What Jobs are available for Cybercrime in the United States?

Showing 4732 Cybercrime jobs in the United States

Manager, Trust Investigations - Cybercrime

94039 Mountainview, California LinkedIn

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. The work location of this role is hybrid, meaning it will be performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team.
This role can be hybrid in LinkedIn's Mountain View, CA or Washington DC office location.
This role will lead a high-impact investigations function in our Trust Investigations team focused on mitigating complex financially motivated abuse targeting LinkedIn and its members. This team has a unique remit applying analysis into technologies focused on abusing LinkedIn to the development of detections, mitigations and product interventions meant to address these emerging threats.
The role sits in a cybercrime pillar that is responsible for proactively anticipating, identifying, and disrupting abuse ecosystems -including but not limited to fake accounts (FAs), account rentals, account takeovers (ATOs), automation abuse and other forms of fraud. We work cross functionally with partners in Engineering, Data Science, Operations and policy applying investigation and intelligence outputs towards strategic product enhancements, and enforcement strategies to reduce member harm at scale.
If you have a strong background in leadership, threat intelligence, operational security, and off-platform investigations, this role provides an exciting opportunity to drive meaningful impact in member safety.
Key Responsibilities
+ Lead team responsible for investigations into complex cybercrime cases, including fraud, account takeovers, account rentals, and automation abuse.
+ Ensure accurate, efficient, and consistent delivery of investigative results and reports to partners and principals.
+ Develop processes to enable detection and analysis of new abuse tactics on and off the platform.
+ Scope and work with partners to ensure the delivery of adversary emulations to test defenses and improve mitigation strategies.
+ Establish strong relationships with internal and XFN peers in Trust Ops, Product, Engineering, Legal, and other teams ensure team outputs are meeting business needs.
+ Help guide strategy and Influence enhancements to products and enforcement measures based on investigations.
+ Build workflows, standard operating procedures (SOPs), and scalable frameworks to address key cybercrime risks.
+ Lead internal team efforts to introduce automation improvements to workflows, improve detection signals, and build dashboards for monitoring suspicious activities.
+ Present data-informed briefings to leadership and stakeholders on trends and threat actor behaviors.
+ Lead collection and summarization of team insights regarding evolving abuse tactics and share with Trust leadership to support informed decision-making.
+ Strengthen industry relationships via intelligence exchanges and knowledge sharing.
Basic Qualifications
+ Bachelor's degree in cybersecurity, intelligence, computer science, or a technical field or equivalent experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 5+ years of experience in threat intelligence or Trust & Safety investigations with a focus on off-platform abuse investigations.
+ Experience with OSINT techniques, digital evidence collection, and operational security.
+ Experience with surface and dark web targeting mechanisms and relevant monitoring tools.
Preferred Qualifications
+ Master's degree in a relevant field such as cybersecurity or advanced technical discipline expertise.
+ 2+ years of experience managing a trust investigations team
+ 7+ years of experience in areas such as off-platform intelligence operations, automation abuse investigations, or comprehensive abuse investigations.
+ Advanced proficiency in Python, SQL, and link analysis tools for threat detection.
+ Knowledge of threat actor communication behavior (e.g., technical jargon or slang) on external platforms.
+ Strong communication and project management skills, including experience collaborating across technical and non-technical teams.
+ Capability to create high-quality intelligence deliverables for executive-level stakeholders.
+ Experience performing technical investigations such as packet capture and analysis; debugging web applications and analyzing HTTP requests; and using Pandas and Jupyter for data analysis.
+ Experience responding to security incidents
Suggested Skills
+ Open-Source Intelligence (OSINT) and technical acumen.
+ Monitoring and analysis of complex threat trends.
+ Vendor collaboration and resource management.
+ Report writing and actionable intelligence delivery.
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $133,000 to 216,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants:
Is this job a match or a miss?
View Now

Manager, Trust Investigations - Cybercrime

20080 Washington, District Of Columbia LinkedIn

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. The work location of this role is hybrid, meaning it will be performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team.
This role can be hybrid in LinkedIn's Mountain View, CA or Washington DC office location.
This role will lead a high-impact investigations function in our Trust Investigations team focused on mitigating complex financially motivated abuse targeting LinkedIn and its members. This team has a unique remit applying analysis into technologies focused on abusing LinkedIn to the development of detections, mitigations and product interventions meant to address these emerging threats.
The role sits in a cybercrime pillar that is responsible for proactively anticipating, identifying, and disrupting abuse ecosystems -including but not limited to fake accounts (FAs), account rentals, account takeovers (ATOs), automation abuse and other forms of fraud. We work cross functionally with partners in Engineering, Data Science, Operations and policy applying investigation and intelligence outputs towards strategic product enhancements, and enforcement strategies to reduce member harm at scale.
If you have a strong background in leadership, threat intelligence, operational security, and off-platform investigations, this role provides an exciting opportunity to drive meaningful impact in member safety.
Key Responsibilities
+ Lead team responsible for investigations into complex cybercrime cases, including fraud, account takeovers, account rentals, and automation abuse.
+ Ensure accurate, efficient, and consistent delivery of investigative results and reports to partners and principals.
+ Develop processes to enable detection and analysis of new abuse tactics on and off the platform.
+ Scope and work with partners to ensure the delivery of adversary emulations to test defenses and improve mitigation strategies.
+ Establish strong relationships with internal and XFN peers in Trust Ops, Product, Engineering, Legal, and other teams ensure team outputs are meeting business needs.
+ Help guide strategy and Influence enhancements to products and enforcement measures based on investigations.
+ Build workflows, standard operating procedures (SOPs), and scalable frameworks to address key cybercrime risks.
+ Lead internal team efforts to introduce automation improvements to workflows, improve detection signals, and build dashboards for monitoring suspicious activities.
+ Present data-informed briefings to leadership and stakeholders on trends and threat actor behaviors.
+ Lead collection and summarization of team insights regarding evolving abuse tactics and share with Trust leadership to support informed decision-making.
+ Strengthen industry relationships via intelligence exchanges and knowledge sharing.
Basic Qualifications
+ Bachelor's degree in cybersecurity, intelligence, computer science, or a technical field or equivalent experience.
+ 1+ year(s) of management experience or 1+ year(s) of staff level engineering experience with management training.
+ 5+ years of experience in threat intelligence or Trust & Safety investigations with a focus on off-platform abuse investigations.
+ Experience with OSINT techniques, digital evidence collection, and operational security.
+ Experience with surface and dark web targeting mechanisms and relevant monitoring tools.
Preferred Qualifications
+ Master's degree in a relevant field such as cybersecurity or advanced technical discipline expertise.
+ 2+ years of experience managing a trust investigations team
+ 7+ years of experience in areas such as off-platform intelligence operations, automation abuse investigations, or comprehensive abuse investigations.
+ Advanced proficiency in Python, SQL, and link analysis tools for threat detection.
+ Knowledge of threat actor communication behavior (e.g., technical jargon or slang) on external platforms.
+ Strong communication and project management skills, including experience collaborating across technical and non-technical teams.
+ Capability to create high-quality intelligence deliverables for executive-level stakeholders.
+ Experience performing technical investigations such as packet capture and analysis; debugging web applications and analyzing HTTP requests; and using Pandas and Jupyter for data analysis.
+ Experience responding to security incidents
Suggested Skills
+ Open-Source Intelligence (OSINT) and technical acumen.
+ Monitoring and analysis of complex threat trends.
+ Vendor collaboration and resource management.
+ Report writing and actionable intelligence delivery.
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $133,000 to 216,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: Opportunity Statement**
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
+ Documents in alternate formats or read aloud to you
+ Having interviews in an accessible location
+ Being accompanied by a service dog
+ Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
**San Francisco Fair Chance Ordinance **
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
**Pay Transparency Policy Statement **
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: Data Privacy Notice for Job Candidates **
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants:
Is this job a match or a miss?
View Now

Information Security Analyst

21017 Belcamp, Maryland ManTech

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

MANTECH seeks a motivated, career and customer-oriented Information Security Analyst to join our team in Belcamp, MD . This is an onsite position.

The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.

Job responsibilities include but are not limited to:

  • Providing network environment and advanced level computing environment support.
  • Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured.
  • Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
  • Applying analytical skills to this data and all compliance with relevant non-technical  controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
  • Conduct vulnerability assessments, risk analysis, and incident responses.  
  • Actively monitoring network traffic for suspicious activity and potential security breaches.  
  • Identify weaknesses in systems and applications to proactively address security risks.  

Minimum Qualifications:

  • Bachelor’s degree in Science and 5+ years of relevant experience.
  • 3+ years in the Department of Defense performing information management related duties.  
  • Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement.
  • Possess an understanding of network protocols and security principles.
  • Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM).
  • Experience with vulnerability scanning and penetration testing.
  • Possess analytical and problem-solving skills to identify and address security threats.

Preferred Qualifications:   

  • Basic understanding of programming
  • Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.  
  • Experience updating and implementing complex security systems for an organization.  

Clearance Requirements:

  • Must be a US citizen and have a current/active Secret clearance.

Physical Requirements:  

  • Must be able to remain in a stationary position 50% of the time.  
  • Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
  • Frequently communicates with co-workers, management, and customers, which may involve delivering presentations.  Must be able to exchange accurate information in these situations.
Is this job a match or a miss?
View Now

Information Security Analyst

21017 Belcamp, Maryland ManTech

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

MANTECH seeks a motivated, career and customer-oriented Information Security Analyst to join our team in Belcamp, MD . This is an onsite position.

The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.

Job responsibilities include but are not limited to:

  • Providing network environment and advanced level computing environment support.
  • Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured.
  • Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
  • Applying analytical skills to this data and all compliance with relevant non-technical  controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
  • Conduct vulnerability assessments, risk analysis, and incident responses.  
  • Actively monitoring network traffic for suspicious activity and potential security breaches.  
  • Identify weaknesses in systems and applications to proactively address security risks.  

Minimum Qualifications:

  • Bachelor’s degree in Science and 5+ years of relevant experience.
  • 3+ years in the Department of Defense performing information management related duties.  
  • Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement.
  • Possess an understanding of network protocols and security principles.
  • Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM).
  • Experience with vulnerability scanning and penetration testing.
  • Possess analytical and problem-solving skills to identify and address security threats.

Preferred Qualifications:   

  • Basic understanding of programming
  • Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.  
  • Experience updating and implementing complex security systems for an organization.  

Clearance Requirements:

  • Must be a US citizen and have a current/active Secret clearance.

Physical Requirements:  

  • Must be able to remain in a stationary position 50% of the time.  
  • Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
  • Frequently communicates with co-workers, management, and customers, which may involve delivering presentations.  Must be able to exchange accurate information in these situations.
Is this job a match or a miss?
View Now

