10,374 Cybersecurity Experts jobs in the United States
Cyber Defense - Cybersecurity Engineer (REMOTE)
Posted 2 days ago
Job Viewed
Job Description
Cyber Defense - Cybersecurity Engineer (REMOTE)
Washington, DC, USA
Req #624
Wednesday, July 2, 2025
Koniag Data Solutions , a Koniag Government Services company, is seeking a Cyber Defense - Cybersecurity Engineer to support KDS and our government customer in Alexandria, VA. This is a Remote opportunity.
We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more.
Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions.
Essential Functions, Responsibilities & Duties may include but are not limited to:
The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include:
-
Design and implement security solutions and architectures
-
Configure and maintain security tools and technologies
-
Support incident response and security operations
-
Perform security monitoring and analysis
-
Implement security controls and countermeasures
-
Conduct vulnerability assessments and penetration testing
-
Deploy and maintain security information and event management (SIEM) systems
-
Develop and implement security automation solutions
-
Support threat hunting activities
-
Perform security tool integration and optimization
-
Document security procedures and configurations
-
Participate in incident response activities
-
Support continuous monitoring programs
-
Assist in security architecture reviews
-
Implement security hardening measures
Education and Experience:
Required:
-
Bachelor's degree in Cybersecurity, Computer Science, or related field
-
5+ years of experience in cybersecurity engineering
-
Current security certifications (Security+, CISSP, or equivalent)
-
Experience with security tools and technologies
-
Experience in government cybersecurity operations
Required Skills and Competencies:
-
Strong knowledge of security engineering principles
-
Experience with SIEM platforms and security tools (e.g., Splunk)
-
Proficiency in network security and protocols
-
Knowledge of system hardening techniques
-
Experience with security automation tools
-
Understanding of threat detection methodologies
-
Proficiency in scripting languages (Python, PowerShell)
-
Knowledge of cloud security technologies
-
Experience with vulnerability management tools
-
Understanding of incident response procedures
-
Knowledge of security frameworks and controls
-
Strong analytical and problem-solving skills
-
Excellent technical documentation abilities
-
Good communication skills
Desired Skills and Competencies:
-
Advanced security certifications (OSCP, GCIH)
-
Experience with classified systems
-
Knowledge of DevSecOps practices
-
Expertise in cloud security platforms
-
Experience with threat hunting tools
-
Knowledge of malware analysis
-
Familiarity with digital forensics
-
Experience with security orchestration
-
Knowledge of zero trust architectures
-
Experience with container security
-
Understanding of AI/ML in security
-
Knowledge of reverse engineering
-
Experience with red team tools
-
Familiarity with threat intelligence platforms
-
Knowledge of compliance frameworks
Our Equal Employment Opportunity Policy
The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment.
The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (email protected) or by calling to request accommodations.
Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit .
Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352
Other details
-
Job Family IT, Cyber Security, Network Systems
-
Job Function Cyber Security Architect/Engineer
-
Pay Type Salary
-
Washington, DC, USA
<
Cyber Defense - Cybersecurity Engineer (REMOTE)
Posted 4 days ago
Job Viewed
Job Description
We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more.
Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions.
