CrawlJobs Logo

Intelligence Community Security Monitor

amentum.com Logo

Amentum

Location Icon

Location:
United States , Falls Church

Category Icon
Category:

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Amentum is looking for security-minded and energetic individuals to start or extend their careers in national security. We work with customers in the Intelligence Community (IC) to provide vital mission support. Most assignment locations are within the Washington Metropolitan Area (WMA) with advancement opportunities to support other United States Government customers at home and abroad. Amentum may have the ability to sponsor qualified candidates for initial background investigation and upgrade clearances to meet the mission needs. If you are looking to get started in government contracting, security, team management, surveillance, or just looking to join the IC, this is a great opportunity for you to work on the front lines of national security!

Job Responsibility:

  • Assigned to various locations within the Northern Virginia area and will be responsible for the security and integrity of the facilities
  • Closely observe and surveil your surroundings and the activities of individuals working in and/or visiting sensitive facilities
  • Contribute to the safety and security of your work environment
  • Gain experience securing and surveying classified working areas and any sensitive documents

Requirements:

  • Must have an Active Top Secret US Government Clearance. Note: US Citizenship is required to maintain a Top-Secret Clearance
  • or ability to obtain one
  • High School diploma or equivalent
  • The ability to walk and stand for 8-12 hours per day
  • Possess the visual acuity to observe the activities of other individuals from a moderate distance
  • This position requires visual observation of personnel working or visiting customer facilities
  • Must successfully complete DCJS training within 90 days of hire
  • Possess good customer service skills
  • Must demonstrate satisfactory oral and written communication skills, including the ability to describe incidents via verbal briefing and written report
  • Must have reliable transportation to sites not accessible via public transportation or pickup/drop-off

Nice to have:

Prior security or military experience

What we offer:
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Additional health and welfare payment for each hour worked (SCA provision)

Additional Information:

Job Posted:
February 01, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Intelligence Community Security Monitor

Email Security Analyst

The Info Security Tech Sr Analyst is responsible for leading efforts to prevent,...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Technical and analytical expertise and experience (preferred 3+ years’ Information Technology/ Cybersecurity experience)
  • Understanding of and demonstrated experience with the tools and sources available to conduct email and threat analysis
  • Cross-functional understanding of email operations, security practices and the user experience
  • Ability to organize and appropriately prioritize multiple, ongoing tasks via efficient time management and forecasting
  • Project management skills a plus
  • Ability to work independently, as well as in team situations, to help internal and external customers achieve desired results
  • Strong written and verbal communication and presentation skills
Job Responsibility
Job Responsibility
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Analyze and provide oversight of analysis of email threats and controls
  • Develop and manage processes to track identified incidents to resolution
  • Develop metrics and reports as needed
  • Triage information received from vendors and process that information through previously defined internal workflows
  • Manage meetings with internal stakeholders to address open issues and identify process improvements
  • Actively engage in liaison activities with intelligence communities, industry associations, peer institutions, and information sharing communities
  • Apply developed communication and diplomacy skills to guide and influence decision makers
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients, and assets, by driving compliance with applicable laws, rules, and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing, and reporting control issues with transparency
  • Keep up to date with the ever-changing cyber security landscape to remain relevant and knowledgeable through internal and external certifications
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for supporting the executive ...
Location
Location
United States , Austin
Salary
Salary:
95000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of 3 years of recent protective intelligence experience supporting executive protection teams and principals, or 5+ years of equivalent military, law enforcement, or intelligence experience.
  • