CrawlJobs Logo

Cyber Analysis Support Specialist

gsconsultingllc.com Logo

GS Consulting

Location Icon

Location:
United States , Fort Meade or Columbia

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Cyber Analysis Support Specialist will be actively integrated into a computer network analysis team with a focus on threats to DoD and US Government networks. The analyst will work with various members of the intelligence community, leveraging multiple tools, evaluating threat technologies, and apply knowledge to the threat environment.

Job Responsibility:

  • Conduct research, evaluate technical threat data, and leverage all-source intelligence in a network operations and cyber warfare environment
  • Evaluate cyber threat events to determine their impact on DoD and US Government operations and understand adversary capabilities
  • Leverage multiple analytic tools to conduct research and analyze data
  • Analyze vulnerabilities associated with DoD and US Government networks to determine risk
  • Write collection requirements and tasking for signals intelligence collection systems based on analytic assessments
  • Write reports for customers based on research and analysis of cyber threat activities and techniques

Requirements:

  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts or sciences or equivalent military training
  • Experience with computer network operations and SIGINT tools and databases
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed

Additional Information:

Job Posted:
December 09, 2025

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Analysis Support Specialist

Network Threat Support Specialist

The Network Threat Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree or equivalent military training
  • Experience discovering threats and/or anomalies in network data
  • Experience discovering and responding to network intrusions
  • Experience adjusting security controls to prevent malware and/or intrusion activity
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
Job Responsibility
Job Responsibility
  • Identify adversarial threats and activities against DoD and US government network
  • Analyze and discover threat and intrusion events
  • Leverage technical analysis capabilities to analyze malware and develop methods to defend against malicious activity
  • Respond to and analyze network intrusion and attack events
  • Characterize the capabilities of malware, document how to detect malware, and assess it’s impact
  • Analyze systems and networks of interest, identify network vulnerabilities, and create techniques to exploit networks
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Multi-Source Support Specialist

The Multi-Source Support Specialist will be actively integrated into a computer ...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts and/or sciences or equivalent military training
  • Experience conducting All Source Intelligence analysis
  • Experience analyzing SIGINT, HUMINT, OSINT, and/or IMINT
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed
Job Responsibility
Job Responsibility
  • Conduct All-Source Intelligence Analysis to identify malicious activity and adversarial behaviours by using SIGINT, HUMINT, OSINT, and/or IMINT
  • Conduct analysis using multiple intelligence collection methods to produce intelligence reports which will support assessments of threats and malicious activity
  • Analyze systems and networks of interest, identify network vulnerabilities, and support the development of techniques to exploit networks
  • Create assessments based on analysis of fused intelligence data, which focus on threats to DoD and US Government systems. Document the assessments in the form of intelligence reports to support mission objectives and situational awareness for operations
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Cybersecurity Forensics Specialist

As a Cybersecurity Forensics Specialist, you will play a key role in the investi...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Microsoft and Linux operating systems
  • Security technologies such as antivirus solutions, firewalls, IDS, and network analysers (e.g. Wireshark)
  • Deployment and configuration of incident response and threat intelligence platforms (e.g. MISP, OpenCTI…)
  • Scripting and programming (Bash/Shell, Python
  • Java or C/C++ are considered assets)
  • Knowledge of offensive security techniques, including penetration testing
  • Use of digital forensics tools and understanding of forensic chain‑of‑custody principles
  • Malware analysis and reverse engineering, including disassemblers, debuggers, and sandboxing tools
  • Strong analytical and problem‑solving skills
  • Ability to produce clear, structured technical documentation and reports
Job Responsibility
Job Responsibility
  • Conduct computer and digital forensics investigations related to targeted cyber‑attacks and other serious security incidents, including those involving sensitive or classified information
  • Perform malware analysis and behavioural analysis to support cyber threat intelligence and attribution activities
  • Contribute to research and development initiatives aimed at improving detection, investigation, and response to evolving cyber threats
  • Participate in major IT security events, expert communities, and research forums in the cybersecurity domain
  • Contribute to internal working groups involved in the development and evolution of information security policies
What we offer
What we offer
  • An international and fast-paced work environment with exposure to European institutions
  • A people-first company culture that values innovation, collaboration, and diversity
  • Ongoing career development support tailored to your growth
  • A dynamic office atmosphere and plenty of social events: food trucks, BBQs, after-work drinks, family days, and more!
  • Fulltime
Read More
Arrow Right