Information Security Analyst

20653 Lexington Park, Maryland Imagine One Technology & Management

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Imagine One Technology & Management is currently seeking an  **Information Security Analyst** "contingent" on award of the associated work to the Imagine One Team. This position supports the U.S. Navy in Lexington Park, Maryland.
The ** Information Security Analyst** will plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. They may ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. They may also respond to computer security breaches and viruses.
**Experience Requirements:**
+ Qualifying candidates must possess **ONE** of the following required qualifications:
+ Minimum of five (5) years of experience carrying out duties similar to the functions above
+ NAVEDTRA 43350 (Malware)
+ NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level III
+ NAVEDTRA 43301-5B LCS Total Shipboard Computing Environment (TSCE)
+ NAVEDTRA 43469 Watchstation 304 - Information Assurance Manager
+ JQR Incident Handling QC Analyst (306)
+ JQR Incident Handling Trends Analyst (305)
+ JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program)
+ Experience in the following areas:
+ Enterprise Mission Assurance Support Service (eMASS)
+ Vulnerability Remediation Asset Manager (VRAM)
+ Navy Risk Management Framework (RMF) SOPs
+ Microsoft Defender for Endpoint (MDE)
+ Continuous Monitoring and Risk Scoring (CMRS)
+ Experience with performing STIG implementation
+ Experience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool
+ Experience remediating vulnerability findings to include implementing vendor patches
+ Experience reviewing RMF documentation such as system categorization, Security Plan, Implementation Plan, Security Assessment Plan, System Level Continuous Monitoring (SLCM) Plan, System POA&M
**Educational Requirements:  **
+ Qualifying candidates must possess **ONE** of the following required educational qualifications:
+ Bachelor's degree
+ CNSSI 4012-Senior Systems Managers/4013-System Administrators/4014-Information Systems Security Officers (ISSO) /4015-Systems Certifiers/4016-Risk Analysts
+ NDU CIO certificate-Chief Information Officer (CIO)
+ Computer Hacking Forensic Investigator (CHFI)
+ GIAC Reverse Engineering Malware (GREM)
+ CISM
+ GIAC Certified Incident Handler (GCIH)
+ EC-Council Certified Incident Handler (ECIH)
+ GIAC Certified Forensics Analyst (GCFA)
+ CEH
+ CISSP
+ GSEC
+ Licensed Penetration Tester (LPT) *Retired
+ CASP+ GSLC
+ CSSLP
+ NEC 741A Information System Security Manager
+ NEC 742A Network Security Vulnerability Technician
+ NEC H10A Basic Cyber Analyst/Operator
+ NETW 4001 Security Plus
+ SSC 6209-Network Operations and Technology
+ Hunt Methodologies Course (HMC)
+ Intermediate Cyber Core (ICC)
+ CYBR2100 Certified Ethical Hacker
+ CYBR2150
+ CYBR3420 Intermediate Cyber Core
**Security Requirements:**
+ **Candidates must have U.S. Citizenship**
+ **Candidates must have an ACTIVE DoD Secret Clearance (or higher)**
**Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group medical, vision, and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing master's degree); employee training, development, and education programs; profit sharing; advancement opportunities; and much more!**
**_ISO 9001:2015, ISO 2000-1:2018, ISO 27001:2013_**
**_CMMI Development and Services - Maturity Level 3_**
**_An Employee-Owned Business_**
**_EEO/Veterans/Disabled_**
_*Imagine One "Contingent" offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance)._
Is this job a match or a miss?
View Now

Information Security Analyst

21017 Belcamp, Maryland ManTech

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**MANTECH** seeks a motivated, career and customer-oriented **Information Security Analyst** to join our team in **Belcamp, MD** . This is an onsite position.
The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.
**Job responsibilities include but are not limited to:**
+ Providing network environment and advanced level computing environment support.
+ Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured.
+ Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
+ Applying analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
+ Conduct vulnerability assessments, risk analysis, and incident responses.
+ Actively monitoring network traffic for suspicious activity and potential security breaches.
+ Identify weaknesses in systems and applications to proactively address security risks.
**Minimum Qualifications:**
+ Bachelor's degree in Science and 5+ years of relevant experience.
+ 3+ years in the Department of Defense performing information management related duties.
+ Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement.
+ Possess an understanding of network protocols and security principles.
+ Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM).
+ Experience with vulnerability scanning and penetration testing.
+ Possess analytical and problem-solving skills to identify and address security threats.
**Preferred** **Qualifications:**
+ Basic understanding of programming
+ Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.
+ Experience updating and implementing complex security systems for an organization.
**Clearance Requirements:**
+ Must be a US citizen and have a current/active Secret clearance.
**Physical Requirements:**
+ Must be able to remain in a stationary position 50% of the time.
+ Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
+ Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at and provide your name and contact information.
Is this job a match or a miss?
View Now

Information Security Analyst

94039 Mountainview, California Teledyne

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Be visionary**
Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research.
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
**Job Description**
An ISSO is an individual responsible for ensuring the appropriate operational security posture is maintained for a system. The ISSO will be assigned by the ISSM and appointed in writing. The ISSO must be a U.S. citizen and employed by the cleared contractor or its subcontractor. The ISSO assists the ISSM in meeting their duties and responsibilities.
Responsibilities of the ISSO include, but are not limited to:
+ Ensuring systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security plan.
+ Verifying the implementation of delegated aspects of the system security program.
+ Ensuring all proper account management documentation is completed prior to adding and deleting system accounts.
+ Verifying all system security documentation is current and accessible to properly authorized individuals.
+ Conducting periodic assessments of authorized systems and providing the ISSM with corrective actions for all identified findings and vulnerabilities.
+ Ensuring audit records are collected and analyzed in accordance with the security plan.
+ Reporting all security-related incidents to the ISSM.
+ Monitoring system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
+ Formally notifying the ISSM of any changes to a system that could affect authorization.
+ Serving as a member of the Configuration Control Board (CCB), if designated by the ISSM.
+ Possessing sufficient experience and technical competence commensurate with the complexity of the systems.
+ Completing the required training identified in the ISSM Required Training Table in the DAAPM.
+ Ensuring user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures.
+ Executing the continuous monitoring strategy.
Additional ISSO Tasks
+ On the job training specific to Teledyne RF & Microwave, Mountain View
+ Train employee's internal security policy and procedure, as needed.
+ Classified GSA container check, daily.
+ Classified IS station event log audit and backup, weekly.
+ Virus definition updates - download files, burn DVD, monthly.
+ Virus definition updates - all classified computers, monthly.
+ General user account administration.
+ Spill containment and redeployment.
+ Hard drive backup, imaging.
+ General computer hardware support.
Education
Bachelor's degree related to Information Systems or have a certification in Security +.
Requirements
Must be a U.S. citizen in order to obtain Security Clearance or have an active Security Clearance.
**Salary Range:**
$61,600.00-$82,100.000
**Pay Transparency**
The anticipated salary range listed for this role is only an estimate. Actual compensation for successful candidates is carefully determined based on several factors including, but not limited to, location, education/training, work experience, key skills, and type of position.
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws.
You may not realize it, but Teledyne enables many of the products and services you use every day **.**
Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
Is this job a match or a miss?
View Now
Be The First To Know

About the latest Cybercrime Jobs in United States !

Information Security Analyst

95054 Santa Clara, California Intel

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Job Details:**
**Job Description:**
Intel's Government Information Technology and Security organization enables Intel to win United States Government business by providing secure products, solutions, and services that meet U.S. regulatory requirements. The GITS team is part of Intel's Information Security organization and supports the unique IT information Security and Compliance requirements for Intel Federal LLC, a subsidiary of Intel that delivers products and/or services to the US Government (USG). As part of the GITS team, you will help us grow our secure solution suite to meet U.S. Government requirements for data safeguarding.
The Government IT and Security organization is seeking an Information Security Analyst to support Intel's United States Government contracts. This role is responsible for ensuring IT systems are securely deployed, properly managed, and operated in full compliance with established policies and standards.
**Responsibilities include but are not limited to:**
+ Participate in security reviews, inspections, and process improvement initiatives.
+ Install and harden IT systems in accordance with security and compliance standards.
+ Remediate vulnerabilities identified in scans within required timelines.
+ Monitor, configure, and maintain deployed IT systems to ensure optimal performance and security.
+ Apply knowledge of NIST 800-53, STIGs, and the RMF process to support secure operations, on both Windows and Linux workstations, including the ability to apply baseline configurations, assess control effectiveness, and validate compliance through tools such as STIG Viewer, SCAP scans, and manual inspection.
+ Develop and maintain documentation, including SOPs, process guides, and IT policies.
+ Support continuous monitoring activities to maintain systemAuthorization to Operate.
+ Perform preventive maintenance, including patching and system updates.
+ Collaborate with Information Security teams to assess, analyze, and respond to security findings.
+ Perform general system administration duties at sites, including user account management, system configuration, software installation, routine maintenance, and basic network support.
**Qualifications:**
The Minimum qualifications are required to be considered for this position. Minimum qualifications listed below would be obtained through a combination of industry relevant job experience, internship experience and / or schoolwork/classes/research. The preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates.
This position is not eligible for Intel immigration sponsorship.
**Minimum Qualifications**
+ US Citizenship required.
+ Ability to obtain a US Government TS/SCI Security Clearance with Polygraph.
+ Bachelor's degree and a minimum of 3+ years of relevant experience in the Government Information Technology (IT) and Information Security Industry, -or- a High School Diploma with at least 5+ years of relevant experience in the Government Information Technology (IT) and Information Security Industry.
+ **3+ years of experience in the following:**
+ System Administrator role.
+ Windows Operating Systems (i.e. Windows 11, Windows Server 2016, 2019, 2022, etc.) -or- with Linux/UNIX Server and Desktop Operating Systems (i.e. RH 8.x, etc.).
+ Life cycle management of Operating Systems and configuration management, in accordance with customer requirements.
+ Hardening systems, configuring and managing logging capabilities and performing vulnerability remediation.
+ Applying and maintaining information security controls.
**Preferred Qualifications**
+ Active US Government Security Clearance with a minimal of a Secret level.
+ Bachelor's degree.
+ Experience implementing and verifying NIST 800-53 security controls on Windows and Linux workstations, utilizing tools such as STIG Viewer, SCAP scanners, and manual validation techniques to ensure compliance.
+ Experience with NIST 800-53, NIST 800-137, and the Risk Management Framework (RMF)DoD -M IAT Level II or III certification (i.e. Security+, CASP, CISSP), within 6 months of starting the position.
+ Security certifications i.e. (Security+, CASP, CISSP) and an OS specific certification.
+ Experience with RMF as it relates to Systems Administration.
+ Experience using industry-standard security tools for audit reduction, vulnerability management, and malware detection, including: ACAS, Tenable Nessus, Splunk, SCAP Compliance Checker, STIG Viewer, EPO, and Trellix.
+ Experience with cloud security principles and experience working with cloud service providers (e.g., AWS, Azure) in environments requiring compliance with federal or DoD security standards.
**Job Type:**
Experienced Hire
**Shift:**
Shift 1 (United States of America)
**Primary Location:**
US, California, Santa Clara
**Additional Locations:**
**Business group:**
As members of the Finance team, employees act as full partners in making and supporting business decisions that are aimed at maximizing shareholder value. Intel Finance has a strong focus on facilitating change and improvement both within finance and in the operations supported.
**Posting Statement:**
All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.
**Position of Trust**
N/A
**Benefits:**
We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here:
Salary Range for jobs which could be performed in the US:
$89, ,830.00 USD
The range displayed on this job posting reflects the minimum and maximum target compensation for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific compensation range for your preferred location during the hiring process.
**Work Model for this Role**
This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.
Is this job a match or a miss?
View Now

Information Security Analyst

Massachusetts, Massachusetts UNITY Systems

Posted today

Job Viewed

Tap Again To Close

Job Description

Project Duration: 18-24 Months

Engagement Length: Through June 30, 2026 (with renewal possible)

Hours Per Week: 37.5

Work Schedule: Hybrid role requiring at least 4 days on-site per month (two assigned by management and two chosen by the employee), with ability to report on short notice if needed.

