and analytic rigor and providing technical and strategic...
those events. Platforms include anti-phishing, vulnerability management, patch management, end-point protection, data-protection... (email security, remote access, vulnerability management, endpoint protection, DLP); lead incident response; manage MSSP relationships...
those events. Platforms include anti-phishing, vulnerability management, patch management, end-point protection, data-protection... (email security, remote access, vulnerability management, endpoint protection, DLP); lead incident response; manage MSSP relationships...
Analyst on the project, you will: Prepare and maintain Security Assessment Plans (SAPs) and execute technical assessments... during RMF Step 2 and RMF Step 4. Identify, evaluate, and analyze vulnerability findings using Assured Compliance Assessment...
, and System Vulnerability Analysis. Effectively communicate with target COI representatives to align disparate activities..., Icon, Fade/Mist, Analyst Notebook, Palantir, TestFlight/Lucky/TAC, TIDE Intelligence experience as an inter-agency...
vulnerability management and security engineering programs Advance Detection: Coordinate with detection engineers to develop new... Experience prioritizing vulnerabilities, Common Vulnerabilities and Exposures (CVEs), in a vulnerability management program based...
, you will: * Design and build interactive client dashboards that make complex security metrics (MTTD, vulnerability trends, threat..., and maintain interactive Power BI / Tableau dashboards for clients, integrating data from our SIEM, EDR, vulnerability scanners...
of this position is to configure and operate boundary protection, intrusion detection and/or vulnerability assessment tools... have been gained in work such as computer operator or assistant, computer sales representative, program analyst...
, you will: * Design and build interactive client dashboards that make complex security metrics (MTTD, vulnerability trends, threat..., and maintain interactive Power BI / Tableau dashboards for clients, integrating data from our SIEM, EDR, vulnerability scanners...
, and Vulnerability Management Systems (VMS). ● Lead the development, review, and communication of security policies, standards... Information Systems Security Professional CISM-SEC - Certified Information Security Manager ACDA - ACL Certified Data Analyst...
analyst role, with a focus on information security, incident response, and vulnerability management. Must be US Citizen... a skilled and experienced Lead Security Analyst to join our dynamic team and play a pivotal role in safeguarding...
consider compliance with ISO 20000, ISO 27001, and NIST 800-171/CMMC frameworks. Oversee vulnerability management, threat... response, vulnerability remediation, logging, SIEM tools, and audit preparation. Cloud & Microsoft Ecosystem...
compliance with DoD STIGs, IA Vulnerability Management (IAVM), and cybersecurity best practices. Collaborate with cross... knowledge of Department of Defense (DoD) Security Technical Implementation Guides (STIGs) and IA Vulnerability Management (IAVM...
: Skills: Security Requirements, Security Standards, Vulnerability Scanning Certifications: None Experience: 5 + years... your cyber expertise and drive for innovation to GDIT. The Information Security Analyst Principal must have: Education...
, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle... Analyst, or Elastic Certified Observable Engineer Has achieved a Kubernetes certification, such as: Kubernetes and Cloud...
+ years of related experience US Citizenship Required: No Job Description: CYBERSECURITY ENGINEER SENIOR / ANALYST.... Own your career as a Cyber Security Engineer/Analyst at GDIT. Here, you’ll have the opportunity to build strong lines...