12,934 Cyber jobs in the United States
Information Security Analyst - Cyber Threat Intelligence
Posted 4 days ago
Job Viewed
Job Description
Key responsibilities include monitoring various sources for threat intelligence, including open-source intelligence (OSINT), dark web forums, and commercial threat feeds. You will analyze threat data to identify patterns, trends, and potential impacts on the organization, developing comprehensive threat assessment reports. The Information Security Analyst will be responsible for developing and maintaining threat intelligence platforms and tools, ensuring their effectiveness and accuracy. You will collaborate with incident response teams to provide timely intelligence during active security incidents. Furthermore, you will contribute to the development of proactive security strategies, including vulnerability management and security awareness training, based on identified threats. Staying current with the latest cybersecurity trends, vulnerabilities, and attack vectors is crucial for this role. You will also be involved in developing and implementing security policies and procedures to enhance the organization's overall security posture.
The ideal candidate will have a Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications such as CISSP, CEH, or GIAC are highly preferred. A minimum of 3-5 years of experience in information security, with a specific focus on threat intelligence, incident response, or security analysis, is required. Strong analytical and research skills, coupled with proficiency in security tools and technologies (e.g., SIEM, EDR, threat intelligence platforms), are essential. Excellent written and verbal communication skills are needed to effectively report findings and communicate complex technical information to both technical and non-technical audiences. A passion for cybersecurity and a continuous learning mindset are key. This role offers a competitive salary, comprehensive benefits, and a dynamic work environment with opportunities for professional growth and development.
Information Security Analyst (Cyber Threat Intelligence)
Posted 4 days ago
Job Viewed
Job Description
Cyber Security Analyst, Threat Intelligence (WA)
Posted 22 days ago
Job Viewed
Job Description
Job Description
- Aid in creation of a scalable, holistic threat intelligence program that can serve as a template to aid in lululemon expansion plans/strategies.
- Create codified policies, procedures, standards and guidelines for conducting Threat Intelligence operations in concert with Monitoring, Detections, and Forensics Analysis across the company
- Communicate to leadership status, results, and summaries of threat intelligence capabilities, as well as the maturity and strength of these programs.
- Partner with other departments on authoring and socializing policies, process, standards for threat intelligence
Primary Skill - Project Management
Partial Remote work
This is a contract position
Cyber Analyst/ Cyber Security Analyst
Posted 24 days ago
Job Viewed
Job Description
Overview:
Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Cyber Analyst/Cyber Security Analyst onsite in Denver, CO with a TS/SCI clearance. In this role, you will monitor, analyze, for the purpose of mitigating threats.
Responsibilities:
- Monitor network traffic, logs and alert to identify suspicious activity.
- Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threat.
- Perform in-depth analysis of potential threats, vulnerabilities, and incidents to determine severity and impacts.
- Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience
- Relevant experience may be considered in lieu of required education.
- Relevant certifications (e.g. CEH, Security +, CYSA+)
At CDT, we offer a collaborative and inclusive work environment where your expertise in finance and HR can help shape the future of cybersecurity and engineering solutions. This position offers the opportunity to lead financial strategies while supporting HR initiatives in a fast-paced, government contracting environment.
Compensation and Benefits:
- Competitive salary based on experience.
- Comprehensive benefits package, including health, dental, and retirement plans.
- Opportunities for professional development and career advancement.
Apply Now:
If you are a proactive Cyber Analyst/Cyber Security Analyst and thrive in dynamic environments, we encourage you to apply and join the CDT team!
Salary: $115,000 - $170,000
Senior Information Security Analyst (Cyber Threat Intelligence)
Posted today
Job Viewed
Job Description
Key responsibilities include:
- Developing and executing comprehensive cyber threat intelligence strategies.
- Collecting, analyzing, and disseminating tactical, operational, and strategic threat intelligence from various sources (open-source, commercial feeds, government partners).
- Identifying and tracking threat actors, their motivations, capabilities, and objectives.
- Analyzing malware, phishing campaigns, and other attack vectors to understand adversary techniques.
- Producing detailed threat intelligence reports, briefings, and alerts for technical and non-technical audiences.
- Developing and maintaining threat models and attack chain analysis (e.g., MITRE ATT&CK framework).
- Integrating threat intelligence into security tools and processes, such as SIEM, SOAR, and endpoint detection and response (EDR) platforms.
- Collaborating with incident response teams to provide context and support during security incidents.
- Conducting proactive threat hunting based on intelligence findings.