SIEM Content Development Specialist

The SIEM Content Development Specialist plays a critical role in advancing the C...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 2-5 years’ experience in SIEM content (rule logic and code) development role
  • Minimum of 2 years of SOC analyst experience (Level2 or above) required
  • In depth and extensive hands-on experience in security event analysis, create and refine SIEM/EDR rules and deliver efficiency within the SIEM and all other technologies used within the team
  • Deep knowledge of IPv4/IPv6, TCP networking protocols
  • Deep knowledge of Windows/Linux operating systems
  • Exceptional working knowledge of security technologies such as SIEM (ArcSight, Sentinel, QRadar, LogRhythm, Splunk), EDR (Microsoft Defender, FireEye, Tanium), IDS/IPS, firewalls, proxies, web application firewalls, anti-virus, etc.
  • Comprehensive understanding of Window Security Event logs and Syslog
  • Excellent familiarity with endpoint/perimeter security attack vectors and detection (blue/purple teaming)
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Outstanding knowledge of cloud platforms such as Azure, O365, Google cloud, AWS, Oracle
Job Responsibility
Job Responsibility
  • Contribute to continuous improvement initiatives across multiple technologies by developing and refining content that enhanced threat detection and response capabilities
  • Contribute to the development and optimisation of threat detection content, including the tuning of threat and vulnerability management technologies and the continual refinement of SIEM rules and logic to enhance detection accuracy and operational performance
  • Lead and contribute to the optimisation and modernisation of SIEM content, supporting the adoption of next-generation SIEM technologies and cloud-native security tools
  • Manage the lifecycle of detection content, including development, testing, release, and retirement, using version control and documentation best practices
  • Collaborate with DevOps/SecOps teams to integrate security content into broader CI/CD workflows
  • Collaborate with the CSOC Manager to support improvements in security operations through effective content contributions
  • Support security event analysis by participating in and may drive security event analysis activities to address current cyber threats
  • Assist in threat response activities, providing analytical input from a blue team perspective to help identify potential threat group behaviours
  • Contribute to the creation of cyber security reports and advisories, ensuring timely and accurate dissemination to key stakeholders
  • Participate in residual risk assessments, supporting post-incident analysis and the documentation of operational and technical lessons learned
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right

Principal Cyber Defense Ops Specialist

The Principal Cyber Defense Ops Specialist will be a resident technical expert w...
Location
Location
United States , Johnston; Dallas
Salary
Salary:
112000.00 - 148000.00 USD / Year
citizensbank.com Logo
Citizens Bank
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7 or more years of progressive security industry experience
  • Demonstrated understanding of various operating systems (Window, Unix, Linux, AIX, etc) with an emphasis on Security Operations
  • Hands on experience with: Security Information and Event Management Tools (QRadar, Arcsight, Splunk, etc.)
  • Intrusion Prevention Tools
  • Database Security Tools (Guardium)
  • Data Loss Prevention Tools (Symantec, Websense, etc.)
  • Firewalls (Cisco, Palo Alto, Check Point etc.)
  • Application Security Tools
  • Vulnerability tools
  • Cyber Security Incident Response
Job Responsibility
Job Responsibility
  • Conducting network forensics, log analysis, and malware triage in support of incident response investigations
  • Utilizing current and future tools to perform hunting for complex insider and outsider threats
  • Analyzing vulnerability assessment and penetration testing results to help identify stealthy threats and drive remedial action of critical threats
  • Supporting proactive deep malware analysis, and recommending defensive actions to effectively defend against malware related attacks
  • Recommend how to optimize security monitoring tools based on threat hunting discoveries
  • Facilitating the evaluation, selection and implementation of supporting SOC systems and tools
  • Helping develop meaningful metrics to reflect the true posture of the environment allowing the organization to make educated decisions based on risk
  • Exercising analytical skills and knowledge of supervision regulations
What we offer
What we offer
  • comprehensive medical, dental and vision coverage
  • retirement benefits
  • maternity/paternity leave
  • flexible work arrangements
  • education reimbursement
  • wellness programs
  • paid time off policy exceeds the mandatory, paid sick or paid time-away policy of every local and state jurisdiction in the United States
  • opportunity to earn an annual discretionary bonus
  • Fulltime
Read More
Arrow Right

