Find The Best Cyber Security Analyst Jobs For You

Where do you want to work?

0 selections

Cyber Forensics & Malware Analyst

Leidos
Ashburn, VA
Leidos is seeking an experienced Cyber Forensics and Malware Analyst to join our team on a highly-visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff.

The Cyber Forensics and Malware Analyst (CFMA) team provide support during core business hours (7am - 7pm), Monday thru Friday. Flexible start times are considered. Participates in rotating on call schedule.
Primary Responsibilities Help define requirements and identify gaps for performing remote compromise assessments Perform as a senior analyst and liaison between the customer and ESOC while performing remote assessments Conduct malware analysis using static and dynamic methodologies (e.g. debuggers [Ollydbg], disassembler [IDA Pro], sandbox execution, etc) Produce malware reports to disseminate to the watch floor and enterprise Capture forensic artifacts such as memory and disk images Work with the Splunk team to implement, enhance, or change existing use cases Pivot on the forensic data working with the Cyber Threat Intelligence team to determine if the malware is part of a larger campaign, how DHS is being targeted and take any further remediation required Lead remote compromise assessments and produce final assessment report Perform live box and dead box forensics to identify compromise and attack vector Provide input for SOC improvement and identify visibility gaps for enterprise monitoring Deploy and configure network sensors (Suricata), manage Linux VMs (Security Onion, Ubuntu, CentOS), and maintain a small network Potentially travel to other DHS locations (1-3 times/year) to support Incident Response investigations Develop and maintain SOPs and ROE templates Basic Qualifications Requires a minimum of a Bachelors degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND eight (8) years of professional experience in incident detection and response, malware analysis, or cyber forensics. Of the eight (8) years of professional experience requirements above, Cyber Forensics and Malware Analyst candidates shall have at least one (1) of the following specialized experience for their position: Digital Media Forensics Analyst: Candidates shall have a minimum of five (5) years of professional experience performing digital media forensic analysis, static malware code disassembly/analysis, and/or runtime malware code analysis. Incident Response Analyst: Candidates shall have a minimum of five (5) years of professional experience responding to information system security incidents. Ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to security investigators. Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program. Must have at least one of the following certifications: SANS GIAC:GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GISF, or GCIH ISC2: CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Defense Cyber Investigative Training Academy: FTK WFE-FTK, CIRC, WFE-E-CI, FIW Preferred Qualifications Experience in supporting malware analysis and forensics in cyber operations, and/or federal law enforcement. Understand and utilize Threat Intel Frameworks (e.g. Cyber Kill Chain, MITRE ATT&CK, Diamond Model) Network tool (e.g. network tap, IDS sensors, etc) configuration for on-site assessment Hands-on experience with Enase, FTK, FireEye HX, volatility, Security Onion, Suricata, Gigamon, VMWare ESXi, Splunk Signature (e.g. Snort, Yara, Suricata) development/tuning Expert knowledge in host-based analysis/forensics Proficient in performing timeline analysis and extracting artifacts from digital media Experienced reverse engineering and analyzing malware and developing a malware analysis report Ability to perform in-depth network forensics Develop and implement hunt methodologies for fly away assessments and for the SOC Proficient in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting Extensive knowledge about network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) Experienced with network topologies and network security devices (e.g. Firewall, IDS/IPS, Proxy, DNS, WAF, etc). Proficient working in a Windows and Linux operating system Pay Range:
New
3d ago

Cyber Forensics & Malware Analyst

Leidos Holdings Inc.
Ashburn, VA
Leidos is seeking an experienced Cyber Forensics and Malware Analyst to join our team on a highly-visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff.

The Cyber Forensics and Malware Analyst (CFMA) team provide support during core business hours (7am - 7pm), Monday thru Friday. Flexible start times are considered. Participates in rotating on call schedule.
Primary Responsibilities

* Help define requirements and identify gaps for performing remote compromise assessments

* Perform as a senior analyst and liaison between the customer and ESOC while performing remote assessments

* Conduct malware analysis using static and dynamic methodologies (e.g. debuggers [Ollydbg], disassembler [IDA Pro], sandbox execution, etc)

* Produce malware reports to disseminate to the watch floor and enterprise

* Capture forensic artifacts such as memory and disk images

* Work with the Splunk team to implement, enhance, or change existing use cases

* Pivot on the forensic data working with the Cyber Threat Intelligence team to determine if the malware is part of a larger campaign, how DHS is being targeted and take any further remediation required

* Lead remote compromise assessments and produce final assessment report

* Perform live box and dead box forensics to identify compromise and attack vector

* Provide input for SOC improvement and identify visibility gaps for enterprise monitoring

* Deploy and configure network sensors (Suricata), manage Linux VMs (Security Onion, Ubuntu, CentOS), and maintain a small network

* Potentially travel to other DHS locations (1-3 times/year) to support Incident Response investigations

* Develop and maintain SOPs and ROE templates

Basic Qualifications

Requires a minimum of a Bachelors degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND eight (8) years of professional experience in incident detection and response, malware analysis, or cyber forensics.

Of the eight (8) years of professional experience requirements above, Cyber Forensics and Malware Analyst candidates shall have at least one (1) of the following specialized experience for their position:

* Digital Media Forensics Analyst: Candidates shall have a minimum of five (5) years of professional experience performing digital media forensic analysis, static malware code disassembly/analysis, and/or runtime malware code analysis.

* Incident Response Analyst: Candidates shall have a minimum of five (5) years of professional experience responding to information system security incidents. Ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to security investigators.

Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.

Must have at least one of the following certifications:

* SANS GIAC:GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GISF, or GCIH

* ISC2: CCFP, CCSP, CISSP CERT CSIH

* EC Council: CHFI, LPT, ECSA

* Offensive Security: OSCP, OSCE, OSWP and OSEE

* EnCase: EnCE

* Defense Cyber Investigative Training Academy: FTK WFE-FTK, CIRC, WFE-E-CI, FIW

Preferred Qualifications

* Experience in supporting malware analysis and forensics in cyber operations, and/or federal law enforcement.

* Understand and utilize Threat Intel Frameworks (e.g. Cyber Kill Chain, MITRE ATT&CK, Diamond Model)

* Network tool (e.g. network tap, IDS sensors, etc) configuration for on-site assessment

* Hands-on experience with Enase, FTK, FireEye HX, volatility, Security Onion, Suricata, Gigamon, VMWare ESXi, Splunk

* Signature (e.g. Snort, Yara, Suricata) development/tuning

* Expert knowledge in host-based analysis/forensics

* Proficient in performing timeline analysis and extracting artifacts from digital media

* Experienced reverse engineering and analyzing malware and developing a malware analysis report

* Ability to perform in-depth network forensics

* Develop and implement hunt methodologies for fly away assessments and for the SOC

* Proficient in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting

* Extensive knowledge about network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)

* Experienced with network topologies and network security devices (e.g. Firewall, IDS/IPS, Proxy, DNS, WAF, etc).

* Proficient working in a Windows and Linux operating system

Pay Range:

COVID Response

Effective October 1, in order to enter Leidos facilities in the US and to attend Leidos business events outside our facilities, employees will be required to be vaccinated for COVID-19 or maintain proof of a negative COVID-19 test within 96 hours of entry. Effective December 8, all Leidos employees must be fully vaccinated (2 weeks past final dose) unless they are entitled to a legal accommodation. If you are not vaccinated, please consider getting your COVID-19 vaccination as soon as possible. If you have any questions, please contact your Talent Acquisition POC.

About Leidos

Leidos is a Fortune 500 information technology, engineering, and science solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, civil, and health markets. The company's 43,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $12.30 billion for the fiscal year ended January 1, 2021. For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to [email protected].

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.
22d ago

Cyber Security Analyst, Countermeasures

Capital One
Stone Ridge, VA
Opens new tabopen new tab
Center 2 (19050), United States of America, McLean, VirginiaCyber Security Analyst, Countermeasures

Capital One's Cyber Organization is a fast-paced, dynamic environment committed to enabling and securing the business. In this role, you will be responsible for solving hard problems using cutting edge technology in the areas of engineering, alert fidelity/effectiveness, and monitoring.

PRIMARY RESPONSIBILITIES

  • Proactively access alerts and signatures for effectiveness which can be implemented on cyber defense tools in response to new or observed threats within the network environment or enclave.

  • Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.

