6,950 Cybersecurity Analysts jobs in the United States

Senior Vulnerability Assessment Specialist

14211 Buffalo, New York M&T Bank

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

_This role offers a hybrid work schedule at our Buffalo, NY Tech Hub._
**Overview:**
Responsible for conducting detailed analysis of vulnerabilities and recommendations on remediation plans to ensure the integrity and resilience of organization's security and information systems. Serves as senior experienced vulnerability analyst by auditing analysis and reports, serving as an escalation point, and training newer/less-experienced analysts.
**Primary Responsibilities:**
+ Refine testing methodologies for vulnerability scanning to provide comprehensive risk-based view of potential vulnerabilities and may lead implementation of new methodologies within team.
+ Create configuration scanning plans that ensure compliance with internal policies and best practices; lead configuration scanning of most systems and networks and build remediation plan for identified vulnerabilities.
+ Organize monitoring techniques to monitor database activities and performance and manage responses to detected issues with cross-functional team.
+ Lead analysis of active and network vulnerability scans to identify potential exploits, misconfigurations, and attacks; partner with cross-functional team to execute remediation plans.
+ In partnership with technology and risk, develop vulnerability management policies and standards and educate technology teams on how integrate into to developing, deploying, and monitoring infrastructure.
+ Design infrastructure testing frameworks that ensure technology teams are developing and deploying infrastructure in alignment with policies and standards.
+ Formulate and recommend advanced best practices to technology teams on how to improve or implement new security practices, tools, and techniques based on industry standards and latest vulnerabilities to protect the bank from vulnerabilities.
+ Produce and interpret advanced reporting with recommendations for cybersecurity and technology leadership, including but not limited to audit reports identifying technical and procedural findings, common vulnerability score, and datasets for regulatory reporting.
+ Understand and adhere to the Company's risk and regulatory standards, policies, and controls in accordance with the Company's Risk Appetite. Design, implement, maintain, and enhance internal controls to mitigate risk on an ongoing basis. Identify risk-related issues needing escalation to management.
+ Promote an environment that supports belonging and reflects the M&T Bank brand.
+ Maintain M&T internal control standards, including timely implementation of internal and external audit points together with any issues raised by external regulators as applicable.
+ Complete other related duties as assigned.
**Scope of Responsibilities:**
+ Partners with peers, manager, cybersecurity organization, technology teams, people leaders, and line of business teams
+ Determines and develops approach to solutions. Work is accomplished with periodic check-ins for alignment and limited direction. Work is evaluated upon completion to ensure objectives have been met.
+ Advanced knowledge of all vulnerability scanning and assessment tools
+ Advanced understanding of multiple vulnerability scanning and assessment tools
+ Subject matter expert understanding of industry best practices related to vulnerability and patch management.
+ Trains analyst to advanced level knowledge of vulnerability scanning and assessment tools, and industry best practices.
+ Second highest individual contributor escalation point in team
**Manager Responsibilities:**
No supervisory responsibilities.
**Education and Experience Required:**
+ Bachelor's degree and a minimum of 3 years' relevant work experience, or in lieu of a degree, a combined minimum of 7 years' higher education and/or work experience
+ Excellent written and verbal communication skills
+ Strong ability to effectively communicate technical information to both non-technical and technical stakeholders, including up to senior leadership in Cybersecurity.
+ Experience effectively collaborating with leadership and with peers across the organization.
+ Prior experience with and demonstrable aptitude for quickly learning new technical skills.
**Education and Experience Preferred:**
+ Advanced certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), OffSec Certified Professional (OSCP), or Cybersecurity domain-related industry-recognized certification (DoD Level II)
+ Demonstrated experience working in a highly regulated industry (e.g., finance, healthcare, government)
+ Experience evaluating, analyzing, and synthesizing large quantities of data (which may be fragmented and contradictory) and accurately determining the potential range and scope of threats and contributing towards intelligence reporting.
+ Proficient level of thinking critically and solving problems
+ Intermediate understanding of advanced vulnerability concepts and practices, such as vulnerability management solutions, asset identification and management, and mitigation management
+ Experience training analysts to ensure they have intermediate knowledge of and how to use security monitoring systems.
#LI-JB3
M&T Bank is committed to fair, competitive, and market-informed pay for our employees. The pay range for this position is $93,581.10 - $155,968.51 Annual (USD). The successful candidate's particular combination of knowledge, skills, and experience will inform their specific compensation.
**Location**
Buffalo, New York, United States of America
M&T Bank Corporation is an Equal Opportunity/Affirmative Action Employer, including disabilities and veterans.
View Now

