15,151 Cybersecurity jobs in the United States

Cybersecurity Threat Intelligence Lead

77381 The Woodlands, Texas Woodforest National Bank

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Take the next step toward your new career today!
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank's reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.
This position will work 'in-office' during an initial training period. Once the training period is successfully completed, this position, at the manager's discretion, is eligible for hybrid work schedule.
Key Responsibilities:
· Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats.
· Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.
· Deploys and manages security solutions to assist with logging, alerting, and threat analysis.
· Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues.
· Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required:
· Demonstrated success in managing, analyzing, and solving complex network technical issues.
· Technical knowledge of security configurations, log analysis, intrusion detection and mitigation.
· Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics.
· Ability to work independently while supporting a team environment.
· Solid understanding of network security practices, systems, and standards.
· Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.
· Customer service orientation with proven process and project management skills.
· Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience:
· 5 years' network or systems administration experience required.
· 2 years' EDR management experience required.
· 1 years' SIEM management experience required.
· Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
· Financial services or banking industry experience preferred.
Formal Education & Certification:
· IT related degree preferred.
Work Status:
· Full-Time.
Supervisory Responsibility:
· None.
Travel:
· Less than 10% travel expected.
Working Conditions:
· Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer:
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management's right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
**Job:** **Technology Services*
**Organization:** **Texas - Houston*
**Title:** *Cybersecurity Threat Intelligence Lead*
**Location:** *Texas-The Woodlands*
**Requisition ID:** *068348*
View Now

Cybersecurity Threat Intelligence Analyst

64101 Kansas City, Missouri $105000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in information security solutions, is seeking a highly analytical and proactive Cybersecurity Threat Intelligence Analyst to join their expanding team. This is a fully remote position offering the opportunity to work with cutting-edge technologies and contribute to safeguarding vital digital assets against evolving cyber threats. If you have a passion for uncovering threats and a deep understanding of the cybersecurity landscape, we invite you to apply.

In this critical role, you will be responsible for collecting, analyzing, and disseminating threat intelligence to support the organization's defensive security operations. Your duties will include monitoring open-source intelligence (OSINT), dark web forums, and various threat feeds to identify emerging threats, adversary tactics, techniques, and procedures (TTPs). You will produce comprehensive threat intelligence reports, briefings, and alerts for security teams and stakeholders. This position requires you to develop and maintain intelligence gathering methodologies, conduct adversary tracking, and contribute to the development of threat hunting hypotheses. You will also collaborate with incident response teams to provide context and support during active security incidents.

We are looking for candidates with a Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience. A minimum of 4 years of experience in cybersecurity, with a specific focus on threat intelligence, security operations (SOC), or incident response, is required. Strong analytical skills, familiarity with threat intelligence platforms (TIPs), SIEM tools, and various cyber threat frameworks (e.g., MITRE ATT&CK) are essential. Experience with scripting languages (e.g., Python) for automation and data analysis is a significant advantage. Excellent written and verbal communication skills are necessary for reporting and presenting findings effectively. The ability to work independently, manage multiple priorities, and thrive in a fully remote, collaborative environment is crucial. Join our mission to protect and defend.