  • Collaborate with operation teams to build novel detections, establish repeatable processes, and drive automation for containment and remediation activities

  • Analyze and define data requirements and specifications for log ingestion from various data sources

  • Conduct time-sensitive analysis during cyber investigations, contextualizing identified impact (exfiltration, operational impact) and informing leadership to actively respond to emerging risk

  • Demonstrate a deep knowledge of adversary techniques and emerging threats that could adversely impact business activities.

  • Support day-to-day Countermeasures operations

  • Maintain Alert Review Life Cycle processes and documentation

  • Maintain Countermeasures processes, workflows, and tools

  • Develop, update and maintain ‘playbooks' which provide guidelines to our CSOC detect analyst to effectively and efficiently, detect cyber incidents

  • Identify and enhance processes where automation has the potential to improve efficiency

  • Provide a suite of services (Tooling, Content, Training) to the CSOC that enables efficient and effective response to Cyber related issues.

  • Provide support to operational & cybersecurity strategy development

  • Utilize industry recognized frameworks such as NIST 800-61 to perform assessments and document work activities

BASIC QUALIFICATIONS

  • High School Diploma, GED or Equivalent Certification

  • At least 2 years of experience working in a Security Operations or a Security Engineering role

  • At least 2 years of experience in device or policy management and creation (Firewall, IDS, IPS or SIEM)

  • At least 1 years of experience working with Enterprise Network Security and Security Perimeters

  • At least 1 years of experience with packet capture devices, syslog, netflow or application performance management

  • At least 1 year of experience in Data Analytics (log search or analysis)

PREFERRED QUALIFICATIONS

  • At least 1 of the following industry certifications (CEH, GCIA, GCIH, GISP, Security+, AWS Cloud Practitioner, AWS Solutions Architect, CISSP, CCSP or CISM)

  • At least 2 years of experience using Security Information and Event Management technologies (Securonix, ArcSight, LogRhythm, ELK, or Splunk)

  • 3+ years of experience working with network and operating system security concepts

  • 1+ years of experience with cyber use case and content development within SIEM systems, including SOAR methodologies

  • 2+ years of experience in Data Analytics (log search or analysis)

  • Experience working in the financial industry or similarly regulated environment

  • Experience writing regular expressions

At this time, Capital One Will not sponsor a new applicant for employment authorization for this position

No agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.

If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at RecruitingAccommodation@capitalone.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.

For technical support or questions about Capital One's recruiting process, please send an email to Careers@capitalone.com

Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.

Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).

New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Mid

Booz Allen Hamilton Inc.
Herndon, VA
Key Role:

Perform testing and systems analysis for a portfolio of tools that provides the integration and optimization of enterprise cybersecurity applications, tools and data standards. Develop test cases and procedures used for functional, integration, regression and user acceptance testing. Support end user questions, feedback on system usage, and troubleshooting technical issues as a subject matter expert (SME). Develop training curriculum or material and conduct instructor-led training events for end users, learn and understand Cyber technical concepts, apply expertise in technology, and work with a diverse team of analysts and developers.

Basic Qualifications:

* 2+ years of experience testing or quality assurance, including functional, integration, regression and user acceptance testing
* 2+ years of experience with requirements traceability
* 1+ years of experience with the SDLC
* 2+ years of experience with documentation
* Ability to show technical expertise and comprehension of information technology, network, systems, and software architecture
* Secret clearance
* Bachelor's degree

Additional Qualifications

* Experience with Agile Methodology
* Experience with JIRA
* Experience with cybersecurity technologies
* Experience with system administration
* Experience with tier III support
* DoD 8570 Compliant IAT II Certification, including CISSP, Security+

Clearance

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. Secret Clearance is required.

We're an EOE that empowers our people-no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic-to fearlessly drive change.
New
4d ago

Cyber Security Analyst

Secunetics, Inc.
Reston, VA
Opens new tabopen new tab
Secunetics provides network infrastructure intelligence services to government agencies and commercial clients. We work with our clients to help assess the performance of IT infrastructures, establish baselines, and identify opportunities for optimization/improvement. We are a focused team of enthusiastic colleagues working together on a diverse and challenging set of projects.