TS/SCI Vulnerability Assessment Analyst

22161 Springfield, Virginia Insight Global

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Insight Global is looking for a TS/SCI Vulnerability Assessment Analyst in the Springfield, VA area. They will be supporting a customers cyber security team doing both technical and non technical risk and vulnerability assessments across systems, networks, and applications. They will conduct and support penetration testing on enterprise network assets. They will also monitor and interpret threat environments to inform risk strategies.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy:

Skills and Requirements

TS/SCI

Bachelors Degree / or Prior Military experience

IAM or IAT ll certification

2 Penetration Testing Certifications

  • Experience in conducting vulnerability scans, penetration testing, and risk assessments.

  • Experience analyzing logs, mimic threat behaviors, and apply cybersecurity principles to organizational needs.

  • Experience identifying security issues and recommending cost-effective security controls. null

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to

View Now

TS/SCI Vulnerability Assessment Analyst

22151 Springfield, Virginia Insight Global

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description
Insight Global is looking for a TS/SCI Vulnerability Assessment Analyst in the Springfield, VA area. They will be supporting a customers cyber security team doing both technical and non technical risk and vulnerability assessments across systems, networks, and applications. They will conduct and support penetration testing on enterprise network assets. They will also monitor and interpret threat environments to inform risk strategies.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: and Requirements
TS/SCI
Bachelors Degree / or Prior Military experience
IAM or IAT ll certification
2 Penetration Testing Certifications
- Experience in conducting vulnerability scans, penetration testing, and risk assessments.
- Experience analyzing logs, mimic threat behaviors, and apply cybersecurity principles to organizational needs.
- Experience identifying security issues and recommending cost-effective security controls. null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to
View Now

Vulnerability Assessment (VA) Team Lead

20147 Ashburn, Virginia TekSynap

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

**Responsibilities & Qualifications**
**ACTIVITIES & RESPONSIBILITIES**
Assist the Government in managing Enterprise Information System Vulnerability Management (ISVM) compliance validation; briefing leadership on current and future vulnerabilities, security policies and industry standards; briefing leadership on most impactful vulnerabilities, configurations, and penetration testing efforts; creating and managing all scans in accordance with the scan standardization documentation; performing regularly scheduled (monthly and ad hoc) vulnerability assessments using a master schedule as directed; managing, customizing, and maintaining scan policies, zones, and repositories as they relate to the network; performing scan functions and review scan results to ensure accurate findings; and creating and customizing scan reports and data feeds to be imported / integrated into third party assessment tools. Assist the Government in employing ad hoc or emergency VA scanning to support targeted incident investigation, escalation, and emergency response to security events in accordance with documented procedures. Assist the Government in performing Penetration Testing Support.
**SKILLS**
+ Analyzing vulnerabilities and providing assessments and remediation instructions
+ Knowledgeable to maintain a repository of VA application issues and report application issues to Government VAT Team Lead and SSD Director in applying Information Systems Security principles and methods
+ Experience with Application Security implementation
+ Understanding of Firewall Management and Advanced Threat Protection
+ Familiarity with Access Control, Authorization, Intrusion Prevention and Intrusion Detection
+ Familiar with Protocol Analysis and requirements when handling sensitive and classified Information
+ Familiar with FISMA compliance and Risk Management Framework
+ Support Cyber Briefs for all vulnerability assessment team activities.
+ Assist the Government in providing Vulnerability Assessment, Compliance, and Reporting support to ISSO / ISSM interpreting scan results and recommend remediation plans.
+ Experience with cloud- based security technologies, architecture, and computing and searching, monitoring, and analyzing machine-generated big data is preferred.
**REQUIRED QUALIFICATIONS**
+ Clearance requirement: Secret
+ Experience: Minimum of 5 years' experience performing vulnerability assessments for an enterprise network
+ Education: Bachelor's of Science in computer engineering, computer science, IT or cyber security preferred (or 5 years of relevant work experience in lieu of a degree)
+ Certifications: one of the following certifications: Certified Information Security Manager (CISM) or Certified Information Systems Security Professional (CISSP)
**Overview**
We are seeking an experienced **Vulnerability Assessment (VA) Team Lead** in support of a government customer to join our team to provide Security Operations Support (SOC) Services to a government agency whose mission is to protect our Nation's borders from terrorist attacks, to provide law enforcement for over forty (40) Federal agencies, and to protect the revenue of the United States while facilitating trade. The SOC is a single point of management and reporting for information security incidents. The SOC exists to prevent, identify, contain, and eradicate cyber threats to networks through monitoring, intrusion detection, and protective security services to information systems, including local area networks / wide area networks (LAN / WAN), commercial Internet connection, public facing websites, wireless, mobile / cellular, cloud, security devices, servers, and workstations. The SOC is responsible for the overall security of Enterprise-wide information systems and collects, investigates, and reports any suspected and confirmed security violations.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any contractually mandated Federal COVID-19 requirements. More information can be foundhere ( .
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Ashburn Virginia
+ Remote or In-Person: 100% On site. Remote/Telework not available.
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Some travel may be required
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
Top Secret (SCI eligible)
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-VA-Ashburn_
**ID** _ _
**Category** _Technical Support/Help Desk_
**Type** _Regular Full-Time_
View Now

Cyber Threat Analysis Division Task Lead

22209 Arlington, Virginia General Dynamics Information Technology

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

**Req ID:** RQ
**Type of Requisition:** Regular
**Clearance Level Must Be Able to Obtain:** Interim Secret
**Public Trust/Other Required:** None
**Job Family:** Program Delivery and Execution
**Skills:**
Deadline Management,Delegate Management,Problem-Solving Strategies
**Experience:**
8 + years of related experience
**US Citizenship Required:**
Yes
**Job Description:**
Project/Task Manager
Seize your opportunity to make a personal impact as a Project/Task Manager supporting our program. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.
At GDIT, people are our differentiator. As a Project/Task Manager you will help ensure today is safe and tomorrow is smarter. Our work depends on Project/Task Manager joining our team to:
● Provide management and oversight for personnel and activities supporting the Cyber Threat Analysis Program for a major federal agency
● Interface and coordinate with Government leads with key focus on effective, efficient, and compliant contractor support
● Execute proper staffing, providing appropriate, qualified, and sufficient contractor resources to meet specified requirements
HOW A PROJECT/TASK MANAGER WILL MAKE AN IMPACT
● Manages and is responsible for the successful completion of all tasks in assigned project. Supervises at least 15 employees
● Primary contract POC for Division Chief
● Oversees section team leads and administrative staff
● Manages/monitors/measures project and contract deliverables
● Proactively identify, address, and communicate with customer on issues with timeliness and quality of deliverables
● Proactively identify, address, and communicate with customer on issues with contractor performance
● Provide expert guidance and resolution for complex problems affecting the program
● Coordinate contract staff in responding to cross-section tasks and RFIs
● Effectively relay customer guidance to contract staff and hold contract staff accountable for following guidance
● Conduct lessons learned meetings with government leadership, contractors, and stakeholders and incorporate responsive actions taken to ensure prior missteps are not repeated
● Liaise with other task managers across the program to ensure effective communication amongst divisions
● During directorate-wide projects/events, be able to assist with operations and logistics functions (e.g. coordinating appropriate staffing for teams from the division)
● Create, implement, and maintain professional development training plans for contractor staff to keep skills current with industry
● Create, implement, and maintain maturity models for each section, in line with government direction for program development
Qualifications/Expectations:
● Take initiative, and be proactive and confident in problem solving
● Strong knowledge of cyber threat intelligence and analysis
● Strong attention to detail and specific requirements
● _Expertly manage a high volume of different, complex tasks at the same time_
● Expert ability to delegate
● Identify, process, and effectively utilize existing resources
● Meet deadlines and clearly communicate when/why deadlines won't be met
● _Effectively communicate clearly and concisely with leadership, staff, and peers_
● Adapt based on constructive feedback and changing program needs
WHAT YOU'LL NEED TO SUCCEED:
● Education: Bachelor of Arts/Bachelor of Science with Cyber Experience
● Required Experience: 8-10+ years of related experience
● Required Technical Skills: 3-5 years of leadership experience across cross functional and highly technical teams; understanding of analytic tradecraft and the intelligence cycle; CISSP or equivalent preferred; and PMP preferred
● Security Clearance Level: Secret
● Location: On site five days weekly in Rosslyn, VA
●**US Citizenship Required
GDIT IS YOUR PLACE:
● 401K with company match
● Comprehensive health and wellness packages
● Internal mobility team dedicated to helping you own your career
● Professional growth opportunities including paid education and certifications
● Cutting-edge technology you can learn from
● Rest and recharge with paid vacation and holidays
The likely salary range for this position is $119,000 - $161,000. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at Opportunity Employer / Individuals with Disabilities / Protected Veterans
View Now

Software Engineer, Program Analysis, Mobile Threat Analysis Platform

30309 Midtown Atlanta, Georgia Google

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Minimum qualifications:**
+ Bachelor's degree or equivalent practical experience.
+ 2 years of experience with software development in C++ or Python.
+ Experience with program analysis.
**Preferred qualifications:**
+ Master's degree or PhD in Computer Science or a related technical field.
+ 2 years of experience with data structures or algorithms in either an academic or industry setting.
+ 2 years of experience with performance, large scale systems data analysis, visualization tools, or debugging.
+ Experience with static or dynamic analysis.
+ Experience with security or privacy.
Google's software engineers develop the next-generation technologies that change how billions of users connect, explore, and interact with information and one another. Our products need to handle information at massive scale, and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile; the list goes on and is growing every day. As a software engineer, you will work on a specific project critical to Google's needs with opportunities to switch teams and projects as you and our fast-paced business grow and evolve. We need our engineers to be versatile, display leadership qualities and be enthusiastic to take on new problems across the full-stack as we continue to push technology forward.
Our team builds security and privacy analysis infrastructure for Play and Android to detect malicious and abusive apps. Together with partner teams across Android, Ads, Chrome, Search and Cloud, we help Google protect more than 3 billion users with safe experiences on our app platform and ecosystem.
Android is Google's open-source mobile operating system powering more than 3 billion devices worldwide. Android is about bringing computing to everyone in the world. We believe computing is a super power for good, enabling access to information, economic opportunity, productivity, connectivity between friends and family and more. We think everyone in the world should have access to the best computing has to offer. We provide the platform for original equipment manufacturers (OEMs) and developers to build compelling computing devices (smartphones, tablets, TVs, wearables, etc) that run the best apps/services for everyone in the world.
The US base salary range for this full-time position is $141,000-$202,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google .
**Responsibilities:**
+ Write a product or system development code.
+ Build automated runtime analysis platform at Google scale using cloud virtualization infrastructure.
+ Build full-stack solutions including app instrumentation, networking, app crawling, anti-cloaking, leveraging artificial intelligence (AI) where applicable, to build exceptional dynamic analysis-based detection and reverse-engineering solutions.
+ Work broadly with security, privacy and abuse engineering and product teams to land impact protecting more than 3 billion Android and Play users against malware and all kinds of mobile threats.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