Location: Remote, formerly based in **Kansas City, Missouri, US**.
View Now

Cybersecurity Threat Intelligence Analyst

64106 Kansas City, Missouri $110000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a proactive and experienced Cybersecurity Threat Intelligence Analyst to join our Information Security team. This hybrid role based in Kansas City, Missouri, will be instrumental in identifying, analyzing, and mitigating cyber threats to our organization. You will be responsible for gathering, correlating, and analyzing threat data from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security tools. The core of your work will involve producing actionable intelligence reports and briefings for security operations, incident response, and executive leadership. Key responsibilities include monitoring the threat landscape for emerging attack vectors and TTPs (Tactics, Techniques, and Procedures); conducting deep-dive investigations into suspicious activities and indicators of compromise; developing and maintaining threat actor profiles; contributing to the improvement of security controls and detection mechanisms based on intelligence; and collaborating with internal teams to enhance our overall security posture. You will also have the opportunity to participate in red team exercises and adversary simulation activities. A minimum of 3 years of experience in cybersecurity, with a focus on threat intelligence, analysis, or incident response is required. Strong knowledge of malware analysis, network security, and common attack frameworks like MITRE ATT&CK is essential. Proficiency in scripting languages (e.g., Python) for automation is highly desirable. Relevant certifications such as GIAC Certified Incident Handler (GCIH) or Certified Threat Intelligence Analyst (CTIA) are a significant plus. This position requires strong analytical and communication skills, with the ability to clearly articulate complex technical information to both technical and non-technical audiences. Join a leading organization committed to safeguarding critical digital assets.
View Now

Cybersecurity Analyst (Threat Intelligence)

10001 New York, New York $120000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a global leader in financial technology, is seeking a highly skilled and proactive Cybersecurity Analyst specializing in Threat Intelligence to join their elite security operations center in New York City, New York, US . This vital role is responsible for identifying, analyzing, and responding to emerging cybersecurity threats that could impact the organization's digital assets and operations. The ideal candidate will possess a deep understanding of the threat landscape, including advanced persistent threats (APTs), malware, phishing tactics, and zero-day exploits.

Key responsibilities include monitoring threat intelligence feeds, analyzing threat actor TTPs (Tactics, Techniques, and Procedures), and developing actionable intelligence reports to inform defensive strategies. You will be instrumental in detecting and preventing cyberattacks, performing security investigations, and contributing to the continuous improvement of the cybersecurity posture. Experience with SIEM tools (e.g., Splunk, QRadar), endpoint detection and response (EDR) solutions, and threat intelligence platforms is essential. Our client values individuals with strong analytical skills, excellent communication abilities, and a passion for staying ahead of evolving cyber threats. The ability to work effectively in a fast-paced environment and collaborate with other security teams is crucial. This is an exceptional opportunity for a seasoned cybersecurity professional to make a significant impact on protecting a leading financial institution in New York City, New York, US . You will be at the forefront of defending against sophisticated cyber adversaries.

Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum 4-6 years of experience in cybersecurity, with a focus on threat intelligence or SOC analysis.
  • Proven experience in identifying, analyzing, and responding to cyber threats.
  • Knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
  • Proficiency with SIEM, IDS/IPS, and EDR tools.
  • Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
  • Strong analytical and problem-solving skills.
  • Excellent written and verbal communication skills.
  • Relevant certifications such as CISSP, GIAC, or similar are highly desirable.
View Now

Cybersecurity Threat Intelligence Analyst

85001 Whispering Pines, Arizona $105000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
A prominent financial institution is seeking an expert Cybersecurity Threat Intelligence Analyst to join its security operations center in Phoenix, Arizona, US . This position is crucial for proactively identifying, analyzing, and responding to cyber threats targeting our organization's digital assets. You will be responsible for collecting, processing, and analyzing threat data from various sources, including open-source intelligence (OSINT), security feeds, internal logs, and dark web monitoring. Developing actionable threat intelligence reports, identifying adversary tactics, techniques, and procedures (TTPs), and providing timely alerts to inform defensive strategies will be key responsibilities. You will collaborate closely with incident response teams, security engineers, and IT staff to provide context and guidance during security investigations and incidents. This role involves researching emerging threats, vulnerabilities, and attack vectors relevant to our industry and operational environment. Maintaining and optimizing threat intelligence platforms and tools will also be part of your duties. A Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field is required. A minimum of 5 years of experience in cybersecurity, with at least 3 years specifically focused on threat intelligence analysis, is essential. Proven experience with threat intelligence frameworks (e.g., MITRE ATT&CK), threat hunting, and security information and event management (SIEM) tools is mandatory. Proficiency in scripting languages (e.g., Python) for data analysis and automation is highly desirable. Strong analytical, research, and critical thinking skills, along with excellent written and verbal communication abilities, are necessary to effectively convey complex threat information to technical and non-technical audiences. Understanding of network security, malware analysis, and various cyber attack methodologies is critical. Join us in safeguarding our digital infrastructure in Phoenix, Arizona, US .
View Now

