Cyber Security Analyst Jobs in the United States
Zone IT Solutions
$40000 - $100000
New York, NY
Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g.
AMERICAN SYSTEMS
Quantico, Virginia
You’ll work closely with IT, incident response, and accreditation teams to secure data, networks, systems, applications, and field operations, including responding to cyber incidents, ensuring accreditation/authorization, and maintaining information system security posture. Overview: AMERICAN SYSTEMS is an employee-owned federal government contractor supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training.
LTS
$85000 - $95000
Washington, DC
The Health PMO support contract provides IT program management, project management, technical management, financial management, functional planning, and documentation analysis in support of the Enterprise Program Management Office (EPMO) Enterprise Program Management Division (EPMD) Health Portfolio. Bachelor's Degree in Business Administration, Business Management, Computer Science, Information Systems, Operations Research, or related fields, plus 5 years of experience; 5 additional years of experience can be substituted for the degree requirement.
Vensure Employer Solutions
Chandler, AZ
Continuously monitor and evaluate the organization's cybersecurity posture, using securitytools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments. Bachelor’s degree in Cyber Security, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications.
Scientific Research Corporation
Reston, Virginia
Performing ongoing compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Secure Content Automation Protocol (SCAP), and Trellis Virus Scan Enterprise reviewing, documenting, and maintaining all results. Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months, CE/OS certificate may include Windows or Linux.
VTG
Chantilly, Virginia
Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks. Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Software Guidance & Assistance
$63.76 - $73
Bethlehem, PA
Software Guidance & Assistance, Inc., (SGA), is searching for a Cyber Security Analyst (Security Assurance Configuration Management) for a contract assignment with one of our premier Insurance services clients in Bethlehem, PA. You'll join a diverse team built on these core values: customer service, employee development, and quality and integrity in everything we do.
The Hollister Group, Inc.
Boston, MA
Monitor enterprise networks, cloud environments, and systems for security incidents, vulnerabilities, and suspicious activity using modern SIEM/SOAR platforms (e.g., Splunk, Azure Sentinel, AWS Security Hub). Manage and optimize security tools and solutions, including firewalls, endpoint protection, intrusion detection/prevention systems, vulnerability scanners, and identity/access management platforms.
PSEG
$93600 - $148200
Bethpage, New York
Job Responsibilities:Design, implement, and maintain Identity Governance and Administration (IGA) solution to support identity lifecycle management (provisioning, deprovisioning, and role management). The IAM analyst will work with the team to design and implement IAM workflows, software patches, system upgrades and day-to-day administration of the IAM software.
PSEG
$93600 - $148200
Bethpage, New York
Job Summary:This position is a hands-on Identity and Access Management (IAM) analyst focused on Privileged Access Management (PAM) responsible for overall technical design and development of an IAM implementation. The IAM analyst will work with the team to design and implement IAM workflows, software patches, system upgrades and day-to-day administration of the IAM software.
MIT Lincoln Laboratory
$92900 - $123000
Lexington, MA
You will collaborate with cross-functional teams to strengthen the organization’s security infrastructure, support strategic cybersecurity initiatives, and contribute to special projects that enhance the overall security posture. The final salary offered to a selected candidate will depend on various factors, including—but not limited to—the scope and responsibilities of the role, the candidate’s experience, skills and education/training, internal equity considerations and applicable legal requirements.
MIT Lincoln Laboratory
$92900 - $123000
Lexington, MA
You will collaborate with cross-functional teams to strengthen the organization’s security infrastructure, support strategic cybersecurity initiatives, and contribute to special projects that enhance the overall security posture. The final salary offered to a selected candidate will depend on various factors, including—but not limited to—the scope and responsibilities of the role, the candidate’s experience, skills and education/training, internal equity considerations and applicable legal requirements.
SGA Inc.
Bethlehem, PA
Software Guidance & Assistance, Inc., (SGA), is searching for a Cyber Security Analyst (Security Assurance Configuration Management) for a contract assignment with one of our premier Insurance services clients in Bethlehem, PA. You'll join a diverse team built on these core values: customer service, employee development, and quality and integrity in everything we do.
TNBR Careers
Nashville, Tennessee
Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Hive Group LLC
Mclean, VA
Support all Cybersecurity SME functions required by CPSS and APM General Support System, including coordination with OIT IAD to ensure compliance with all TSA and DHS guidance. Hive Group, a HUBZone-certified SDVOSB and multiple award-winning organization, delivers innovative solutions to address complex, mission critical program challenges for the federal government.
ActioNet, Inc
Newport, RI
Degree Requirement: Bachelor’s in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science (ABET-accredited or CAE-designated institution). Network & Security Operations: Install, configure, and maintain security devices on EDU, SIPRNET, DMZ, and commercial ISP networks.
Axelon Services Corporation
$51.85 - $77.81
Chicago, IL
Perform complex risk assessments and execute tests of data processing systems to ensure functioning of data processing activities and security measures. Threat Management & Incident ResponseLead threat hunting and incident response activities using Microsoft XDR and SIEM tools.
Oneida Technical Solutions
Fort Belvoir, VA
Provide support to the RNEC-NCR Belvoir following the DoD Cybersecurity Policy requirements set forth in DoDI 8500.01, "Cybersecurity," and DoDI 8510.01, "Risk Management Framework (RMF) for DoD Systems.". Perform enterprise-wide internal and external vulnerability testing and scanning to assess security posture on both SIPRNET and NIPRNET networks utilizing DoD-approved solutions.
True Manufacturing
O'Fallon, Missouri
Overview: As a Cyber Security Analyst II, you will be a key member of our information security team, responsible for enhancing the organization's security posture and ensuring the confidentiality, integrity, and availability of sensitive data. Qualifications: Bachelor's degree in computer science, cybersecurity or a related field required; OR equivalent professional experience paired with one or more advanced security certifications required.
Scientific Research Corporation
Philadelphia, Pennsylvania
Description: The Naval Surface Warfare Center Philadelphia Division (NSWCPD) is a Department of Defense entity responsible for research and development, test and evaluation, engineering and fleet support organization for the Navy’s ships, submarines, military watercraft and unmanned vehicles. Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months; CE/OS certificate may include Windows or Linux.
Cambridge International Systems Inc
Philadelphia, PA
As a Cyber Security Analyst, you will play a critical role in planning and implementing comprehensive security measures to safeguard computer systems, networks, and sensitive data from unauthorized access, data loss, and service interruptions, that serve U.S. government missions. Required Qualifications:Education & Experience: This position requires a Bachelor’s degree in Computer Science, Information Technology or an equivalent Science, Technology, and Engineering & Math (STEM) degree and 6+ years of experience; years of experience may be substituted in lieu of degree.
The Panther Group
Boston, MA
Additionally, the CSA3 will assist with evaluating cybersecurity waiver submissions requiring deeper technical analysis and will help maintain the statewide risk register to ensure tracking and remediation of risks that exceed the States risk tolerance. The Cyber Security Analyst 3 within the States Information Security Office (ISO) will be responsible for evaluating, analyzing, and assessing cybersecurity risks associated with new technologies, proposed solutions, and third-party vendors.
Focused HR Solutions
Little Rock, Arkansas
Experience with common IT infrastructure found in most large organizations including but not limited to load balancers, network LAN/WAN, firewall, email, AV, SIEM, GPO, web proxy, web, application development processes, database, Windows/Linux server, Windows workstation, wireless, 365 ATP/DLP. Experience with vulnerability scanning, identification and remediation, penetration testing, endpoint protection/hardening, CIS benchmarks, NIST/Cybersecurity frameworks, MITRE ATT&CK Matrix, IRS 1075, SSA, PII, threat vectors, threat hunting, incident response and remediation.
General Dynamics Mission Systems, Inc
$100219 - $111180
San Antonio, Texas
Company Overview: General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. Primary interfaces are Government Program Information Systems Security Manager (ISSM), Operational Team Leads, internal customers, external customers, suppliers.
SMBC
Charlotte, NC
In this role, you will be responsible for configuring scans, researching the latest threats, analyzing large datasets, conducting risk assessments, coordinating remediation of identified risks, and reporting on compliance levels and opportunities for improvement across the enterprise. (SMBC), SMBC Nikko Securities America, Inc., SMBC Capital Markets, Inc., SMBC MANUBANK, JRI America, Inc., SMBC Leasing and Finance, Inc., Banco Sumitomo Mitsui Brasileiro S.A., and Sumitomo Mitsui Finance and Leasing Co., Ltd.