MANAGER, CYBER THREAT INTELLIGENCE ANALYSIS - REMOTE

22070 Herndon, Virginia COFENSE

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

REMOTE POSITION (U.S. ONLY)

Reporting to the Threat Intelligence Product Manager, the Manager of Intelligence Analysis is responsible for running the daily operations of the Cofense Intelligence analyst team. This person will set priorities and define metrics for success for the analyst team. Furthermore, the Intelligence Analysis Manager will ensure all reporting meets analysis tradecraft standards.

Essential Duties/Responsibilities

  • Lead a team of passionate threat intelligence analysts in daily analysis operations.
  • Ensure analyst work product produces the highest-quality cyber threat intelligence reporting for Cofense Intelligence customers, meeting tradecraft standards to ensure assessments are well-based and evidence is thoroughly outlined.
  • Provide advice and counsel for internal and external stakeholders regarding the phishing threat landscape based on operational findings.
  • Develop and maintain industry-leading processes and procedures to ensure continuous and sustainable intelligence reporting delivery.
  • Collaborate with product leadership, engineering, and marketing staff to maximize the value of Cofense Intelligence for its customers.
  • Provide mentorship and professional development opportunities for a growing team of intelligence professionals and malware analysts.
  • Represent Intelligence Team findings on customer briefings, webinars, and live presentations.
  • Represent Cofense Intelligence in relevant working groups.
  • Ability to assist with malware analysis preferred.
  • Perform final editorial and tradecraft review on every written report produced by the team, including blogs, assessments, Flash Alerts, and Quarterly Reports.
  • Other duties as assigned.

The above statements are neither intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be a listing of all of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job. This job description is not a contract of employment, either express or implied. Employment with Cofense will be voluntarily entered into and your employment is considered at will. Cofense reserves the right to alter the job description at any time without notice .

Knowledge, Skills and Abilities Required

  • Strong analytic skills with great attention to detail and accuracy in a fast-paced environment.
  • Strong writer and communicator, able to ensure our reports are well-written, clear, and analytically sound.
  • Ability to exercise independent judgement and creative problem-solving techniques.
  • Malware analysis, digital forensics, and incident response skills.
  • Strong knowledge of how phishing campaigns are created, used, and maximized for profit.
  • Strong understanding of intelligence life cycle,
  • Strong knowledge of Internet protocols including HTTP, HTTPS, SMTP, DNS.
  • Ability to work with little direct oversight.
  • Ability to articulate in at least six of the following concepts: analytic tradecraft standards, cyber kill chain, diamond model, advanced persistent threat, cybercrime, hacktivism, cyber fraud, malware and ransomware, social engineering, incident response, threat intelligence, and host and network-based security.
  • Strong leadership skills, able to lead a diverse group of analysts.
  • Knowledge of intersection of geopolitics and cyber threats.
  • Understanding of law enforcement and information security investigations preferred.

Education and/or Experience:

  • 5+ years of experience in information security or cyber threat intelligence.
  • 3+ years of experience in information security management.
  • Experience with intelligence tradecraft.
  • Degree in computer science or related discipline preferred.
  • Experience with intelligence reporting process including evidence gathering and presentation preferred.
  • Experience in computer forensics preferred.
  • Experience with malware sandbox technology preferred.
  • Experience working in traditional Intelligence Community environment preferred.
  • Previous training experience (i.e. Supervisor, trainer) preferred.

Cofense is committed to equal employment opportunity. We will not discriminate against employees or applicants for employment on any legally recognized basis (protected class) including, but not limited to: veteran status, uniform service member status, race, color, religion, sex (including pregnancy), gender identity, sexual orientation, national origin, age, physical or mental disability, marital status, genetic information or any other status or characteristic protected by applicable national, federal, state or local laws and ordinances. We adhere to these commitments in all aspects of employment, including recruitment, hiring, training, compensation, promotion, benefits, and discipline.

