-
Leidos
-
Ashburn, Virginia
...
TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.
Security ... response, malware analysis, or computer forensics. Additional certs may be considered in place of a degree
...
-
Leidos
-
Ashburn, Virginia
...
TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.
Security ... response, malware analysis, or computer forensics. Additional certs may be considered in place of a degree
...
-
Leidos
-
Ashburn, Virginia
...
TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.
Security ... response, malware analysis, or computer forensics. Additional certs may be considered in place of a degree
...
-
MartinFederal Consulting, LLC
-
Huntsville, Alabama
...
and platform activity on various information systems and networks.
Conduct memory analysis ... Digital Forensics Incident Response Analyst provides identification, collection, examination, and analysis
...
-
MartinFederal Consulting, LLC
-
Houston, Texas
...
and platform activity on various information systems and networks.
Conduct memory analysis ... Digital Forensics Incident Response Analyst provides identification, collection, examination, and analysis
...
-
General Atomics and Affiliated Companies
-
San Diego, California
...
high-technology systems development ranging from the nuclear fuel cycle to remotely piloted aircraft ... ) in Rancho Bernardo, California. With general supervision under the CTM manager, this position is
...
-
Eastern Bank
-
Lynn, Massachusetts
...
Understanding of the following
Computer forensic analysis
Firewall technology
SIEM configuration ... remedial action and/or security network enhancements based on detailed analysis and ensure proper
...
-
ASM Research, An Accenture Federal Services Company
-
Austin, Texas
...
and actively participate in the investigation, analysis, and resolution of cybersecurity incidents ... , including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to
...
-
Kansas State University
-
Manhattan, Kansas
...
requirement
Categories: Computer Science / Information Technology
Pay Grade: 12A
r
rAbout This ... :
Educational Background: Bachelor\'s degree in Computer Science,
Information Security, Cybersecurity, or
...
-
Manulife
-
Work At Home, Massachusetts
...
.
What work would I Be doing?
Perform incident response and forensic analysis across all ... cycle: preparation, analysis, containment, eradication, remediation, recovery and post-incident activity
...
-
SAIC
-
AUSTIN, Texas
...
Information Systems Auditor) or CISM (Certified Information Security Manager) are preferred.
Excellent ... required to support 2nd or 3rd as needed**
Shift
Shift Days
**Shift Time
...
-
SAIC
-
MARTINSBURG, West Virginia
...
Information Systems Auditor) or CISM (Certified Information Security Manager) are preferred.
Excellent ... required to support 2nd or 3rd as needed**
Shift
Shift Days
**Shift Time
...
-
MindPoint Group
-
Washington, District Of Columbia
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
Penn Medicine
-
Philadelphia, Pennsylvania
...
cybersecurity incident follow-up activities, technical research and analysis of threat and vulnerabilities affecting information systems, and participating in other cybersecurity program activities, including risk
...
-
MindPoint Group
-
Tallahassee, Florida
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Harrisburg, Pennsylvania
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Olympia, Washington
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Dover, Delaware
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Charleston, West Virginia
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Annapolis, Maryland
...
activity
Perform in-depth analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify
...
-
MindPoint Group
-
Augusta, Maine
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Raleigh, North Carolina
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Indianapolis, Indiana
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Columbus, Ohio
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Trenton, New Jersey
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Little Rock, Arkansas
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Austin, Texas
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Concord, New Hampshire
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
MindPoint Group
-
Nashville, Tennessee
...
analysis and investigation of high-priority cybersecurity incidents
Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes
...
-
ManTech
-
Mclean, Virginia
...
following: SIEM systems, network security tools, log analysis tools, cybersecurity principles, incident detection, analysis, and response methodologies, operating systems, network protocols, and security
...