Principal Cyber Defense Ops Specialist

The Principal Cyber Defense Ops Specialist will be a resident technical expert w...
Location
Location
United States , Johnston; Dallas
Salary
Salary:
112000.00 - 148000.00 USD / Year
citizensbank.com Logo
Citizens Bank
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7 or more years of progressive security industry experience
  • Demonstrated understanding of various operating systems (Window, Unix, Linux, AIX, etc) with an emphasis on Security Operations
  • Hands on experience with: Security Information and Event Management Tools (QRadar, Arcsight, Splunk, etc.)
  • Intrusion Prevention Tools
  • Database Security Tools (Guardium)
  • Data Loss Prevention Tools (Symantec, Websense, etc.)
  • Firewalls (Cisco, Palo Alto, Check Point etc.)
  • Application Security Tools
  • Vulnerability tools
  • Cyber Security Incident Response
Job Responsibility
Job Responsibility
  • Conducting network forensics, log analysis, and malware triage in support of incident response investigations
  • Utilizing current and future tools to perform hunting for complex insider and outsider threats
  • Analyzing vulnerability assessment and penetration testing results to help identify stealthy threats and drive remedial action of critical threats
  • Supporting proactive deep malware analysis, and recommending defensive actions to effectively defend against malware related attacks
  • Recommend how to optimize security monitoring tools based on threat hunting discoveries
  • Facilitating the evaluation, selection and implementation of supporting SOC systems and tools
  • Helping develop meaningful metrics to reflect the true posture of the environment allowing the organization to make educated decisions based on risk
  • Exercising analytical skills and knowledge of supervision regulations
What we offer
What we offer
  • comprehensive medical, dental and vision coverage
  • retirement benefits
  • maternity/paternity leave
  • flexible work arrangements
  • education reimbursement
  • wellness programs
  • competitive pay
  • opportunity to earn an annual discretionary bonus
  • Fulltime
Read More
Arrow Right

Cyber Security Specialist

We are seeking a Cyber Security Specialist to support day-to-day cybersecurity o...
Location
Location
Pakistan , Lahore
Salary
Salary:
Not provided
northbaysolutions.com Logo
NorthBay
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7–8 years of experience in SOC / Cyber Security Operations / Incident Response
  • Strong hands-on experience with SIEM operations (alerts, use-cases, dashboards, reporting)
  • Strong working experience with EDR tools and endpoint investigation fundamentals
  • Practical understanding of incident response lifecycle and operational documentation discipline
  • Experience coordinating remediation with cross-functional teams in hybrid/on-prem environments
  • Strong knowledge of ISO 27001, SOC 2, PCI/DSS operational control expectations (logging, access, incident handling, evidence)
Job Responsibility
Job Responsibility
  • Monitor and analyze security events using SIEM, including alert triage, correlation validation, and escalation handling
  • Execute incident response activities: triage, containment coordination, evidence capture, and support for root-cause analysis
  • Operate and manage EDR tooling: policy management, alert handling, containment actions, and endpoint investigation support
  • Support vulnerability management execution: scanning coordination, triage, remediation tracking, and verification
  • Perform basic threat hunting and proactive detection improvements based on observed patterns and recurring incidents
  • Maintain incident response playbooks, operational SOPs, and case documentation with high-quality reporting
  • Support ISO 2700, SOC 2, PCI/DSS operational compliance through evidence collection, reporting, and control execution
  • Coordinate with platform, network, and application teams to resolve security events within defined timelines and processes
  • Fulltime
Read More
Arrow Right

Cyber Security Specialist

We are seeking a Cyber Security Specialist to support day-to-day cybersecurity o...
Location
Location
Pakistan , Islamabad
Salary
Salary:
Not provided
northbaysolutions.com Logo
NorthBay
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7–8 years of experience in SOC / Cyber Security Operations / Incident Response
  • Strong hands-on experience with SIEM operations (alerts, use-cases, dashboards, reporting)
  • Strong working experience with EDR tools and endpoint investigation fundamentals
  • Practical understanding of incident response lifecycle and operational documentation discipline
  • Experience coordinating remediation with cross-functional teams in hybrid/on-prem environments
  • Strong knowledge of ISO 27001, SOC 2, PCI/DSS operational control expectations (logging, access, incident handling, evidence)
Job Responsibility
Job Responsibility
  • Monitor and analyze security events using SIEM, including alert triage, correlation validation, and escalation handling
  • Execute incident response activities: triage, containment coordination, evidence capture, and support for root-cause analysis
  • Operate and manage EDR tooling: policy management, alert handling, containment actions, and endpoint investigation support
  • Support vulnerability management execution: scanning coordination, triage, remediation tracking, and verification
  • Perform basic threat hunting and proactive detection improvements based on observed patterns and recurring incidents
  • Maintain incident response playbooks, operational SOPs, and case documentation with high-quality reporting
  • Support ISO 2700, SOC 2, PCI/DSS operational compliance through evidence collection, reporting, and control execution
  • Coordinate with platform, network, and application teams to resolve security events within defined timelines and processes
  • Fulltime
Read More
Arrow Right