9,133 Cyber Security jobs in the United States

Cyber Security, Cyber Security - MSS - Network Security

80285 Denver, Colorado Diverse Lynx

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Role : Cyber Security, Cyber Security - Client - Network Security

Location: Denver, CO / Saltlake City, UT (Day 1 Onsite)

Duration: Contract C2C

Job Description

  • Deep understanding of Access Management - Authentication & Single Sign-On, authentication protocols like OAuth2.0, OpenID Connect and SAML2.0
  • Experience with development of Transmit Security Journeys, WebSDK & scripting (AuthScript
  • Hands on experience in implementation of user authentication and authorization using Transmit Security
  • Hands on with development and deployment of custom developed applications using Java/J2EE technologies
  • Hand on with development of REST API using Java Spring Framework
  • Full understanding of HTTP Request/Response tracing, Session Handling
  • Good understanding of Secure HTTP communication - client to server and server to server secure communication• Good understanding of Java Spring Boot application development, deployment
  • Good understanding of NoSQL databases like MongoDB, Casandra, etc
  • Good understanding of DevOps tools like Git, Eclipse/IntelliJ, Jenkins, Docker, Puppet, Kubernetes, Ansible, etc.Non-Technical
  • Scheduling & Planning - should be able to plan and execute the deliverables as per the proposed design.
  • Communication - Ability to communicate Up, Down, and Across All Levels of the Organization and Technical Backgrounds
  • Detail Oriented - Good Understanding of IAM concepts
  • Analytical, Self-motivated - Critical thinker who can analyze issues and is able to troubleshoot, along with the developers, to find root cause of the problem
  • Interpersonal skills and Professional demeanor - Respond to customer inquiries in a timely manner, guiding and advising customers on security best practices in a friendly customer facing manner


Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.
View Now

Cyber Security Analyst

22448 Dahlgren, Virginia ManTech

Posted today

Job Viewed

Tap Again To Close

Job Description

MANTECH seeks a motivated and detail-oriented Cyber Security Analyst to join our team in Dahlgren. VA This position is o nsite.
 

Responsibilities include but are not limited to:

  • Work as an early-career computer scientist with emphasis on Linux, Python, Bash, and containerization for use in DoD applications

  • Develop, maintain, and enhance software systems, focusing on Linux systems administration, automation, and scripting, particularly in Python

  • Work with container environments, including Docker, Kubernetes, and Podman, to support software development and deployment

  • Collaborate with teams to ensure system-level requirements are met, including writing test cases, scenarios, and procedures

  • Execute test procedures, analyze results, and produce detailed trouble reports to support system developers and subject matter experts

  • Participate in Test and Evaluation (T&E) of cybersecurity systems, with a focus on software certification

  • The ability to travel to locations within the United States including Newport, RI, Washington DC, Philadelphia, PA to support test events and meetings (up to 20%)

Minimum Qualifications:

  • Associate’s Degree in Computer Science, Information Technology, or a related discipline

  • Foundational understanding of computer networking

  • 2+ years of professional experience in software engineering

  • Experience with Linux systems administration, scripting/automation, and Python programming

  • Experience with container environments (Docker, Kubernetes, and Podman)

Preferred Qualifications:

  • Bachelor’s degree in Computer Science, Information Technology, or a related discipline

  • Experience in operations and build toolchains, including GCC

  • Preferred familiarity of Operational Technology, like ICS and SCADA systems

  • Possession of an active IAT II Certification

Clearance Requirements:

  • Ability to obtain a Secret clearance after starting on program.

Physical Requirements:

  • Ability to work effectively in a remote working environment.

  • A dedicated, quiet, and ergonomically appropriate workspace conducive to productivity.

  • Ability to sit at a desk or workstation for extended periods while working on a computer.

  • Occasional movement within the office for communication and accessing resources.

View Now

Cyber Security Analyst

22448 Dahlgren, Virginia ManTech

Posted today

Job Viewed

Tap Again To Close

Job Description

MANTECH seeks a motivated and detail-oriented Cyber Security Analyst to join our team in Dahlgren. VA This position is o nsite.
 

Responsibilities include but are not limited to:

  • Work as an early-career computer scientist with emphasis on Linux, Python, Bash, and containerization for use in DoD applications

  • Develop, maintain, and enhance software systems, focusing on Linux systems administration, automation, and scripting, particularly in Python

  • Work with container environments, including Docker, Kubernetes, and Podman, to support software development and deployment

  • Collaborate with teams to ensure system-level requirements are met, including writing test cases, scenarios, and procedures

  • Execute test procedures, analyze results, and produce detailed trouble reports to support system developers and subject matter experts

  • Participate in Test and Evaluation (T&E) of cybersecurity systems, with a focus on software certification

  • The ability to travel to locations within the United States including Newport, RI, Washington DC, Philadelphia, PA to support test events and meetings (up to 20%)

Minimum Qualifications:

  • Associate’s Degree in Computer Science, Information Technology, or a related discipline

  • Foundational understanding of computer networking

  • 2+ years of professional experience in software engineering

  • Experience with Linux systems administration, scripting/automation, and Python programming

  • Experience with container environments (Docker, Kubernetes, and Podman)

Preferred Qualifications:

  • Bachelor’s degree in Computer Science, Information Technology, or a related discipline

  • Experience in operations and build toolchains, including GCC

  • Preferred familiarity of Operational Technology, like ICS and SCADA systems

  • Possession of an active IAT II Certification

Clearance Requirements:

  • Ability to obtain a Secret clearance after starting on program.

Physical Requirements:

  • Ability to work effectively in a remote working environment.

  • A dedicated, quiet, and ergonomically appropriate workspace conducive to productivity.

  • Ability to sit at a desk or workstation for extended periods while working on a computer.

  • Occasional movement within the office for communication and accessing resources.

View Now

Cyber Security Analyst

22042 Falls Church, Virginia Creek Technologies

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview:
Creek Technology is seeking a skilled Cybersecurity Analyst to support enterprise cyber defense operations, pending contract award . The Cybersecurity Analyst will manage vulnerability identification, classification, prioritization, remediation, and reporting, while leveraging Cybersecurity Network Defense (CND) tools to protect mission-critical systems.

Key Responsibilities:
  • Operate and maintain CND tools, including ACAS, Nessus, HBSS, and Trellix.
  • Perform vulnerability management tasks: identification, classification, prioritization, remediation, and reporting.
  • Support risk assessments and recommend mitigations for identified vulnerabilities.
  • Implement and validate configuration changes to support Authorization to Operate (ATO) maintenance.
  • Enforce OPORDs/TASKORDs and other cybersecurity directives.
  • Document security findings, maintain audit records, and provide reports to leadership.
  • Collaborate with IT, cybersecurity, and program stakeholders to strengthen enterprise security posture.
Qualifications:
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • 5+ years of experience in cybersecurity, vulnerability management, or cyber defense operations.
  • Strong knowledge of vulnerability management frameworks, tools, and DoD cybersecurity standards.
  • Experience supporting risk assessments, ATO processes, and compliance efforts.
Required Certifications:
  • DoD 8570 CSSP Analyst (e.g., CEH, CySA+, GCIH).
Preferred Certifications:
  • CySA+.
  • CEH.
  • GCIA.
  • GCIH.
  • PenTest+.
Clearance:
  • Active Secret clearance required.

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. We recognize that people come with a wealth of experience and talent beyond just the technical requirements of the job. If your experience is close to what you see listed here, please still consider applying. Diversity of experience and skills combined with passion is a key to innovation and excellence; therefore, we encourage people from all backgrounds to apply to our positions. Please let us know if you require accommodation during the interview process.

Creek Technologies Company is proud to be an equal opportunity employer that is committed to diversity and inclusion in the workplace. Creek Technologies considers all applicants for employment without regard to race, color, sex, sexual orientation, gender, gender identity, age, religion, nation origin, pregnancy, child or spousal support withholding, disability, marital status, genetic information, citizenship/immigration status, military/veteran status, or any other status protected by federal, state, or local law. Creek Technologies makes hiring decisions based solely on qualifications, merits and business needs at the time. Upon request, Creek Technologies will reasonably accommodate applicants with a disability who need accommodation during the application process, unless accommodation creates an undue hardship for the company.
View Now

Cyber Security Analyst

20022 Washington, District Of Columbia CSV-Taurean

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Clearance:  T5/6C High Risk Public Trust (required)

Location:  Onsite – Washington, D.C.

Summary: Provide continuous monitoring, vulnerability assessment, incident response, and compliance documentation for OIG systems. Ensure compliance with NIST 800-53, FedRAMP, and FISMA standards.

