Top Tech Jobs & Startup Jobs
The SOC Analyst - Level 2 is responsible for identifying, analyzing, and reporting network events to protect the organization's information and systems. Key duties include analyzing network traffic to detect threats, conducting research on security incidents, maintaining an incident tracking database, and following cybersecurity protocols. The role promotes a secure IT environment and supports internal regulations.
The role involves leading the Cybersecurity Insider Threat and Data Loss Prevention teams, overseeing threat detection, risk mitigation, and continuous program improvement. Responsibilities include mentoring analysts, collaborating with various teams, managing investigations, conducting risk assessments, and developing strategies to mitigate insider threats. The candidate will ensure program compliance with regulations and enhance security awareness across the organization.
The N3 Cyber Operations Analyst role involves providing expertise in Cyber Protection Team operations and planning to support U.S. Navy cyber operations. Responsibilities include overseeing DCO planning, supporting military exercise scenarios, tracking mission-related tasks, and collaborating with various defense operations teams.
The Intelligence Analyst will analyze cyber threat intelligence, assess risks, and support cyber operations. Responsibilities include evaluating data from multiple intelligence sources, collaborating with defense teams on mitigation strategies, providing intelligence during incident responses, and preparing reports for stakeholders. The role demands continuous research on emerging cyber threats and collaboration with various intelligence partners.
The Regional Sales Manager for Federal DoD will drive business growth by prospecting and closing deals with DoD agencies. The role requires developing strategies for account management, achieving revenue targets, enhancing customer satisfaction, and fostering strong partnerships with channel partners while leveraging a deep understanding of the Federal DoD market.
The Senior Information Security Engineer will provide expertise in cybersecurity oversight for a government connectivity network, conducting various assessments, leading data analytics activities, and collaborating with stakeholders on cyber verification processes and outreach.
The Information Security Manager II is responsible for supporting incident response, investigating cyber-attacks, developing mitigation plans, and monitoring network security. The role requires 24/7 watch support, training oversight, producing threat reports, and implementing security standards.
The Information Security Manager III will support incident response and investigations for government agencies facing cyber-attacks. Responsibilities include planning and implementing security measures, performing risk analyses, and functioning as a technical expert across projects, all while ensuring compliance with security regulations and policies.
Featured Jobs
The Solution Architect will support federal business development by developing technical and management solutions for proposals, reviewing RFIs, RFQs, and RFPs, and collaborating with capture and proposal managers. They will assess company fit for opportunities and outline the necessary resources and expertise required for project execution.
As a Manager in the IT Risk, Data Privacy & Security team, you will oversee client engagement, manage third-party audits, lead governance assessments, and mentor staff, ensuring the delivery of risk advisory solutions. You will also participate in business development activities and maintain strong client relationships.
As a member of Galvanick, you will play a crucial role in protecting critical infrastructure from cyber threats. The position emphasizes a commitment to cybersecurity and the need for passionate individuals to contribute to a mission-driven culture.
The role involves contributing to the mission of protecting and defending critical infrastructure against cyber threats at Galvanick. It requires enthusiasm for industrial cybersecurity and a commitment to making a significant impact in the field.
The Senior Cyber Warfare Threat Analyst will conduct intelligence analysis, provide analytical support to various military domains, review and provide input into intelligence documents, evaluate threat scenarios for military systems, and determine cyber threat resource requirements in a high-pressure environment.
Lead critical infrastructure security initiatives focused on DOD ICS projects. Manage global teams, conduct cyber assessments, ensure compliance with security standards, and provide technical insights for ICS/OT/SCADA environments.
The Cybersecurity Engineer role involves supporting cybersecurity efforts through independent activity and technical leadership, focusing on RMF compliance, HBSS support, testing, and documenting security protocols. The ideal candidate should have experience with a variety of technologies and cybersecurity tools, along with the ability to evaluate risks and develop ATO packages.
As a Managing Consultant at CrossCountry Consulting, you will lead projects and develop junior team members in delivering tailored integrated solutions in technology risk programs. Responsibilities include conducting assessments, audits, overseeing projects, providing client service, and mentoring team members. Qualifications include 5+ years of professional services experience, strong technical and analytical skills, and a Bachelor's degree. Travel up to 20-30% may be required.
The Managing Consultant will lead the design, execution, and assessment of risk programs for clients in cybersecurity, technology, and operational risk. Responsibilities include client service, delivering data-driven insights, overseeing project operations, conducting risk assessments, and mentoring team members.
The Channel Account Manager at Torq is responsible for managing relationships with strategic resellers and partners to drive business growth. Key responsibilities include negotiating agreements, collaborating on marketing strategies, providing training, and measuring partnership performance.
The Cyber Threat Hunter SME will support the DHS Hunt and Incident Response Team by analyzing network incidents, performing security assessments, collecting intrusion artifacts, and documenting investigative findings. The role involves both on-site and remote support, leveraging advanced cybersecurity analysis capabilities to ensure national security.
As an Incident Manager at Gray Tier Technologies, you will oversee incident response for cyber-attacks against government agencies. Responsibilities include analyzing incident data, implementing defense strategies, conducting network defense triage, and coordinating incident documentation. You’ll apply cybersecurity principles to identify and mitigate threats in IT environments.
The Inside Sales Engineer will support sales teams by providing technical information, conducting product demonstrations, and assisting with client implementations of Trend Micro products. They will also engage in training and mentoring while maintaining relationships with clients and participating in allied projects.
The CIR Tier II Analyst is responsible for real-time monitoring, triage of security alerts, incident analysis, and documentation in cybersecurity. The role involves participating in investigations of incidents and improving response capabilities, working collaboratively with cross-functional teams to enhance the efficacy of security measures and technologies.
As an Information Assurance Engineer, you will ensure the security of information systems, monitor devices for intrusions, analyze network security data, document system security incidents, and conduct security assessments and vulnerability scans.
The Program Manager will oversee cybersecurity services for the Army Research Laboratory, leading contractor employees, ensuring high-quality service delivery, and managing complex cybersecurity projects. Responsibilities include risk management, reporting, and maintaining relationships with IT teams.
The Vulnerability Manager will perform thorough vulnerability analysis and reporting, collaborate with IT teams for effective vulnerability management, conduct risk analysis, ensure compliance with cybersecurity policies, and maintain relationships with end-users. They will support the Army Research Laboratory's mission through innovative R&D resources.
Top Companies Hiring
See AllAll Filters
No Results
No Results