Analyst - OTA to support the Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security.... Audit for counterintelligence, insider threat, and criminal activities. pertaining to Diplomatic Security jurisdiction...
Title: Counter Drug/Transnational Organized Crime Analyst Location: Arlington, VA Clearance: TS/SCI... activities Conduct all-source analysis of trans-regional and transnational threat networks associated with counter-drug...
US Government's threat watchlisting and screening mission. As an Intelligence Analyst, you will provide embedded analysis and reach...Intelligence Analyst Employment Type: Full-Time, Experienced Contact Government Services is hiring an Intelligence...
Responsibilities Peraton is seeking to hire a Sr Cyber Intel Analyst to become a part our Indications and Warnings...-source, proprietary/vendor, and classified reporting to closely track advanced persistent threat actor activity. Perform...
Responsibilities Peraton is currently seeking a Cyber Investigation Analyst - OTA for its' Department of State..., insider threat, and criminal activities. pertaining to Diplomatic Security jurisdiction on the network. Recommend strategies...
Network-Based System Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node... collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite...
security architectures, threat models, and risk assessments for AI implementations. Analyze AI system performance, security...
in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through... in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat...
for specific IOCs and IOAs. The Analyst will aid in defining tools, processes, and procedures for advancing Threat Hunting... responses to protect critical infrastructure. Our team plays a vital role in enabling real-time collaboration, threat...
orchestration Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts Rapidly respond to incidents to minimize risk... with information security policies Manage and support the development of security operations playbooks to ensure threat detection...
orchestration Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts Rapidly respond to incidents to minimize risk... with information security policies Manage and support the development of security operations playbooks to ensure threat detection...
databases (like MIDB or Analyst Notebook), and methodologies to track threats, identify vulnerabilities, and assess activities..., procedures, and legal guidelines. Combat and threat assessment: Supervise the development of threat vulnerability assessments...
, clearance, governemtn, DARPA, TS/SCI, DHS, federal, technical writer, business analyst, CONOPS, SOPs, standard operating... procedures, mission notes, editing, 508 compliance, documentation, cyber, APT, advanced persistent threat, incident management...