- Assessing the organization's vulnerability to identified threats and recommending mitigation strategies.
- Staying current with emerging cybersecurity threats, vulnerabilities, and industry best practices.
- Building relationships with external threat intelligence communities and sharing relevant information.
- Mentoring junior analysts and contributing to the development of the CTI program.
The successful candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. A minimum of 6 years of experience in cybersecurity, with at least 3 years focused specifically on cyber threat intelligence, is required. Strong analytical and research skills, coupled with expertise in threat intelligence platforms and tools, are essential. Familiarity with various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain) and knowledge of programming/scripting languages (e.g., Python) for automation are highly desirable. Excellent written and verbal communication skills, with the ability to articulate complex technical information clearly, are critical. Relevant certifications such as GIAC Certified Cyber Threat Intelligence (GCTI) or Certified Threat Intelligence Analyst (CTIA) are a plus. This is an excellent opportunity to contribute to the security of a leading organization.
Cyber Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Location : Governmental Complex Downtown, Cheyenne
Job Type: Full Time
Job Number: 2025-00061
Department: Information Technology
Opening Date: 08/15/2025
Closing Date: 8/25/2025 11:59 PM Mountain
Hiring Range: 66,593.18- 78,743.72 Annually
Full Salary Range: 66,593.18 - 90,097.00 Annually
Summary
Under general supervision, conducts the operations, security, and configuration of Laramie County IT Cyber Security resources.
Essential Job Functions
(Essential function, as defined under the Americans with Disabilities Act, may include the following tasks, knowledge, skills, and other characteristics. This list of tasks is ILLUSTRATIVE ONLY and is not a comprehensive listing of all functions and tasks performed by positions in this class.)
- Monitor and maintain proper authentication measures, including MFA, privileged access, password management, and local and remote access.
- Monitor and maintain cyber security devices (firewalls/IPS/Web App Firewall, etc.), keeping policies updated for least privilege, accurate web filter rules, whitelist/blacklists, and Geo-blocking.
- Monitor and maintain file server activity, ensuring secure and accurate file/folder permissions.
- Monitor and maintain EDR solution, including Next Gen Antivirus and USB device management.
- Monitor and maintain email security, including Email gateway and O365 email security features.
- Coordinate tracking and replacing EOS/EOL assets, and detecting unknown assets,
- Ensure timely, regular, and vulnerability patching of all assets.
- Monitor Laramie County IT (LCIT)environment for abnormal activity and respond as necessary.
- Performs system backups and test recoveries of the LCIT environment (servers, switches, firewalls, etc.).
- Perform regular vulnerability and penetration testing and remediate vulnerabilities.
- Maintain, Update, and test IR, DR, and Business Continuity Plans.
- Implement and regularly conduct cybersecurity testing/training, including ongoing Phishing testing and training.
- Identifies and assesses cybersecurity hardware and software needs and recommends improvements.
- Stay up-to-date on emerging Cyber Security Threats, trends, and vulnerabilities and provide recommendations for addressing those issues.
- Assures effective communication of cyber security issues and strategies and coordinates LCIT development activities with other departments and agencies.
- Works to promote departmental Vision, Mission, and Values in all work activities.
- Complies with all County equipment, safety policies and procedures.
- Performs other duties as assigned or required.
Qualifications
Knowledge and Skills:
- Knowledge of County and Information Technology, policies, and procedures.
- Knowledge of security monitoring tools, including IPS/IDS, traffic analyzers, etc.
- Knowledge of system access and security guidelines and procedures.
- Knowledge of current cybersecurity theories, procedures, and threats
- Knowledge of hardware and software troubleshooting techniques in a networked environment.
- Knowledge of techniques for using cybersecurity devices, including firewalls, IPS, web filters, VPN, antivirus, and other devices.
- Knowledge of Local and Wide Area Network (LAN/WAN) administration techniques and network engineering principles.
- Ability to create a workplace that prioritizes customer satisfaction.
- Ability to effectively and efficiently manage resources, time, and finances.
- Ability to work effectively both as part of a team and independently.
- Ability to present a professional work attitude.
- Skill in analyzing cybersecurity issues, evaluating alternatives, and making logical recommendations based on findings.
- Skill in researching, analyzing, and evaluating cybersecurity applications, procedures, and techniques.
- Skill in installing, maintaining, modifying, and upgrading cyber security systems.
- Skill in assessing and prioritizing multiple tasks, projects, and demands.
- Skill in establishing and maintaining effective working relationships with public officials, outside agencies, County staff, and the general public.