We are currently looking to grow our security team to support the prevention and detection of cyber-attacks for federal and commercial enterprise clients. We value creative, strategic thinkers with demonstrated interest and skills in optimizing network performance.
Who you are :

You are a US Citizen and clearable to the TS level
You have a strong interest in cyber security and IT infrastructure performance
You keep on top of changes in security products and breaches
You have strong communication skills (listening, verbal, and written)
You have an eye for details and consistency
You enjoy interacting with clients to satisfy their goals and objectives
You are a hobbyist and have a really cool lab environment set up in your basement

We are looking for a team member with the following skills/experience :

Undergraduate or graduate degree in Computer Science, Electrical Engineering, Computer Engineering, Cyber Security, or a related field

Minimum of 2 years of experience working in a Security Operations Center
Minimum of 2 years of incident response experience
Strong understanding of network and security technologies (routers, switches, firewalls, endpoint detection and response, endpoint protection platforms, email threat protection)
Strong understanding of networking protocols and principles
Experience in analyzing network packet data
Experience performing analysis of malware and determining if detected malware are true positives or false positives
Knowledge of malware: malicious docs, process tree creations, Phishing, exploit kits, etc.
Understanding of cyber-kill chains, threat vectors, and root cause analysis
Ability to write basic scripts in python
In-depth knowledge of Windows and Linux operating systems
Experience writing summarized technical reports

If you have any of the following, it would be a bonus :

Active US Secret or Top Secret clearance
Basic knowledge of reverse engineering concepts and steps
Experience working with SIEM and SOAR technologies
Experience working with software development tools (e.g. Github)
Network+, Security+, CISSP, CCNA, CCNP Certification

Secunetics is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, national origin, religion, creed, physical or mental disability, marital status, sexual orientation, veteran status, age, gender identity, or any other applicable basis that is protected by foreign, federal, state or local law, ordinance or regulation.
9d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Jobget
Dulles Town Center, VA
Opens new tabopen new tab
Center 1 (19052), United States of America, McLean, Virginia Cyber Security Log Management Analyst Capital One is looking for an associate to join our Cyber Security Log Management program. This team is responsible for enabling comprehensive cyber monitoring. We achieve our mission by designing processes and collaborating with teams across the company, in order to deliver an enterprise impact. We are looking for a team player who is able to operate at the tactical level, identify and document the threat landscape of our most sensitive systems, enhance our approach to managing the costs of maintaining cyber-relevant logs, and support strategic program enhancements. Our associates are empowered to drive projects which increase the effectiveness and capability of our end to end alerting and monitoring process, and have opportunities to brief the impact of their work to senior leadership. A successful candidate will work effectively both individually and within a team, apply critical thinking to create solutions in areas of high ambiguity, and to deliver those solutions by creating consensus, driving priorities, and building relationships. Responsibilities: Develop and maintain the Enterprise cyber security logging and alerting strategy Develop and maintain logging and alerting processes, procedures, and controls Drive prioritization and management of log ingestion into Capital One's SIEM Facilitate discussions which support alert use case development, log ingestion prioritization, and timely risk-based response to investigations and incidents Perform cyber security monitoring gap analysis and drive solutioning to improve maturity Identify monitoring risks, challenges, and opportunities, and escalate to leadership in a timely manner, as necessary Maintain awareness of, and design processes in accordance with, relevant regulatory and governance requirements Drive enterprise alignment with logging and alerting requirements under official enterprise policies Basic Qualifications: High School Diploma, GED, or equivalent certification At least 3 years experience in Cyber Operations At least 2 years of experience working with Linux or Windows operating systems At least 2 years of experience analyzing cyber security log data CompTIA Security certification Preferred Qualifications: Bachelor's Degree 2 years experience in threat modeling/use case development, information security standards, and data flow within a medium to large information environment 2 years experience working with SIEM alerts 3 years experience creating complex presentations using the Google Workspace suite Ability managing responsibilities and tasks across multiple projects Ability to develop and communicate technical content to non-technical audiences Associate-level AWS certification - AWS Certified Cloud Practitioner, Solutions Architect, SysOps Administrator or Developer Certification At this time, Capital One will not sponsor a new applicant for employment authorization for this position. No agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at RecruitingAccommodationcapitalone.com . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to Careerscapitalone.com Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
New
2d ago
Opens new tabopen new tab