View Now
Be The First To Know

About the latest Cybersecurity analysts Jobs in United States !

MANAGER, CYBER THREAT INTELLIGENCE ANALYSIS - REMOTE

10261 New York, New York COFENSE

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

REMOTE POSITION (U.S. ONLY)

Reporting to the Threat Intelligence Product Manager, the Manager of Intelligence Analysis is responsible for running the daily operations of the Cofense Intelligence analyst team. This person will set priorities and define metrics for success for the analyst team. Furthermore, the Intelligence Analysis Manager will ensure all reporting meets analysis tradecraft standards.

Essential Duties/Responsibilities

  • Lead a team of passionate threat intelligence analysts in daily analysis operations.
  • Ensure analyst work product produces the highest-quality cyber threat intelligence reporting for Cofense Intelligence customers, meeting tradecraft standards to ensure assessments are well-based and evidence is thoroughly outlined.
  • Provide advice and counsel for internal and external stakeholders regarding the phishing threat landscape based on operational findings.
  • Develop and maintain industry-leading processes and procedures to ensure continuous and sustainable intelligence reporting delivery.
  • Collaborate with product leadership, engineering, and marketing staff to maximize the value of Cofense Intelligence for its customers.
  • Provide mentorship and professional development opportunities for a growing team of intelligence professionals and malware analysts.
  • Represent Intelligence Team findings on customer briefings, webinars, and live presentations.
  • Represent Cofense Intelligence in relevant working groups.
  • Ability to assist with malware analysis preferred.
  • Perform final editorial and tradecraft review on every written report produced by the team, including blogs, assessments, Flash Alerts, and Quarterly Reports.
  • Other duties as assigned.

The above statements are neither intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be a listing of all of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job. This job description is not a contract of employment, either express or implied. Employment with Cofense will be voluntarily entered into and your employment is considered at will. Cofense reserves the right to alter the job description at any time without notice .

Knowledge, Skills and Abilities Required

  • Strong analytic skills with great attention to detail and accuracy in a fast-paced environment.
  • Strong writer and communicator, able to ensure our reports are well-written, clear, and analytically sound.
  • Ability to exercise independent judgement and creative problem-solving techniques.
  • Malware analysis, digital forensics, and incident response skills.
  • Strong knowledge of how phishing campaigns are created, used, and maximized for profit.
  • Strong understanding of intelligence life cycle,
  • Strong knowledge of Internet protocols including HTTP, HTTPS, SMTP, DNS.
  • Ability to work with little direct oversight.
  • Ability to articulate in at least six of the following concepts: analytic tradecraft standards, cyber kill chain, diamond model, advanced persistent threat, cybercrime, hacktivism, cyber fraud, malware and ransomware, social engineering, incident response, threat intelligence, and host and network-based security.
  • Strong leadership skills, able to lead a diverse group of analysts.
  • Knowledge of intersection of geopolitics and cyber threats.
  • Understanding of law enforcement and information security investigations preferred.

Education and/or Experience:

  • 5+ years of experience in information security or cyber threat intelligence.
  • 3+ years of experience in information security management.
  • Experience with intelligence tradecraft.
  • Degree in computer science or related discipline preferred.
  • Experience with intelligence reporting process including evidence gathering and presentation preferred.
  • Experience in computer forensics preferred.
  • Experience with malware sandbox technology preferred.
  • Experience working in traditional Intelligence Community environment preferred.
  • Previous training experience (i.e. Supervisor, trainer) preferred.