Cybersecurity Analyst, Threat Intelligence

10001 New York, New York $120000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is a global leader in cybersecurity solutions, seeking a highly analytical and proactive Cybersecurity Analyst specializing in Threat Intelligence to join our expanding team. This fully remote position offers the opportunity to work with cutting-edge technologies and contribute to protecting organizations from evolving cyber threats. As a Threat Intelligence Analyst, you will be responsible for collecting, analyzing, and disseminating information about current and emerging cyber threats, vulnerabilities, and attacker tactics, techniques, and procedures (TTPs). Your role will involve monitoring various threat sources, including dark web forums, security feeds, and open-source intelligence (OSINT), to identify and assess potential risks. You will develop detailed threat reports, provide actionable intelligence to security operations teams, and support incident response efforts. The ideal candidate will possess a deep understanding of cybersecurity principles, common attack vectors, and malware analysis. Proficiency in threat intelligence platforms, SIEM tools, and various security frameworks is essential. Experience with scripting languages (e.g., Python) for automating data collection and analysis is highly desirable. You will collaborate closely with other security professionals to develop defensive strategies and enhance our client's overall security posture. This role demands excellent research, analytical, and communication skills, with the ability to synthesize complex information into clear, concise, and actionable intelligence. If you are passionate about staying ahead of cyber adversaries and making a significant impact in a remote cybersecurity role, we encourage you to apply.

Responsibilities:
  • Monitor, analyze, and report on current and emerging cyber threats.
  • Collect and curate threat intelligence from various sources (OSINT, dark web, feeds).
  • Develop detailed threat profiles and actor TTPs.
  • Provide actionable intelligence to security operations and incident response teams.
  • Create threat landscape reports and vulnerability assessments.
  • Utilize threat intelligence platforms and security tools effectively.
  • Collaborate with internal teams to implement threat mitigation strategies.
  • Stay current with the latest cybersecurity trends and attack methods.
Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum of 4 years of experience in cybersecurity, with a focus on threat intelligence or analysis.
  • Strong understanding of cybersecurity principles, attack vectors, and threat actor methodologies.
  • Experience with threat intelligence platforms, SIEM tools, and OSINT techniques.
  • Proficiency in data analysis and reporting.
  • Excellent written and verbal communication skills.
  • Ability to work independently and manage multiple priorities in a remote environment.
View Now

Cybersecurity Threat Intelligence Analyst

85001 Whispering Pines, Arizona $110000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
A leading cybersecurity firm is looking for a dedicated Cybersecurity Threat Intelligence Analyst to join their elite team in Phoenix, Arizona, US . This challenging role involves monitoring, analyzing, and reporting on global cyber threats, identifying emerging trends, and developing proactive defense strategies. You will be responsible for collecting and analyzing data from various sources, including open-source intelligence, technical indicators, and proprietary tools, to assess threat actor capabilities and intentions. The ideal candidate possesses a deep understanding of cybersecurity frameworks, attack methodologies, and threat intelligence platforms. Responsibilities include producing timely and actionable intelligence reports, briefing stakeholders on potential risks, and contributing to the development of security incident response plans. You will also collaborate with security operations teams to enhance detection and prevention capabilities. Experience with threat hunting, malware analysis, and digital forensics is highly desirable. A Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent practical experience, along with 3-5 years of experience in threat intelligence or a closely related cybersecurity field, is required. Excellent analytical, research, and communication skills are essential. This is a fantastic opportunity for a driven individual to contribute to protecting critical digital assets and stay at the forefront of cybersecurity innovation.
View Now
Be The First To Know

About the latest Cybersecurity Jobs in United States !