- Skill in effectively communicating verbally and inwriting.
Minimum Qualifications: Bachelor's degree in computer science or related field; OR four (4) years' experience in cyber security; OR equivalent combination of education, training, and experience AND successful completion of a criminal history and background check.
Laramie County provides a competitive benefits package. For a detailed summary of the benefits provided please click the link below to access our benefit page.
01
What is your highest level of education?
- No Education
- High School Diploma or GED Equivalent
- Associates Degree
- Bachelors Degree
- Masters Degree
- Doctorate Degree
02
How many years do you have in cyber security?
- No experience
- 1-3 Years experience
- 4-6 Years of experience
- 7-9 Years of experience
- 10 or more years of experience
03
Do you live within 30 miles of Laramie County?
- YES
- NO
04
Did you submit a cover letter?
- YES
- NO
05
Did you submit a resume?
- YES
- NO
06
Describe your cyber-security background.
07
Describe your experience with enterprise backup systems.
08
Describe your experience with IR planning/documentation/testing.
09
Describe any experience you have recovering from an incident/outage.
10
Describe your experience with monitoring and investigation of network activity for threats.
11
Describe your experience with administrating cyber security equipment (NGFW, IPS, IDS, WAF, etc).
Required Question
Cyber Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Auto Data Direct, Inc. (ADD) is a division of Reynolds and Reynolds that provides fast, accurate, real-time access to motor vehicle, vessel and driver license records. As an Entry-Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks. You must also be able to communicate your findings and recommendations for upper management. You will work with teams across the organization including partnering with IT and Software Development on security related matters. If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI
Be The First To Know
About the latest Cyber Jobs in United States !
Cyber Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Overview
Please note that this position is contingent upon the successful award of a contract currently under bid.
A leader in cutting-edge research and technology in the cyber arena, CPMG focuses on using business drivers to guide cybersecurity activities and manage risk. CPMG offers flexible, integrative solutions for Department of Defense (DoD) contractors, among others, and specializes in cybersecurity, information and operational technology, electronic security surveillance, and support services.
Summary:
The Cybersecurity Analyst will provide support at Marine Corps Base Camp Lejeune, NC. The role focuses on ensuring the security, maintenance, and compliance of critical ICS/OT systems while adhering to DoD, DoN, and USMC cybersecurity requirements.
ResponsibilitiesEssential Job Functions:
- Support the continued operation, maintenance, and administration of existing ICS/OT solutions, including BAS, W&WW, HVSCADA, Metering, Lighting, and other systems as defined by CLNC PWD and FRCS Cyber Operations Group
- Conduct inspections and surveys of new and existing sites (buildings and physical locations) for ICS/OT Supervisory Controllers
- Compile and provide survey findings to CLNC PWD to integrate new ICS/OT systems into the existing solution
- Assist in inspecting and assessing Supervisory Controllers to ensure compliance with DoD, DoN, and USMC installation and configuration standards
- Help maintain a representative model of correctly installed ICS/OT Supervisory Controllers in the Testbed environment
- Configure Encrypt/Decrypt devices for integration with firewalls over the MCEN using approved IPSec VPNs
- Assist with connecting new Supervisory Controllers to MCEN via approved VPNs
- Maintain and update Encrypt/Decrypt devices to ensure cybersecurity and operational compliance
- Provide assistance in administering Nutanix Hyperconverged Virtual environments
- Support the maintenance of servers and applications for ICS/OT systems within Testbed, Preproduction, and Production environments
- Perform other duties as assigned
Qualifications
Necessary Skills and Knowledge:
- Strong analytical and problem-solving abilities
- Knowledge of DoD, DoN, and USMC cybersecurity policies and procedures
- Ability to work collaboratively in a team-oriented environment
Minimum Qualifications:
- Experienced in the use and administration of Nutanix Hyperconverged virtualized environments in support of EMCS servers and applications
- Experience in the use of SQL and Microsoft Sever software (current versions)
- Experience in Marine Corps Certification and Accreditation Support Tool (MCCAST V2)
- Networking experience in a DoD environment
- Knowledgeable of electrical and mechanical trades and code requirements
- Knowledge of TCP/IP, information security/authorization profiles, or security administration of Unix or Windows network/systems
- Experience with HBSS
- Experience with Automated Metering systems
- Knowledge of the USMC DEVSECOPS policy and its applicability to support ICS/OT systems/operations
- Knowledgeable of electrical and mechanical trades and code requirements
- Experience installing Metasys on servers and building graphics/trends/alarms/scheduling
- Experience in ICS control systems -Metasys, Niagara AX platform, Alerton, Honeywell, Trend, KMC, and American Automatrix and Loytec
- Experience in BACnet/MSTP, BACnet over IP, N2 and LON
- Experience in preforming software security updates, system patches, software patches, and version upgrades on Metasys, Niagara, Itron, and Honeywell software products
- Experience installing software and maintaining Itron Fixed-Network meter data collection systems
- Expert in the USMC A&A process to include MCCAST 2.0, RMF, DFIA, and CNSSI 1253
- Experience creating/managing POAMs
- Experience with DISA STIGs
- Experience interpreting/implementing standards and policies in accordance with NIST 800-53/DoDI 8510.01
- Experience with vulnerability/risk analysis
Preferred Qualifications:
- Professional Certifications (Desired):
- ITILv4 Foundations
- ICS-VLP Certificate 210W-01 - 10
- RMF Training (USMC specific)
- CCENT or CCNA
- Sec+
- CISSP
- Microsoft Certifications
Pay and Benefits
At Goldbelt, we value and reward our team's dedication and hard work. We provide a competitive base salary commensurate with your qualifications and experience. As an employee, you'll enjoy a comprehensive benefits package, including medical, dental, and vision insurance, a 401(k) plan with company matching, tax-deferred savings options, supplementary benefits, paid time off, and professional development opportunities.
CYBER SECURITY ANALYST
Posted 3 days ago
Job Viewed
Job Description
DHT CYBERSECURITY
Full-Time / 8:00 AM - 5:00 PM
The Cyber Security Analyst primarily supports security, compliance and risk management initiatives and maintenance. This position participates in the planning and performs the implementing of security measures to protect endpoints, networks and data. The Cyber Security Analyst is expected to keep up-to-date on threat intelligence to anticipate security breaches and recognize attacks. The position is also tasked with preventing data loss and service interruptions by researching new technologies that will effectively protect network assets and data. Additionally, the Cyber Security Analyst is expected to recommend security enhancements and contribute to information security procedures.
Cyber Security Analyst
Posted 3 days ago
Job Viewed
Job Description
As a Cyber Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem-solving skills to execute security operations. Being on front lines of defense, the Cyber Security Analyst is adept at making good decisions under pressure and be able to quickly adapt to any security challenge. This individual also pays attention to detail and is disciplined in documenting process and procedures. The Cyber Security Analyst will also be second tier support for all requests coming into the department making sure departmental SLAs are met. The Cyber Security Analyst's motto is operational excellence, continual process improvement and customer service.
Additional Responsibilities:
- Perform log analysis and correlate disparate datasets to identify abnormal behavior.
- Respond to security events, driving issues to closure, and engaging all appropriate resources.
- Document Security process and procedures.
- Support service request in-take process and communicate back to requestors promptly
- Provide enforcement of security policies, standards and procedures.
- Staying current on security technologies, trends, standards and best practices.
- Continually update skills.
- Other duties and responsibilities as assigned.
- This position will sit in 24/7 Cyber Defense Center and will involve shift work including day, evening and weekend roles.
What We're Looking For:
- Bachelor's degree in computer science or related field, or equivalent work experience.
- Five years of information technology experience with two years in an information security-related role.
- Solid knowledge and understanding of information technology systems and process.
- A sound understanding of the OSI networking model.
- Working knowledge of IP networking protocols.
- Experience with Windows Server/Workstation and Mac OS is required.
- Proven analytical, problem solving and troubleshooting skills.
- Knowledge of information security principles and practice.
- Experience with antivirus, anti-malware and proxies solutions.
- Experience in security incident response.
- The ability to learn and apply new concepts quickly.
- Strong written and oral communication skills.
- Comfortable with interfacing with other internal or external organizations regarding security policy and standards violations, security controls failure and incident response situations.
- Ability to balance and prioritize work.
- Must be trustworthy in keeping sensitive data confidential.
Additional Skills and Qualifications Preferred:
- Experience using Splunk for log analysis.
- Experience with Unix, Linux.
- Computer programming and scripting languages (python, c++, perl, etc.).
- Experience analyzing firewall access control lists.
- One or more of the following professional certifications:
- Certified Information Security Professional (CISSP).
- Cisco Certified Network Associate (CCNA).
- Certified Information Security Auditor (CISA).
- Global Information Assurance Certification (GIAC).
Skill Set: Security, Network