Garmin International, Inc.
Olathe, Kansas
Demonstrated experience and knowledge of security related technologies such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners and forensics tools. Bachelor’s Degree in Computer Science, Information Technology, Management Information Systems, Business, or related field AND a minimum of 1 year relevant experience OR an equivalent combination of education and relevant experience.
Abacus Technology
Hanscom AFB, Massachusetts
Review all Information Assurance Vulnerability Management (IAVM) alerts, bulletins and Security Technical Implementation Guides (STIGS) for applicable implementation and remediation in the customer’s network/computing environment(s). Ensure applicable systems/networks/computing environments meet security requirements and that all security risks for those environments are properly mitigated.
Kodiak Building Partners
Englewood, Colorado
Administer and maintain cyber security practice, policy, and solutions – including, but not limited to designing, configuring, implementing, and supporting equipment within a Microsoft & Linux Operating System environment, Microsoft 365/Azure tenant(s), Microsoft domain(s), and Cisco Meraki WAN(s) & LAN(s), and Cloud Systems. To monitor and administer security related systems, such as Rapid7, Office365, Azure, Knowbe4, Active Directory, Multi-Factor Authentication and related Kodiak managed cloud and on-premises security related services.
CSV-TAUREAN
Washington, DC
Location: Onsite – Washington, D.C. Summary:Provide continuous monitoring, vulnerability assessment, incident response, and compliance documentation for OIG systems. Monitor network activity with SIEM tools; investigate and report security incidents.
ManTech
Springfield, VA
The Staff Cyber Security Analyst will support critical cybersecurity operations by monitoring and analyzing activity across systems to identify and respond to threats. + Characterizing and performing analysis of network traffic and system data to identify anomalous activity and potential threats to resources.
ManTech
Cape Canaveral, FL
This senior-level position involves leading incident response efforts, ensuring the integrity of enterprise data, and providing high-level technical guidance to maintain mission-critical security postures. + Performing as the technical expert and interacting with senior external personnel on significant technical matters often requiring coordination between organizations.
Vantage Point Recruiting
Portsmouth, NH
Additionally, the CSA3 will assist with evaluating cybersecurity waiver submissions requiring deeper technical analysis and will help maintain the statewide risk register to ensure tracking and remediation of risks that exceed the State’s risk tolerance. The Cyber Security Analyst III (CSA3) within the State’s Information Security Office (ISO) will be responsible for evaluating, analyzing, and assessing cybersecurity risks associated with new technologies, proposed solutions, and third-party vendors.
Core One
Chantilly, VA
Conduct hands-on forensic reviews of devices, including laptops and mobile devices, using open source or commercial forensic tools such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight. Handle and image various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
The Building People
null, null
This representative would be required to travel to CONUS and OCONUS governmental DoD facilities and must have the capability of performing logical scans to locate OT components and assess network architecture and connectivity in an effort to support multiple DoD entities complete inventories of Operational Technology (OT). The Building People, LLC, has a position open for a Senior Cyber Security Analyst who will be our primary representative and a self-motivated resource for our team in our rapidly expanding connected infrastructure division.
Scientific Research Corporation
Chantilly, Virginia
Performing ongoing compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Secure Content Automation Protocol (SCAP), and McAfee Virus Scan Enterprise, while reviewing, documenting, and maintaiining all results. Experience in applying STIG and security control hardening along with reverse engineering potential systematic operational functionality breaks with potential compensating risk management approaches.
Scientific Research Corporation
North Charleston, South Carolina
Performing ongoing compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Secure Content Automation Protocol (SCAP), and McAfee Virus Scan Enterprise while reviewing, documenting, and maintaining all results. Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months CE/OS certificate may include Windows or Linux.