Essential Functions, Responsibilities & Duties may include but are not limited to:
The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include:
- Design and implement security solutions and architectures
- Configure and maintain security tools and technologies
- Support incident response and security operations
- Perform security monitoring and analysis
- Implement security controls and countermeasures
- Conduct vulnerability assessments and penetration testing
- Deploy and maintain security information and event management (SIEM) systems
- Develop and implement security automation solutions
- Support threat hunting activities
- Perform security tool integration and optimization
- Document security procedures and configurations
- Participate in incident response activities
- Support continuous monitoring programs
- Assist in security architecture reviews
- Implement security hardening measures
Required:
- Bachelor's degree in Cybersecurity, Computer Science, or related field
- 5+ years of experience in cybersecurity engineering
- Current security certifications (Security+, CISSP, or equivalent)
- Experience with security tools and technologies
- Experience in government cybersecurity operations
- Strong knowledge of security engineering principles
- Experience with SIEM platforms and security tools (e.g., Splunk)
- Proficiency in network security and protocols
- Knowledge of system hardening techniques
- Experience with security automation tools
- Understanding of threat detection methodologies
- Proficiency in scripting languages (Python, PowerShell)
- Knowledge of cloud security technologies
- Experience with vulnerability management tools
- Understanding of incident response procedures
- Knowledge of security frameworks and controls
- Strong analytical and problem-solving skills
- Excellent technical documentation abilities
- Good communication skills
- Advanced security certifications (OSCP, GCIH)
- Experience with classified systems
- Knowledge of DevSecOps practices
- Expertise in cloud security platforms
- Experience with threat hunting tools
- Knowledge of malware analysis
- Familiarity with digital forensics
- Experience with security orchestration
- Knowledge of zero trust architectures
- Experience with container security
- Understanding of AI/ML in security
- Knowledge of reverse engineering
- Experience with red team tools
- Familiarity with threat intelligence platforms
- Knowledge of compliance frameworks
The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment.
The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (email protected) or by calling to request accommodations.
Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit
Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352
Other details
- Job Family IT, Cyber Security, Network Systems
- Job Function Cyber Security Architect/Engineer
- Pay Type Salary
Apply Now
Cyber Defense - Cybersecurity Engineer (REMOTE)
Posted 1 day ago
Job Viewed
Job Description
Cyber Defense – Cybersecurity Engineer (REMOTE) Washington, DC, USA Req #624 Wednesday, July 2, 2025 Koniag Data Solutions , a Koniag Government Services company, is seeking a Cyber Defense – Cybersecurity Engineer to support KDS and our government customer in Alexandria, VA. This is a Remote opportunity. We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more. Koniag Data Solutions (KDS), a Koniag Government Services company, is seeking a skilled Cybersecurity Engineer to support our cyber defense operations for federal government clients. The ideal candidate will bring strong technical expertise in security engineering and operations, with the ability to implement and maintain robust security solutions. Essential Functions, Responsibilities & Duties may include but are not limited to: The Cybersecurity Engineer will be responsible for implementing and maintaining security solutions within our cyber defense operations. Key responsibilities include: Design and implement security solutions and architectures Configure and maintain security tools and technologies Support incident response and security operations Perform security monitoring and analysis Implement security controls and countermeasures Conduct vulnerability assessments and penetration testing Deploy and maintain security information and event management (SIEM) systems Develop and implement security automation solutions Support threat hunting activities Perform security tool integration and optimization Document security procedures and configurations Participate in incident response activities Assist in security architecture reviews Implement security hardening measures Education and Experience: Required: Bachelor's degree in Cybersecurity, Computer Science, or related field 5+ years of experience in cybersecurity engineering Current security certifications (Security+, CISSP, or equivalent) Experience with security tools and technologies Experience in government cybersecurity operations Required Skills and Competencies: Strong knowledge of security engineering principles Experience with SIEM platforms and security tools (e.g., Splunk) Proficiency in network security and protocols Knowledge of system hardening techniques Experience with security automation tools Understanding of threat detection methodologies Proficiency in scripting languages (Python, PowerShell) Knowledge of cloud security technologies Experience with vulnerability management tools Understanding of incident response procedures Knowledge of security frameworks and controls Strong analytical and problem-solving skills Excellent technical documentation abilities Desired Skills and Competencies: Advanced security certifications (OSCP, GCIH) Experience with classified systems Knowledge of DevSecOps practices Expertise in cloud security platforms Experience with threat hunting tools Knowledge of malware analysis Familiarity with digital forensics Experience with security orchestration Knowledge of zero trust architectures Experience with container security Understanding of AI/ML in security Knowledge of reverse engineering Experience with red team tools Familiarity with threat intelligence platforms Knowledge of compliance frameworks Our Equal Employment Opportunity Policy The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or any other characteristic protected by applicable federal, state, or local law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits, and all other privileges, terms, and conditions of employment. The company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website, please get in touch with Heaven Wood via e-mail at (emailprotected) or by calling to request accommodations. Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit . Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352 Job Family IT, Cyber Security, Network Systems Job Function Cyber Security Architect/Engineer #J-18808-Ljbffr
Cyber Defense - Cybersecurity Engineer (REMOTE)

Posted 11 days ago
Job Viewed
Job Description
CI Cyber Threat Analysis
Posted 2 days ago
Job Viewed
Job Description
In a world of possibilities, pursue one with endless opportunities. Imagine Next!
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
Job Description:
Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team!
Overall Assignment Description: To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
Duties may include:
-
Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
-
Threat data collected and reported by NGA Cyber CI team and network security personnel.
-
Intelligence reported by the Intelligence Community.
-
Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
-
Imagery when available.
-
Information that can be used to inform cyber security decisions.
-
Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
-
Compilation of data collected and reported in weekly products.
-
Intelligence reported by the Intelligence Community.
-
Fused All Source threat analysis derived from multiple INT's.
-
Imagery when available.
-
Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
-
Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
-
Compilation of data collected and reported in weekly and monthly products.
-
Intelligence reported by the Intelligence Community.
-
Fused all source threat analysis derived from multiple INT's.
-
Include imagery when available.
-
Depiction of cyber threat (s) to NGA to inform cyber security decisions.
-
Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
-
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
-
Raw and finished Intelligence reported by the Intelligence Community.
-
Fused all source threat analysis derived from multiple INT's.
-
Include imagery when available.
-
Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
-
Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
-
Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
-
Cross referencing local information reporting with Intelligence Community reporting.
-
Clear and concise writing to briefly convey threat.
-
Responsiveness to Intelligence Community priority collections requirements.
-
Timeliness.
-
Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
-
Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
-
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
-
Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
-
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
-
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
-
Demonstrate current subject matter expertise on cyber issues, threats and trends.
-
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
-
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
-
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Skills and Experience:
Required:
-
Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
-
5+ years of related CI cyber analytic or CI cyber investigations experience.
-
Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
Desired:
- Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
Security Clearance Requirement:
An active Top Secret security clearance is required for this position?
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
CI Cyber Threat Analysis
Posted today
Job Viewed
Job Description
In a world of possibilities, pursue one with endless opportunities. Imagine Next! When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for. Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team! To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
Duties may include:
- Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
- Threat data collected and reported by NGA Cyber CI team and network security personnel.
- Intelligence reported by the Intelligence Community.
- Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
- Imagery when available.
- Information that can be used to inform cyber security decisions.
- Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
- Compilation of data collected and reported in weekly products.
- Intelligence reported by the Intelligence Community.
- Fused All Source threat analysis derived from multiple INT's.
- Imagery when available.
- Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
- Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
- Compilation of data collected and reported in weekly and monthly products.
- Intelligence reported by the Intelligence Community.
- Fused all source threat analysis derived from multiple INT's.
- Include imagery when available.
- Depiction of cyber threat (s) to NGA to inform cyber security decisions.
- Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
- Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
- Raw and finished Intelligence reported by the Intelligence Community.
- Fused all source threat analysis derived from multiple INT's.
- Include imagery when available.
- Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
- Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
- Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
- Cross referencing local information reporting with Intelligence Community reporting.
- Clear and concise writing to briefly convey threat.
- Responsiveness to Intelligence Community priority collections requirements.
- Timeliness.
- Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
- Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
- Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
- Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
- Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
- Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
- Demonstrate current subject matter expertise on cyber issues, threats and trends.
- Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
- Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
- Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Skills and Experience: Required:
- Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
- 5+ years of related CI cyber analytic or CI cyber investigations experience.
- Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
Desired:
- Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
Security Clearance Requirement: An active Top Secret security clearance is required for this position.
This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY! Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to
CI Cyber Threat Analysis
Posted today
Job Viewed
Job Description
Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team!
Overall Assignment Description: To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
Duties may include:
- Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
- Threat data collected and reported by NGA Cyber CI team and network security personnel.
- Intelligence reported by the Intelligence Community.
- Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
- Imagery when available.
- Information that can be used to inform cyber security decisions.
- Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
- Compilation of data collected and reported in weekly products.
- Intelligence reported by the Intelligence Community.
- Fused All Source threat analysis derived from multiple INT's.
- Imagery when available.
- Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
- Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
- Compilation of data collected and reported in weekly and monthly products.
- Intelligence reported by the Intelligence Community.
- Fused all source threat analysis derived from multiple INT's.
- Include imagery when available.
- Depiction of cyber threat (s) to NGA to inform cyber security decisions.
- Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
- Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
- Raw and finished Intelligence reported by the Intelligence Community.
- Fused all source threat analysis derived from multiple INT's.
- Include imagery when available.
- Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
- Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
- Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
- Cross referencing local information reporting with Intelligence Community reporting.
- Clear and concise writing to briefly convey threat.
- Responsiveness to Intelligence Community priority collections requirements.
- Timeliness.
- Perform inquiries of anomalous activity using cyber or related automated investigative tools.
- Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
- Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
- Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
- Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
- Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
- Demonstrate current subject matter expertise on cyber issues, threats and trends.
- Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
- Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
- Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Skills and Experience:
Required:
- Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
- 5+ years of related CI cyber analytic or CI cyber investigations experience.
- Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
Desired:
- Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
Security Clearance Requirement: An active Top Secret security clearance is required for this position.
This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons questAPPLY TODAY!
Be The First To Know
About the latest Cybersecurity experts Jobs in United States !
CI Cyber Threat Analysis

Posted 11 days ago
Job Viewed
Job Description
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
**Job Description:**
Parsons is looking for an amazingly talented **CI Cyber Threat Analysis** to join our team!
**Overall Assignment Description:** To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
**Duties may include:**
+ Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
+ Threat data collected and reported by NGA Cyber CI team and network security personnel.
+ Intelligence reported by the Intelligence Community.
+ Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
+ Imagery when available.
+ Information that can be used to inform cyber security decisions.
+ Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly products.
+ Intelligence reported by the Intelligence Community.
+ Fused All Source threat analysis derived from multiple INT's.
+ Imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
+ Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly and monthly products.
+ Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decisions.
+ Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
+ Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
+ Raw and finished Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
+ Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
+ Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
+ Cross referencing local information reporting with Intelligence Community reporting.
+ Clear and concise writing to briefly convey threat.
+ Responsiveness to Intelligence Community priority collections requirements.
+ Timeliness.
+ Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
+ Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
+ Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
+ Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
+ Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
+ Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
+ Demonstrate current subject matter expertise on cyber issues, threats and trends.
+ Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
+ Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
+ Display an ability to collaborate with internal NGA and external IC/Cyber community members.
**Skills and Experience:**
**Required:**
+ Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
+ 5+ years of related CI cyber analytic or CI cyber investigations experience.
+ Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
**Desired:**
+ Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
**Security Clearance Requirement:**
An active Top Secret security clearance is required for this position?
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
Principal Cybersecurity Engineer - Cyber Defense (US Federal)
Posted 4 days ago
Job Viewed
Job Description
At Workday, it all began with a conversation over breakfast. When our founders met at a sunny California diner, they came up with an idea to revolutionize the enterprise software market. And when we began to rise, one thing that really set us apart was our culture. A culture which was driven by our value of putting our people first. And ever since, the happiness, development, and contribution of every Workmate is central to who we are. Our Workmates believe a healthy employee-centric, collaborative culture is the essential mix of ingredients for success in business. That's why we look after our people, communities and the planet while still being profitable. Feel encouraged to shine, however that manifests: you don't need to hide who you are. You can feel the energy and the passion, it's what makes us unique. Inspired to make a brighter work day for all and transform with us to the next stage of our growth journey? Bring your brightest version of you and have a brighter work day here.
At Workday, we value our candidates' privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers.
Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not.
In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday.
About the Team
At Workday, we help the world's largest organizations adapt to what's next by bringing finance, HR, and planning into a single enterprise cloud. We work hard, and we're serious about what we do. But we like to have fun, too. We put people first, celebrate diversity, drive innovation, and do good in the communities where we live and work.
Workday's Cyber Defense team helps protect an ever-growing technology, global footprint. We are responsible for monitoring, detecting, and responding to threats to the company and keeping the trust of our customers. Functions like Security Response, Threat Intelligence, Detection Engineering, Secure Code Development and many others make up the fabric of who we are and what we do daily around the world. The National Security Group leads all cyber defense, personnel security, and security compliance functions for Defense and Intelligence Community Workday customer environments.
About the Role
This role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native).
Workday is expanding into the US Government air-gapped classified cloud environment. We are looking for a Principal Cybersecurity Engineer to help build out the team, technology, and processes to support cybersecurity in this new environment. You will be our Cyber Defense presence in the air-gapped network and will be part of a team responsible for all cybersecurity functions such as vulnerability management, incident response, threat hunting, and threat detection. You will work closely with the customers and with our Cyber Defense teams to ensure consistency across environments and develop best practices in this exciting environment.
About You
Basic Qualifications
- This position requires a TS/SCI with CI polygraph security clearance. Applicants must already possess a valid and active TS/SCI with CI polygraph security clearance.
- 10+ years of experience in Software Development or Devops within Cyber Security or Software Engineering or Public Cloud Platform Engineering.
- 2+ years of hands-on technical leadership experience.
- Experience deploying, monitoring, and managing systems in the AWS or Microsoft Top Secret clouds.
- BS or MS degree in Computer Science, Engineering, or equivalent job experience.
- Strong understanding of platform, application, and cloud security fundamentals.
- Familiarity with containerized applications and their security considerations
- Demonstrated knowledge of adversary TTPs (Tactics, Techniques and Procedures).
- Deep understanding of network and application security threats, attack techniques, and mitigation options.
- Experience managing vulnerability scans and effectively prioritizing actions for system owners.
- Experience building and maintaining investigation and/or response tools.
- Experience with SIEM and SOAR security technologies and solutions.
- Experience with hunting techniques.
- Able to work independently and coordinate activities across multiple teams.
- Ability to drive multiple projects and priorities while managing operational responsibilities.
- Excellent written and verbal communication skills, building positive relationships with partner organizations.
Workday Pay Transparency Statement
The annualized base salary ranges for the primary location and any additional locations are listed below. Workday pay ranges vary based on work location. As a part of the total compensation package, this role may be eligible for the Workday Bonus Plan or a role-specific commission/bonus, as well as annual refresh stock grants. Recruiters can share more detail during the hiring process. Each candidate's compensation offer will be based on multiple factors including, but not limited to, geography, experience, skills, job duties, and business need, among other things. For more information regarding Workday's comprehensive benefits, please click here.
Primary Location: USA.VA.McLean (Tyson's Corner)
Primary Location Base Pay Range: $182,300 USD - $73,400 USD
Additional US Location(s) Base Pay Range: 164,900 USD - 288,000 USD
Our Approach to Flexible Work
With Flex Work, we're combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter.
Pursuant to applicable Fair Chance law, Workday will consider for employment qualified applicants with arrest and conviction records.
Workday is an Equal Opportunity Employer including individuals with disabilities and protected veterans.
Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!