Cofense is committed to equal employment opportunity. We will not discriminate against employees or applicants for employment on any legally recognized basis (protected class) including, but not limited to: veteran status, uniform service member status, race, color, religion, sex (including pregnancy), gender identity, sexual orientation, national origin, age, physical or mental disability, marital status, genetic information or any other status or characteristic protected by applicable national, federal, state or local laws and ordinances. We adhere to these commitments in all aspects of employment, including recruitment, hiring, training, compensation, promotion, benefits, and discipline.

View Now

MANAGER, CYBER THREAT INTELLIGENCE ANALYSIS - REMOTE

60290 Chicago, Illinois COFENSE

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

REMOTE POSITION (U.S. ONLY)

Reporting to the Threat Intelligence Product Manager, the Manager of Intelligence Analysis is responsible for running the daily operations of the Cofense Intelligence analyst team. This person will set priorities and define metrics for success for the analyst team. Furthermore, the Intelligence Analysis Manager will ensure all reporting meets analysis tradecraft standards.

Essential Duties/Responsibilities

  • Lead a team of passionate threat intelligence analysts in daily analysis operations.
  • Ensure analyst work product produces the highest-quality cyber threat intelligence reporting for Cofense Intelligence customers, meeting tradecraft standards to ensure assessments are well-based and evidence is thoroughly outlined.
  • Provide advice and counsel for internal and external stakeholders regarding the phishing threat landscape based on operational findings.
  • Develop and maintain industry-leading processes and procedures to ensure continuous and sustainable intelligence reporting delivery.
  • Collaborate with product leadership, engineering, and marketing staff to maximize the value of Cofense Intelligence for its customers.
  • Provide mentorship and professional development opportunities for a growing team of intelligence professionals and malware analysts.
  • Represent Intelligence Team findings on customer briefings, webinars, and live presentations.
  • Represent Cofense Intelligence in relevant working groups.
  • Ability to assist with malware analysis preferred.
  • Perform final editorial and tradecraft review on every written report produced by the team, including blogs, assessments, Flash Alerts, and Quarterly Reports.
  • Other duties as assigned.

The above statements are neither intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be a listing of all of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job. This job description is not a contract of employment, either express or implied. Employment with Cofense will be voluntarily entered into and your employment is considered at will. Cofense reserves the right to alter the job description at any time without notice .

Knowledge, Skills and Abilities Required

  • Strong analytic skills with great attention to detail and accuracy in a fast-paced environment.
  • Strong writer and communicator, able to ensure our reports are well-written, clear, and analytically sound.
  • Ability to exercise independent judgement and creative problem-solving techniques.
  • Malware analysis, digital forensics, and incident response skills.
  • Strong knowledge of how phishing campaigns are created, used, and maximized for profit.
  • Strong understanding of intelligence life cycle,
  • Strong knowledge of Internet protocols including HTTP, HTTPS, SMTP, DNS.
  • Ability to work with little direct oversight.
  • Ability to articulate in at least six of the following concepts: analytic tradecraft standards, cyber kill chain, diamond model, advanced persistent threat, cybercrime, hacktivism, cyber fraud, malware and ransomware, social engineering, incident response, threat intelligence, and host and network-based security.
  • Strong leadership skills, able to lead a diverse group of analysts.
  • Knowledge of intersection of geopolitics and cyber threats.
  • Understanding of law enforcement and information security investigations preferred.

Education and/or Experience:

  • 5+ years of experience in information security or cyber threat intelligence.
  • 3+ years of experience in information security management.
  • Experience with intelligence tradecraft.
  • Degree in computer science or related discipline preferred.
  • Experience with intelligence reporting process including evidence gathering and presentation preferred.
  • Experience in computer forensics preferred.
  • Experience with malware sandbox technology preferred.
  • Experience working in traditional Intelligence Community environment preferred.
  • Previous training experience (i.e. Supervisor, trainer) preferred.