Cybersecurity Threat Intelligence Analyst

77001 Houston, Texas $95000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is a prominent energy corporation seeking a skilled Cybersecurity Threat Intelligence Analyst to join their advanced security operations center in Houston, Texas, US . This role is critical in proactively identifying, analyzing, and mitigating cyber threats to protect our organization's critical infrastructure and sensitive data. You will be responsible for monitoring various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, and commercial feeds, to identify emerging threats, attack vectors, and adversary tactics, techniques, and procedures (TTPs). Key duties include performing in-depth analysis of malware, phishing campaigns, and advanced persistent threats (APTs), developing threat models, and creating actionable intelligence reports for security operations and incident response teams. The analyst will also contribute to the enhancement of security controls and defensive strategies based on threat intelligence findings. The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack methodologies. Experience with threat intelligence platforms, SIEM tools, and incident response frameworks is essential. Excellent analytical, research, and communication skills are required, with the ability to translate complex technical findings into clear, concise recommendations. Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), or Certified Information Systems Security Professional (CISSP) are highly desirable. We are looking for a proactive individual with a passion for cybersecurity and a keen eye for detail, capable of working effectively both independently and as part of a collaborative team. Join our elite cybersecurity team and play a vital role in safeguarding our digital assets.
View Now

Cybersecurity Threat Intelligence Analyst - Senior

20022 Washington, District Of Columbia ECS Limited

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

ECS is seeking a Sr. Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.

  • Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation.
  • Identify threat tactics, methodologies, gaps, and shortfalls.
  • Provide subject matter expertise to the development of cyber operations specific indicators.
  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Assist in the identification of intelligence collection shortfalls.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets
  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range: $107,000 - $120,100

General Description of Benefits
  • 7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.
  • Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.
  • Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria.
  • Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.
  • Strong written and verbal communication skills.
  • Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
  • Experience using multiple analytic tools, databases, and techniques (e.g., Analyst's Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
  • Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Bachelor's degree or equivalent work experience.
  • 7+ years' cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting.
  • Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management.
  • Active TS/SCI clearance.
View Now

Cybersecurity Analyst Cyber Threat Intelligence

35824 Huntsville, Alabama TekSynap

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities & Qualifications

TEAM SUMMARY

Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.

ACTIVITIES & RESPONSIBILITIES

  • Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.

  • Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.

  • Develop and maintain threat intelligence reports, dashboards, and threat models.

  • Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.

  • Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.

  • Participate in government-led cyber exercises or red/blue team simulations.

  • Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.

  • Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.

SKILLS

  • Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.

  • Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.

  • Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.

  • Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.

  • Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.

  • Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.

  • Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.

  • Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.

REQUIRED QUALIFICATIONS

  • Bachelor's degree, preferably in an IT-related field

  • 10+ years of experience in IT with a minimum of 4 years in Cybersecurity

  • Active TS Clearance

  • Experience with Splunk Enterprise Security

PREFERRED QUALIFICATIONS & COMPETENCIES

  • Experience with Microsoft Sentinel

  • Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)

Overview

We are seeking an experienced Cybersecurity Analyst / Cyber Threat Intelligence in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.

TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.

We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.

Visit us at .

Apply now to explore jobs with us!

By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".

"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".

Additional Job Information

WORK ENVIRONMENT AND PHYSICAL DEMANDS

The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.

  • Location: Huntsville Alabama

  • Remote or In-Person: On site

  • Type of environment: Office

  • Noise level: Medium

  • Work schedule: Schedule is day shift Monday - Friday.

  • Amount of Travel: Less than 10%

PHYSICAL DEMANDS

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

WORK AUTHORIZATION/SECURITY CLEARANCE

  • Active Top Secret Clearance Required

OTHER INFORMATION

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.

EQUAL EMPLOYMENT OPPORTUNITY

In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.

Job Locations US-AL-Huntsville

ID 2025-7902

Category Project/Program Management

Type Regular Full-Time

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs