Basic Qualifications: A Bachelor’s degree and 9 years of experience, or 7 years of experience with a Master’s. An additional 4 years of experience will be considered in lieu of degree. Possess one of the following certifications: CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP Experience implementing deceptive technology solutions. Expertise in several cybersecurity areas along with experience with deception techniques and technologies. Have a proactive and innovative mindset, always seeking ways to improve cybersecurity defense through deception techniques. Proven ability to develop and recommend corrective actions. Expertise, knowledge, and experience integrating new architectural analysis of cyber security features and related existing systems to future needs and trends, embedding advanced forensic tools and techniques for attack reconstruction. Comfortable interfacing with external entities including law enforcement, intelligence, and other government organizations and agencies. U.S. citizenship is required. Active Top Secret security clearance is required, with eligibility to obtain TS/SCI. Preferred Qualifications: Experience supporting the Department of State cyber security mission. Experience using Databricks. Experience using Artificial Intelligence (AI) and large language models (LLMs). Ability to create, troubleshoot, configure, and operate complex scripting solutions with the ability to output the results in a variety of formats (e.g. HTML, XML, etc.) and to repurpose the results for reports targeting different technical levels (e.g. other analysts, management, etc.). Peraton is seeking a Senior Cyber Security Deception Engineer/Threat Hunter to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program, providing leading cyber and technology security experience to enable innovative, effective, and secure business processes. Location: Rosslyn, VA; Flexible for occasional telework – must be local to work location. In this role, you will: Work closely with cross-functional teams, including Security Operations, Incident Response, Threat Intelligence, and Threat Hunting to ensure a proactive and robust security posture. Perform advanced network threat hunting to detect malicious or suspicious behavior on Department on-premise and cloud-based networks. Respond to security events received from CIRT, provide comprehensive findings, and recommend remediation steps. Perform advanced traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns. Perform forensic analysis of suspected systems (e.g. on and off premise network devices, and storage media) impacted by malicious activity. Implement and use cyber security frameworks (e.g. MITRE-ATARC, Kill Chain, etc.). Has proven expertise in performing analyses to validate established security requirements and recommend additional security requirements and safeguards. May interface with external entities including law enforcement, intelligence, and other government organizations and agencies.
...technician systems Calibration ASE Master Technician ICAR I-CAR Autel OPUS Dealership Dealer Car Cardaq Genesis Kia Hyundai Ford Honda Chevrolet Chevy Audi BMW Mercedes Tesla Rivian Subaru Lexus Mitsubishi Cadillac Nissan Porshe Jeep Mopar VW ODIS Protech Caliber...
Job Description POSITION TITLE: Licensing Advertising Compliance Coordinator POSITION PURPOSE: Responsible for the overall organization of the manufacturing licensing agreements in relation to their financial and non-financial contractual obligations, with a primary...
Benefits:Bonus based on performanceCompetitive salaryEmployee discountsPaid time offTraining & developmentNEW OWNERS - NEW MANAGEMENT - NEW ATTITUDE!Our brand purpose is to Elevate the Lives of the People we Touch. Become part of the team at Massage Heights and help...
...Job Description Job Description Our property is growing rapidly and we are looking for a night auditor who loves working with people, possesses a strong commitment to customer satisfaction, and has bookkeeping experience! We provide the tools and training to bolster...
...for ensuring the appropriate operational security posture is maintained for an information... ...to assigned duties. Execute the cyber security portion of the self-inspection,... ...Degree MANDATORY: 2-5 years related experience, especially in developing RMF packages or...