Key Duties:

  • Monitor network activity with SIEM tools; investigate and report security incidents.
  • Conduct vulnerability scans; implement patches and remediation.
  • Support POA&Ms, ATO documentation, and FedRAMP compliance.
  • Assist with contingency planning and incident response exercises.

Qualifications:

  • Bachelor’s degree in Cybersecurity, IT, or related field.
  • 8+ years of cybersecurity experience.
  • Certifications: CISSP, CEH, CCSP, or equivalent.
View Now

Cyber Security Analyst

22021 Chantilly, Virginia Ampcus

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Ampcus Cyber Inc, a leading global pioneer in Cybersecurity committed to securing businesses against evolving cyber threats, headquartered in Chantilly, VA is looking for a Cybersecurity Specialist to join our Team working from our Corporate Chantilly office.

Job Responsibilities:
  • Perform recon on applications and networks
  • Perform penetration testing and system exploitation against desktops, servers, applications, operating systems, and security systems to gain root and administrator access for highly specialized network systems
  • Perform internal and external pentest against systems to determine vulnerabilities and offer mitigation strategies
  • Perform reconnaissance, privilege escalation persistence, lateral movement, and payload generation against information systems
  • Analyze vulnerabilities, delivering clear and coherent written reporting, identifying network risks, and providing mitigation recommendations
  • Conduct penetration and malicious user testing in Cloud environments, including Amazon Web Services (AWS), Azure, and on-premise systems
  • Translate systems and applications into security test plans, performing hands-on security testing and leveraging adversarial tactics
  • Must be able to use at least two of the following proficiently and instruct others on them: Nessus, Burp, Metasploit, and the Social Engineering Toolkit.
  • Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption
  • Ability to assist with researching and evaluating security policies and guidance
  • Ability to train other team members on security concepts
  • Excellent communication skills

Required Skills
  • 4-5 years of experience in related field
  • Demonstrated real-world experience performing grey and black box penetration testing.
  • Must be proficient in exploiting common web application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign-on bypass, etc.
  • Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux, A/V evasion methodologies, Exploit Dev.
  • Must have solid working experience and knowledge of Windows operating systems (incl. Active Directory), Linux operating systems; VMware ESXi or similar; mobile platforms are a plus.
  • Solid understanding of networking, TCP/IP, virtualization and cloud architecture.
  • Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards.
  • Knowledge of exploitation concepts including phishing and social engineering tactics, buffer overflows, fuzzing, SQLi, MiTM, covert channels, secure tunneling and open-source exfiltration techniques.
  • Experience with Linux, Windows, wireless, and virtual platforms
  • Knowledge of information security policies and guidance
  • Proactive interest in emerging technologies and techniques related to penetration testing

Preferred Skills and Qualifications
  • Experience with IOT device is a plus
  • Certifications such as CEH or OSCP
  • Malware analysis or digital computer forensics experience is a plus
  • Scripting (Windows/*nix), Bash, Python, Perl or Ruby, Systems Programming is a plus
View Now

Cyber Security Analyst

48170 Plymouth, Michigan Loc Performance

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

American Rheinmetall provides full services for complex mechanical products, fabricated structures and systems that range from complete design services to prototype manufacturing, testing, production launch, full rate production and product service and sustainment. American Rheinmetall provides quality products and services at affordable prices through a lean organizational structure and four facilities, three in Michigan that span 910,000 square feet, and one in Ohio, that span 800,000+ square feet. The Plymouth MI facility serves as corporate headquarters and specializes in suspension, driveline, and track systems. The Lansing and Lapeer Michigan based facilities specialize in fabrications and armor product solutions. American Rheinmetall’s St. Mary’s, Ohio facility manufactures rubber track products for agricultural, construction, and defense industries. Visit our website at

Title: Cybersecurity Analyst Reports To: Cybersecurity Manager

Department: Information Technology FLSA Status: Exempt

Pay Band/Salary: 3

Job Summary:

The Cybersecurity Analyst role will focus on threat intelligence and will be expected to manage various technologies at an advanced or expert level. The analyst is responsible for information security policy development and maintenance; coordinates the investigation and reporting of security incidents; works with auditors and examiners to ensure the network and systems are secure and meet regulatory guidelines; monitors and assesses the organization’s information security and makes recommendations for improvement; and schedules/performs periodic penetration tests, vulnerability assessments, and risk assessments. There will be expectations to work non-traditional hours to support such duties.

Estimated Salary Range: $74,000-$84,000

Essential Functions:

  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures)

  • Review logs and reports of all in-place devices and interpret the implications of that activity and devise plans for an appropriate resolution.

  • Participate in investigations into problematic activity.

  • Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.

  • Assist in ensuring that the Company is up to date with the latest security standards, patches, network protocols and products.

  • Recommend improvements to the current security posture.

  • Identify areas where controls are lacking or inadequate.

  • Assist in preparing the organization to respond to possible security incidents and breach.

  • Research security architecture, security technologies and security solutions.

  • Understand current infrastructure and network architecture.

  • Assess current security controls.

  • Identify operational configurations of workstations as per the established baselines and take actions to remedy misconfigurations.

  • Investigate potentially harmful emails and take actions to ensure that the threat is neutralized.

  • Identify sensitive data locations and make suggestions for safeguarding said data.

  • Be familiar with NIST 800-171 and the CMMC and apply standards.

  • Identify areas in which the company must follow NIST 800-171.

  • Assist in implementing or upgrading solutions pertaining to NIST compliance.

  • Identify areas that the company needs to improve on for the CMMC.

  • Assist in scheduling and leading Vulnerability Assessment meetings, Risk Assessment meetings, NIST compliance meetings, CMMC task meetings, or any other security related meetings.

Requirements

Supervisory Responsibilities:

  • No Supervisory responsibilities but will train/mentor quality techs

Minimum Qualifications:

To perform the job successfully, an individual will need to perform the following competencies.

  • Quantity of Work - The quantity of work produced and the promptness with which it is completed.

  • Quality of Work - The ability displayed, and accuracy of work produced, meeting company standards, and requiring little to no rework.

  • Judgement/Knowledge of Job - Knowledge of job, techniques, skills, equipment, procedures, materials, etc. Be extremely familiar with NIST 800-171

  • Attendance/Dependability - Punctuality and attendance.

  • Teamwork/ Attitude - Willingness and cooperativeness with co-workers and supervisors; ability to accept constructive criticism.

  • Initiative/Independence - The degree to which an employee searches out new tasks and expands their ability to perform assigned tasks without direct supervision.

Preferred Qualifications:

  • Basic knowledge of security risks & strategies, SIEM, antivirus, proxies, firewalls, and intrusion detection concepts, tools, and processes.

  • Knowledge of CMMC preferred

  • Experience working with Linux Systems and cybersecurity best practices.

  • Experience with Fortinet equipment and security certifications such as Security+, CISSP, CEH, OSCP, etc. is desired, but not required.

Education:

  • Bachelor’s degree in cybersecurity or related STEM field with 1-2 years related experience and/or training.

Background Prerequisites:

  • Must undergo and meet company standards for background check, employment verification, reference checks and controlled substance testing.

Working Conditions and Physical Demands:

With or without reasonable accommodations, requires the physical and mental capacity to perform effectively all essential functions. In addition to other demands, the demands of the job include:

  • While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use hands to finger, handle, or feel and reach with hands and arms. The employee may occasionally lift to 25 pounds. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.

Equal Employment Opportunity Statement:

American Rheinmetall provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sex (including pregnancy), gender identity, national origin, age, disability, or marital status, in accordance with applicable federal, state and local laws. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.

View Now
Be The First To Know

About the latest Cyber security Jobs in United States !

Cyber Security Analyst

22021 Chantilly, Virginia Cornerstone Defense

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

  • Location: Chantilly, Virginia
  • Type: Contract
  • Job #2844
General Technical Targeting Analyst
Chantilly, VA

*Clearance: *Active TS/SCI w/ Polygraph needed to apply *

Company Overview:

Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone's Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.