Principal Cybersecurity Engineer Cyber Defense (US Federal)
Posted today
Job Viewed
Job Description
At Workday, it all began with a conversation over breakfast. When our founders met at a sunny California diner, they came up with an idea to revolutionize the enterprise software market. And when we began to rise, one thing that really set us apart was our culture. A culture which was driven by our value of putting our people first. And ever since, the happiness, development, and contribution of every Workmate is central to who we are. Our Workmates believe a healthy employee-centric, collaborative culture is the essential mix of ingredients for success in business. That's why we look after our people, communities and the planet while still being profitable. Feel encouraged to shine, however that manifests: you don't need to hide who you are. You can feel the energy and the passion, it's what makes us unique. Inspired to make a brighter work day for all and transform with us to the next stage of our growth journey? Bring your brightest version of you and have a brighter work day here.
About The TeamAt Workday, we help the world's largest organizations adapt to what's next by bringing finance, HR, and planning into a single enterprise cloud. We work hard, and we're serious about what we do. But we like to have fun, too. We put people first, celebrate diversity, drive innovation, and do good in the communities where we live and work. Workday's Cyber Defense team helps protect an ever-growing technology, global footprint. We are responsible for monitoring, detecting, and responding to threats to the company and keeping the trust of our customers. Functions like Security Response, Threat Intelligence, Detection Engineering, Secure Code Development and many others make up the fabric of who we are and what we do daily around the world. The National Security Group leads all cyber defense, personnel security, and security compliance functions for Defense and Intelligence Community Workday customer environments.
About The RoleThis role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native). Workday is expanding into the US Government air-gapped classified cloud environment. We are looking for a Principal Cybersecurity Engineer to help build out the team, technology, and processes to support cybersecurity in this new environment. You will be our Cyber Defense presence in the air-gapped network and will be part of a team responsible for all cybersecurity functions such as vulnerability management, incident response, threat hunting, and threat detection. You will work closely with the customers and with our Cyber Defense teams to ensure consistency across environments and develop best practices in this exciting environment.
About You Basic Qualifications- This position requires a TS/SCI with CI polygraph security clearance. Applicants must already possess a valid and active TS/SCI with CI polygraph security clearance.
- 10+ years of experience in technical security consultancy, security operations, response, vulnerability management, threat detection, or threat hunting.
- 2+ years of hands-on technical leadership experience.
- Experience deploying, monitoring, and managing systems in the AWS or Microsoft Top Secret clouds.
- BS or MS degree in Computer Science, Engineering, or equivalent job experience.
- Strong understanding of platform, application, and cloud security fundamentals.
- Familiarity with containerized applications and their security considerations
- Demonstrated knowledge of adversary TTPs (Tactics, Techniques and Procedures).
- Deep understanding of network and application security threats, attack techniques, and mitigation options.
- Experience managing vulnerability scans and effectively prioritizing actions for system owners.
- Experience building and maintaining investigation and/or response tools.
- Experience with SIEM and SOAR security technologies and solutions.
- Experience with hunting techniques.
- Able to work independently and coordinate activities across multiple teams.
- Ability to drive multiple projects and priorities while managing operational responsibilities.
- Excellent written and verbal communication skills, building positive relationships with partner organizations.
Workday pay ranges vary based on work location. As a part of the total compensation package, this role may be eligible for the Workday Bonus Plan or a role-specific commission/bonus, as well as annual refresh stock grants. Recruiters can share more detail during the hiring process. Each candidate's compensation offer will be based on multiple factors including, but not limited to, geography, experience, skills, job duties, and business need, among other things. For more information regarding Workday's comprehensive benefits, please click here.
Primary Location: USA.VA.McLean (Tyson's Corner) Primary Location Base Pay Range: $180,600 USD - $71,000 USD Additional US Location(s) Base Pay Range: 163,400 USD - 282,000 USD
Our Approach to Flexible Work
With Flex Work, we're combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter.
Pursuant to applicable Fair Chance law, Workday will consider for employment qualified applicants with arrest and conviction records.
Workday is an Equal Opportunity Employer including individuals with disabilities and protected veterans.
Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!