Cyber Security Analyst

Raytheon Technologies
Dulles Town Center, VA
Raytheon Technologies has a need for a Cyber Security Analyst. The qualified Personnel will be able to triage alerts and analyze security events/logs for threats such as computer viruses, exploits, and malicious attacks; Use critical thinking to bring together information from multiple sources to determine if a threat is present; Be able to effectively notate work completed during an investigation; Track incoming alerts from multiple clients, and sources effectively; Communicate with multiple internal and external personnel during investigations or custom requests.
Required Skills:

+ The qualified Personnel will be able to triage alerts and analyze security events/logs for threats such as computer viruses, exploits, and malicious attacks

+ Use critical thinking to bring together information from multiple sources to determine if a threat is present

+ Be able to effectively notate work completed during an investigation

+ Track incoming alerts from multiple clients, and sources effectively

+ Experience identifying network and host-based threats

+ Experience working in a multi-client-based environment

+ Strong note taking skills

+ Experience analyzing network (PCAP) and computer (Windows Event) logs

+ Experience triaging security alerts

+ High Attention detail

+ Proactive

+ Practical experience with computer networks

+ Practical experience troubleshooting computer processes and applications

Familiarity with packet analysis to include:

+ HTTP Headers & Status codes

+ SMTP Traffic & Status codes

+ FTP Traffic & Status Codes

Possessing the following Certifications is desired or the ability to obtain 1 of the following:

+ GCIA

+ Security

+ + CEH

+ Network

+ + A

+ Requirements:

US Citizenship required

Business Unit Profile:

Raytheon Intelligence & Space delivers the disruptive technologies our customers need to succeed in any domain, against any challenge. A developer of advanced sensors, training, and cyber and software solutions, Raytheon Intelligence & Space provides a decisive advantage to civil, military, and commercial customers in more than 40 countries around the world. Headquartered in Arlington, Virginia, the business generated $15 billion in pro forma annual revenue in 2019 and has 39,000 employees worldwide. Raytheon Intelligence & Space is one of four businesses that form Raytheon Technologies Corporation.

Equal Opportunity/Affirmative Action Employer:

Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

+ 186712

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
29d ago

Cyber Security Analyst

Raytheon Technologies Corp
Dulles Town Center, VA
Raytheon Technologies has a need for a Cyber Security Analyst. The qualified Personnel will be able to triage alerts and analyze security events/logs for threats such as computer viruses, exploits, and malicious attacks; Use critical thinking to bring together information from multiple sources to determine if a threat is present; Be able to effectively notate work completed during an investigation; Track incoming alerts from multiple clients, and sources effectively; Communicate with multiple internal and external personnel during investigations or custom requests.
Required Skills:

* The qualified Personnel will be able to triage alerts and analyze security events/logs for threats such as computer viruses, exploits, and malicious attacks
* Use critical thinking to bring together information from multiple sources to determine if a threat is present
* Be able to effectively notate work completed during an investigation
* Track incoming alerts from multiple clients, and sources effectively
* Experience identifying network and host-based threats
* Experience working in a multi-client-based environment
* Strong note taking skills
* Experience analyzing network (PCAP) and computer (Windows Event) logs
* Experience triaging security alerts
* High Attention detail
* Proactive
* Practical experience with computer networks
* Practical experience troubleshooting computer processes and applications

Familiarity with packet analysis to include:

* HTTP Headers & Status codes
* SMTP Traffic & Status codes
* FTP Traffic & Status Codes

Possessing the following Certifications is desired or the ability to obtain 1 of the following:

* GCIA
* Security+
* CEH
* Network+
* A+

Requirements:

US Citizenship required

Business Unit Profile:

Raytheon Intelligence & Space delivers the disruptive technologies our customers need to succeed in any domain, against any challenge. A developer of advanced sensors, training, and cyber and software solutions, Raytheon Intelligence & Space provides a decisive advantage to civil, military, and commercial customers in more than 40 countries around the world. Headquartered in Arlington, Virginia, the business generated $15 billion in pro forma annual revenue in 2019 and has 39,000 employees worldwide. Raytheon Intelligence & Space is one of four businesses that form Raytheon Technologies Corporation.