Cofense is committed to equal employment opportunity. We will not discriminate against employees or applicants for employment on any legally recognized basis (protected class) including, but not limited to: veteran status, uniform service member status, race, color, religion, sex (including pregnancy), gender identity, sexual orientation, national origin, age, physical or mental disability, marital status, genetic information or any other status or characteristic protected by applicable national, federal, state or local laws and ordinances. We adhere to these commitments in all aspects of employment, including recruitment, hiring, training, compensation, promotion, benefits, and discipline.

View Now

Information Security Analyst

94087 Sunnyvale, California Fortinet

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Join Fortinet, a cybersecurity pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeguard people, devices, and data everywhere. We are currently seeking a dynamic SOC Analyst to contribute to the success of our rapidly growing business.

You would act as a SOC Analyst for global Security Operations Center (SOC) team at our Sunnyvale HQ office. This highly technical role requires continuous security event monitoring, threat identification, risk assessment, incident response, and collaboration with regional leaders to advance Fortinet's security posture and compliance. As part of a 24x7x365 "follow the sun" SOC model, this role involves working five days per week (40 hours), which may include weekend shifts as part of the standard workweek.

As an SOC Analyst, your responsibilities will include:

  • Actively monitor and analyze security events, alerts, and logs using SIEM, SOAR, EDR, DLP, Threat Intelligence and Cloud Security platforms.
  • Investigate incidents to mitigate risks. Define and refine SOC automation workflows, including playbooks, alerts, reports, and dashboards, to improve threat detection and incident response.
  • Analyze security logs to identify anomalies, policy violations, or potential attacks, and take appropriate action based on procedures.
  • Provide support and guidance to system administrators, developers, and end-users on security best practices and control implementation.
  • Contribute to the maintenance and enforcement of security policies, standards and procedures to ensure compliance.

We are looking for:

  • Experience : Minimum of 5 years of hands-on experience in Information Technology, cybersecurity, or working in a Security Operations Center (SOC) or Network Operations Center (NOC).
  • Technical Skills :
    • Solid understanding of the threat landscape, attacker tactics (e.g., phishing, malware, APTs, DoS attacks), and defensive strategies.
    • Proficiency in at least one scripting language (e.g., Python preferred).
    • Skilled in security technologies such as SIEM, SOAR, EDR, ID/IPS, access control, vulnerability management, cloud security, and External Attack Surface Management (EASM).
    • Experience with cloud security concepts, tools, and best practices across platforms like AWS, Azure, or GCP.

  • Soft Skills :
    • Exceptional written, verbal, and interpersonal communication skills, with strong attention to detail.
    • Proven ability to collaborate across teams and foster a customer-focused and security-aware culture.


Educational & Certification Requirements:

  • Education : Bachelor's degree in Computer Science, Information Security, or a related field.
  • Certifications : Preferred certifications: CISSP, CCSP, CISA, CISM, CRISC, CCNA, GIAC GCFE, GCFA, GCIH.

About Our Team:

Join our team, known for its collaborative ethos, working seamlessly with global customers, internal engineering teams and product development groups. Our team culture emphasizes continuous learning, innovation, and a strong commitment to customer satisfaction. We embrace Fortinet's core values of openness, teamwork and innovation, fostering an environment where team members support each other, share knowledge, and leverage AI to solve complex technical challenges. Our inclusive and dynamic team thrives on collaboration and is driven by the shared goal of maintaining Fortinet's high standards of excellence in cybersecurity solutions.

Why Join Us:

We encourage candidates from all backgrounds and identities to apply. We offer a supportive work environment and a competitive Total Rewards package to support you with your overall health and financial well-being.

Embark on a challenging, enjoyable, and rewarding career journey with Fortinet. Join us in bringing solutions that make a meaningful and lasting impact to our 660,000+ customers around the globe.

The US base salary range for this full-time position is $160,000-$180,000. Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program.

Wage ranges are based on various factors including the labor market, job type, and job level. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location.

All roles are eligible to participate in the Fortinet equity program, Bonus eligibility is reviewed at time of hire and annually at the Company's discretion.

#GD

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Analysts Jobs