Information Security Analyst – ERP Implementation

Seeking an Information Security Analyst to support a large-scale ERP modernization program. This role focuses on defining, implementing, and managing user access, data security, and compliance controls for a multi-agency SaaS financial solution.

Responsibilities:

  • Define and enforce end-user roles, access controls, and provisioning processes.
  • Implement security policies and technical controls aligned with enterprise standards.
  • Support risk assessments, audits, and compliance documentation.
  • Monitor reports and logs for potential security incidents.
  • Collaborate with vendors and stakeholders to ensure secure system configuration and operations.
  • Research new threats and recommend corrective actions.

Qualifications:

  • Bachelor's degree in Computer Science, Information Systems, or related field (or equivalent experience).
  • Experience supporting security operations for enterprise or SaaS systems.
  • Knowledge of IAM, RBAC, Cloud Security, Data Security, and Encryption.
  • Familiarity with frameworks such as NIST, ISO 27001, or ITIL.
  • Strong analytical and communication skills.

Preferred:

  • Experience with Microsoft and Snowflake security tools.
  • Exposure to ERP or financial system security.
  • Background in audit, compliance, or governance.

Job Type: Contract

Pay: $ $80.00 per hour

Expected hours: No more than 37.5 per week

Application Question(s):

  • This position is W2 only. Are you able to work directly on our W2 (no C2C or third-party arrangements)?
  • Do you require visa sponsorship (e.g., H-1B, CPT, OPT, etc.) now or in the future? (We cannot accept sponsored candidates.)
  • Are you currently located in New England (MA, NH, ME, RI, CT, or VT) or able to relocate before starting?

Experience:

  • Information security: 5 years (Required)
  • Identity & access management: 3 years (Required)
  • NIST standards: 2 years (Required)

Ability to Commute:

  • Boston, MA (Required)

Work Location: In person

Is this job a match or a miss?
View Now

Information Security Analyst

21201 Baltimore, Maryland $85000 Annually WhatJobs Direct

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in cybersecurity services in Baltimore, Maryland, US , is seeking a skilled and vigilant Information Security Analyst to bolster their security operations. This role is integral to protecting sensitive data, identifying vulnerabilities, and responding to cyber threats. The ideal candidate possesses a strong understanding of security principles, hands-on experience with security tools, and a proactive mindset towards threat detection and mitigation.

Responsibilities:
  • Monitor security alerts and events from various security tools (SIEM, IDS/IPS, endpoint protection) to detect and respond to potential threats.
  • Conduct vulnerability assessments and penetration testing to identify security weaknesses.
  • Analyze security incidents, perform root cause analysis, and develop remediation strategies.
  • Develop and implement security policies, procedures, and best practices.
  • Configure and manage security technologies, including firewalls, VPNs, and access control systems.
  • Conduct security awareness training for employees.
  • Stay up-to-date with the latest cybersecurity threats, trends, and technologies.
  • Collaborate with IT teams to ensure security is integrated into all system lifecycles.
  • Participate in incident response planning and execution.
  • Generate regular security reports for management, highlighting risks and mitigation efforts.
Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Minimum of 3 years of experience in information security analysis or a similar role.
  • Hands-on experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, and endpoint security solutions.
  • Knowledge of network security principles, cryptography, and common attack vectors.
  • Familiarity with security frameworks (e.g., NIST, ISO 27001).
  • Strong analytical and problem-solving skills.
  • Excellent written and verbal communication skills.
  • Relevant security certifications such as CompTIA Security+, CISSP, or CEH are highly desirable.
  • Ability to work effectively both independently and as part of a team.
  • Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
This hybrid role offers a dynamic work environment and the opportunity to make a significant impact on protecting critical digital assets. Our client provides a competitive compensation package and a commitment to professional development.
Is this job a match or a miss?
Apply Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybercrime Jobs