Mind Computing
$85000 - $95000
undefined, undefined
The selected individual will serve as a team member on projects related to an area of relevant cyber risk consulting such as: Strategy, Defense and Response – providing cyber risk awareness, strategy, assessment and management, and cyber risk defense, response, and protection; Data – reporting and validation, architecture, privacy and protection; Application Security – concept and requirements design and development, verification and validation, and production maintenance and retirement; Infrastructure – core and cloud infrastructure security, threat and vulnerability management, asset management, mobile and endpoint security, and technical resilience; Identity – governance, advance authentication, privileged access management, identity analytics, consumer identity, and directory services; Security Architecture Review, and Systems Security Engineering. PMO Support: Hands-on experience supporting Project Management Office (PMO) functions, including project tracking, documentation, reporting, and coordination among cross-functional teams.
Cambridge International Systems Inc
Philadelphia, PA
As a Cybersecurity Analyst, you will play a critical role in planning and implementing comprehensive security measures to safeguard computer systems, networks, and sensitive data from unauthorized access, data loss, and service interruptions, that serve U.S. government missions. Required Qualifications:Education & Experience: This position requires a Bachelor’s degree in Computer Science, Information Technology or an equivalent Science, Technology, and Engineering & Math (STEM) degree and 3+ years of experience; years of experience may be substituted in lieu of degree.
ManTech
Denver, CO
Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and/or virtual communication, which may involve delivering presentations. + Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously, coordinating resources and ensuring scheduled goals are met.
RKON
Chicago, IL
Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR), Network Detection and Response (NDR), Email Security, Cloud Security, and other security threat data sources. Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host-based forensics as applicable.
ManTech
Crane, IN
As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. + Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations.
Tech Talent Link
Plano, TX
This includes working closely with our engineering teams (10-12 folks) who design custom hardware boards and write low-level code to push firmware and software updates. Collaborate with software engineering (and hardware) teams to assess the security implications of open-source system architecture and custom components.
BWXT
$76000 - $119000
Erwin, TN
BWX Technologies, Inc. and its affiliates and subsidiaries (BWXT) is not responsible for and does not accept any liability for fees or other costs associated with resumes or candidates presented by recruiters or employment agencies, unless a binding, written recruitment agreement between BWXT and the recruiter or agency exists prior to the presentation of candidates or resumes to BWXT and includes the specific services, job openings, and fees to be paid (“Agreement”). A U.S.-based company, BWXT is a Fortune 1000 and Defense News Top 100 manufacturing and engineering innovator that provides safe and effective nuclear solutions for global security, clean energy, environmental restoration, nuclear medicine and space exploration.
CEDENT
undefined, WA
Job Description - Aid in creation of a scalable, holistic threat intelligence program that can serve as a template to aid in lululemon expansion plans/strategies. - Communicate to leadership status, results, and summaries of threat intelligence capabilities, as well as the maturity and strength of these programs.
Goldbelt, Inc.
Jacksonville, North Carolina
CPMG offers flexible, integrative solutions for Department of Defense (DoD) contractors, among others, and specializes in cybersecurity, information and operational technology, electronic security surveillance, and support services. A leader in cutting-edge research and technology in the cyber arena, CPMG focuses on using business drivers to guide cybersecurity activities and manage risk.
Clark Creative Solutions
San Diego, CA
administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data. Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
ManTech
Yuma, AZ
Occasionally move about inside the office to access file cabinets or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which involve delivering presentations. Includes operational support for Identity Management, Privileged User Access, Access Control (firewall), End Point Protection, Internet Protection, Vulnerability Scanning, and SIEM support.
Diverse Linx
Tampa, FL
At least 1+ years of experience in Data Lake and data warehouse using products such as AWS S3, Snowflake, Databricks, etc. At least 3+ years of experience in SIEM and SOAR products such as Splunk, Elastic, Datadog, Cribl, etc.
Summit TRC
Huntsville, AL
Perform vulnerability assessments and compliance checks using tools like STIGs, ACAS, NESSUS, and the NIST RMF to ensure systems are compliant and pass security measures. Protect systems and data by applying security controls, configuring Linux/Windows systems and networks, and hardening environments - automating tasks when possible.
ManTech
Virginia Beach, VA
Occasionally move about inside the office to access file cabinets or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which involve delivering presentations. Includes operational support for Identity Management, Privileged User Access, Access Control (firewall), End Point Protection, Internet Protection, Vulnerability Scanning, and SIEM support.