Get the job you really want

Top Tech Jobs & Startup Jobs

79+ Job Results
12 Days Ago
2 Locations
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Exploitation Analyst Level 2 position involves supporting government clients through relevant experience in systems engineering, network security, vulnerability analysis, and penetration testing. Candidates must possess significant expertise across various computer and IT disciplines and may work in different locations based on client needs.
12 Days Ago
2 Locations
44 Employees
Expert/Leader
44 Employees
Expert/Leader
Information Technology • Software
The Exploitation Analyst will support government clients by providing expertise in computer systems design, network and systems administration, and cybersecurity. Responsibilities include vulnerability analysis, penetration testing, and computer forensics to ensure the safety and efficacy of clients' information systems.
12 Days Ago
2 Locations
44 Employees
Expert/Leader
44 Employees
Expert/Leader
Information Technology • Software
The Digital Network Exploitation Analyst Level 4 will provide support to government clients, focusing on cybersecurity and information systems analysis. Responsibilities include computer networking security, vulnerability analysis, penetration testing, and systems engineering. The analyst will utilize both educational background and hands-on experience in relevant fields to tackle technical challenges in information assurance and network administration.
12 Days Ago
2 Locations
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Digital Network Exploitation Analyst will support government clients by conducting computer or information systems design, analysis, and development. Responsibilities include engineering hardware/software, programming, assessing computer/network security, performing vulnerability analysis, penetration testing, and ensuring information assurance.
12 Days Ago
2 Locations
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Digital Network Exploitation Analyst will support government clients by leveraging skills in computer systems design and various cybersecurity methodologies. Responsibilities include vulnerability analysis, penetration testing, and ensuring the integrity of information systems through hands-on technical solutions and incident response activities.
12 Days Ago
2 Locations
44 Employees
Expert/Leader
44 Employees
Expert/Leader
Information Technology • Software
The Computer Network Defense (CND) Analyst will analyze and report on events in their environment, utilize various network-defense resources, train personnel, and communicate findings effectively. They will apply critical analysis techniques and contribute to shared understanding in a team environment.
12 Days Ago
2 Locations
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Computer Network Defense Analyst will support government clients by analyzing data from various cyber defense resources to identify potential security events, conduct forensic investigations, and collaborate with teams to develop intelligence insights while training personnel in best analytic practices.
13 Days Ago
2 Locations
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Computer Network Defense Analyst Level 2 will analyze and report on network security events, utilize various defense tools, and collaborate with government and military personnel to enhance security practices. The role requires skills in scripting, data analysis, and training others in security protocols.
13 Days Ago
Bluffdale, UT, USA
44 Employees
Senior level
44 Employees
Senior level
Information Technology • Software
The Target Digital Network Analyst Level 2 at ARSIEM Corporation supports government clients by providing technical expertise. The role requires extensive experience in related fields. Key responsibilities include analyzing digital networks and contributing to the success of various projects. Candidates must hold relevant degrees and required security clearances.
All Filters
Date Posted
Job Category
Experience
Industry
Company Name
Company Size