Equal Opportunity/Affirmative Action Employer:

Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

*

186712
29d ago

Cyber Analyst

Avantus
Chantilly, VA
Avantus Federal, a NewSpring Holdings Company, is a mission-focused services and solutions company headquartered in McLean, VA. Drawing upon its heritage companies' histories of consistent growth and high performance in the federal services market, Avantus ensures eminence is earned, sustained and grown.

Avantus' services and solutions are designed, tailored, and executed based on our long history of helping our Homeland Security, Defense, Intelligence, and Federal Civilian customers solve complex challenges. Our capabilities include Project & Portfolio Management, Facilities, Acquisition & Sustainment, Systems Engineering Technical Services, Operations & Analysis, Transformation & Advisory Services, Data & Software Solutions, Digital Innovation, and Augmented Intelligence.

We are looking for a Cyber Analyst to help plan, develop, and execute engineering and development activities for our customer.
Responsibilities The Cyber Analyst will identify current and emerging cyber threats and analyze techniques, tactics, and procedures to produce insight that mitigate operational risks. The analyst will work closely with data scientists to identify a broad range of all source data for reporting. The analyst will apply analytical rigor to all work while remaining open to non-traditional information or conclusions. Required Qualifications Demonstrated experience in researching and evaluating modern cyber threats. Demonstrated experience researching cyber adversary tactics, techniques and procedures. Historical knowledge of major cyber threat actors. Strong communication skills with an ability to build a compelling and effective narrative. Understanding of common network protocols and familiarity with common network techniques. Proficiency with analyst software tools. Knowledge of both Linux and Windows Active TS/SCI clearance with polygraph required #AvantusClearedJob Per Executive Order (E0 14042) proof of COVID-19 vaccination is required prior to your start date. Preferred Qualifications Familiarity with technical collection and customer data repositories. Familiarity with network analysis tools. Experience with Scripting languages Ability to serve as a conduit to customer Cyber operators and understanding their needs and finding solutions. Company EEO Statement Avantus Federal is an equal opportunity employer and Vietnam Era Veterans Readjustment Assistance Act (VEVRAA) federal contractor. All qualified applicants receive consideration for employment without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity, protected veteran status, status as a qualified individual with a disability, or any other category protected by law. Avantus hires and promotes individuals solely on the basis of their qualifications for the job to be filled.
New
4h ago

Cyber Trust Analyst

Azzur Group
Herndon, VA
In this position, the analyst will be responsible for responding to customer inquiries, security questionnaires and developing external messages in response to security concerns. Responsibilities include perform comprehensive review of customer inquiry or questionnaire, prepare complete response and coordinate with stakeholders for release. Develop external communications and statements pertaining to increased threat environments or addressing specific security concerns. Brief management and stakeholders on trust operations and trends and provide recommendations. Collaborate with departments to improve security trust operations, communicate risk, and bolster effectiveness. Develop best practice recommendations to improve security on all levels.

Minimum Qualifications: To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
Bachelor's degree in a related field or equivalent professional experience required Minimum 3 years IT experience with three or more years of practical experience in a cyber threat analysis or security technology role Advanced knowledge of the following: information systems security concepts and technologies network architecture and tools Ability to effectively communicate at all levels, both verbal and written Demonstrated experience with security & risk frameworks, standards and best practices (e.g.: NIST, HIPAA, PCI, SOX, DFARS, ISO/IEC standards, etc.). Candidates with these desired skills will be given preferential consideration: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Global Information Assurance Certification (GIAC) Certificate programs in relevant areas
New
3d ago

Cyber Analyst

E3 Federal Solutions
Chantilly, VA
12d ago

Cyber Forensic Analyst (Host Based)

RTX
Reston, VA
Opens new tabopen new tab
New
1d ago
Opens new tabopen new tab

Cyber Analyst

KBR
Reston, VA
21d ago

Cyber Analyst

Kord Technologies
Reston, VA
21d ago

Principal Cyber Security ATO and Policy Analyst

Peraton
Herndon, VA
21d ago

Cyber Security Analyst

ICF
Arlington, VA
New
Easy Apply
21h ago

Cyber Security Analyst, Countermeasures

Capital One
Glenn Dale, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst

Scientific Research Corporation
Remote or Huntsville, AL
13d ago

Cyber Incident Response Analyst

Leidos
Ashburn, VA
27d ago

Cyber Forensics & Malware Analyst

Leidos
Ashburn, VA
40d ago

Cyber Security Log Management Analyst

Capital One
Sterling, VA
Opens new tabopen new tab
New
Easy Apply
2d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Brookeville, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Montgomery Village, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Olney, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Capital One
Arlington, VA
Opens new tabopen new tab
New
Easy Apply
2d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Leesburg, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Lansdowne, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Reston, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Stone Ridge, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Capital One
Reston, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Capital One
Chantilly, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Capital One
Sterling, VA
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Jobget
Reston, VA
Opens new tabopen new tab
New
2d ago
Opens new tabopen new tab

Cyber Security Log Management Analyst

Jobget
Chantilly, VA
Opens new tabopen new tab
New
2d ago
Opens new tabopen new tab

Cyber Security Compliance Analyst (Cloud Experience a must)

Azzur Group
Herndon, VA
New
3d ago

Cyber RMF Analyst, Mid

Booz Allen Hamilton Inc.
Herndon, VA
New
4d ago

Cyber Threat Analyst, Junior

Booz Allen Hamilton Inc.
Chantilly, VA
New
2d ago

Cyber Security Analyst, Countermeasures

Capital One
Olney, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Brookeville, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Cyber Security Analyst, Countermeasures

Capital One
Cabin John, MD
Opens new tabopen new tab
New
Easy Apply
3d ago
Opens new tabopen new tab

Average Salary For a Cyber Security Analyst

Based on recent jobs postings on Zippia, the average salary in the U.S. for a Cyber Security Analyst is $76,366 per year or $37 per hour. The highest paying Cyber Security Analyst jobs have a salary over $98,000 per year while the lowest paying Cyber Security Analyst jobs pay $59,000 per year

Average Cyber Security Analyst Salary
$76,000 yearly
$37 hourly
Updated October 21, 2021
59000
10 %
76000
Median
98000
90 %

Highest Paying Cities For Cyber Security Analyst

0 selections
CityascdescAvg. salaryascdescHourly rateascdesc
New York, NY
$94,459
$45.41
Jersey City, NJ
$90,617
$43.57
Baltimore, MD
$89,777
$43.16
Los Angeles, CA
$87,662
$42.15
Boston, MA
$87,484
$42.06
Hillsboro, OR
$85,024
$40.88

4 Common Career Paths For a Cyber Security Analyst

Team Leader

Team leaders are responsible for managing a team for a specific project or work component. They primarily guide the team members and ensure that they are still working towards the set goals. Team leaders create strategies to reach goals, cascade the goals and strategies to team members, assign tasks, conduct periodic check-ups on the roadmap towards the goals, foster an engaging work environment, motivate and coach team members, monitor team performance, evaluate the strategies and come up with mitigating plans as needed. They are also responsible for reporting the team's progress to higher management.

Security Engineer

Security engineers are responsible for developing and overseeing data and security software to help prevent data breaches, leaks, and taps related to cybercrime. Other duties and responsibilities include developing new systems to help protect computer networks and assets, configuring firewalls, and conducting penetration testing to pinpoint vulnerabilities. Additionally, security engineers are responsible for investigating attacks and help prevent cybersecurity threat. They are also responsible for creating new processes for authorization, encryption algorithms, and authentication, and analyzing current security policies.

Cyber Security Engineer

A cyber security engineer specializes in designing and establishing security measures to protect a company's network and data from hackers or cyber attacks. Their responsibilities primarily revolve around planning and implementing cyber security systems, responding to any problems or concerns, handling security breaches and emergencies, and troubleshooting to identify any issues or vulnerabilities. Moreover, a cyber security engineer may perform clerical tasks such as producing progress reports and documentation, creating instructional materials for systems, managing schedules, and coordinating with department managers, all while adhering to the company's policies and regulations.

Project Manager

Project managers oversee a specific project related to the organization's business. They manage the whole project from inception to evaluation. They initiate planning with involved departments, follow-through on the plans, ensure smooth execution of the plans, and evaluate the project for further improvements should these be needed. In line with this, project managers also ensure that the project is cost-efficient and well within the budget. They also manage the different work teams involved in the project and ensure that things are running smoothly on this aspect as well.

Illustrated Career Paths For a Cyber Security Analyst