Required Qualifications:
  • Bachelor's degree (or equivalent) in Cybersecurity, Information Security, IT, Computer Engineering, Network Engineering, Computer Science, or Computer Forensics
  • Demonstrated XX years experience in three or more specific areas to include: analysis, network engineering, networking security, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, and computer exploitation.
  • Proven proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), software reverse engineering, forensics, network analysis, vulnerability assessment or malware forensics.
  • Demonstrated working knowledge of software development and some demonstrated proficiency in scripting and/or programming languages and database development
  • Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
  • Excellent verbal skills; communicate through briefs and informal communications their targeting and analysis effort to technical and non-technical audience
  • Excellent writing skills; ability to read and write cables, as well as other written products (Intels, Analytic products, etc.) as needed
Desired Qualifications:
  • MS degree in Cybersecurity, Information Security, IT, Computer Engineering, Network Engineering, Computer Science, or Computer Forensics
  • Experience within IC community
  • Relevant Certifications: CCFP, GCIA, CCSP, CEH, CISSP, GCFA, GCIA
  • Publications in peer-reviewed journals

BS Equivalent - Minimum 4 years of experience in Cybersecurity, IS, IA, IT, EE, Network engineering, Computer Science/Engineering, Computer forensics or related technical field. Experience used as equivalency for college degree must be in addition to other experience requirements.
View Now

Cyber Security Analyst

23450 Virginia Beach, Virginia PingWind Inc

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Location: Virginia Beach VA

Required Clearance: Secret - Top Secret SCI

Certifications: DoD -M in accordance with (IAW) DFARS Baseline Certification, minimum IAT Level I, Level II or Level III depending on position hired to fill

Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines

Required Experience: Two (2) Years for Level I, five (5) Years for Level II and ten (10) years for Level III

Position Description:

PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. Depending on the position hired to fill, you will be ensuring the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems.

Primary Responsibilities:

Level: I Two (2) years and Level II: Five (5) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:

• Performing STIG implementation;

• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool;

• Experience with Security Management policy guidance and directives; and

• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems.

Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:

• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;

• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);

• Performing STIG implementation;

• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and

• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems.

Required Qualifications:

• Secret - Top Secret SCI

• DoD -M in accordance with (IAW) DFARS Baseline Certification, minimum IAT Level I, Level II or Level III depending on position hired to fill

• Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines

• Two (2) Years for Level I, five (5) Years for Level II and ten (10) years for Level III

Desired Qualifications/Experience:

• Navy experience a plus

• DoD -M CSSP certification

• RMF experience

About PingWind

PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia.

Our benefits include:

• Paid Federal Holidays

• Robust Health & Dental Insurance Options

• 401k with matching

• Paid vacation and sick leave

• Continuing education assistance

• Short Term / Long Term Disability & Life Insurance

• Employee Assistance Program through Sun Life Financial EAP Guidance Resources

Veterans are encouraged to apply

PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
View Now

Cyber Security Analyst

22021 Chantilly, Virginia Acclaim Technical Services

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Acclaim Technical Services, founded in 2000, is a leading language, operations, and technology   services company supporting a wide range of U.S. Federal agencies. We are an Employee Stock Ownership Plan (ESOP) company, which is uncommon within our business sector. We see this as a significant strength, and it shows: ATS is consistently ranked as a top workplace among DC area firms and continues to grow.

We are actively hiring Cyber Security Analysts   with TS/SCI clearance and polygraph to join our team working in Northern Virginia. You will be responsible for addressing, supporting and implementing Customer directed duties, tasks and objectives specific to unique Customer projects and programs.

Description:

ATS is looking for a highly motivated and experienced expert Cyber Security Analyst to join our team. The ideal candidate will have a strong understanding of cyber security principles and practices, as well as experience with a variety of security technologies. In this role, you will be responsible for the overall security of our organization's information systems and networks.

Duties and Responsibilities:

  • Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.

  • Evaluates, tests, recommends, coordinates, monitors and maintains cybersecurity policies, procedures and systems, including access management for hardware, firmware and software

  • Ensures that cybersecurity plans, controls, processes, standards, policies and procedures are aligned with cybersecurity standards

  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.

  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.

  • Provides advanced guidance and leadership to less- experienced cybersecurity personnel.

  • May serve as a team or task leader. (Not a people manager)

      Education Requirement

  • BA/BS (or equivalent experience)

      Experience Requirement

  • 8-10 years of experience

Equal Employment Opportunity / Affirmative Action

ATS is committed to a program of equal employment opportunity without regard to race, color, ethnicity, national origin, ancestry, citizenship, sex, pregnancy, marital status, sexual orientation, age, religion/creed, hairstyles and hair textures, handicap/disability, genetic information/history, military/veteran status, or any other characteristic or condition protected by applicable law. We support the employment and advancement in employment of individuals with disabilities and of protected veterans, and we treat qualified individuals without discrimination on the basis of their physical or mental disability or veteran status.

Powered by JazzHR

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Security Jobs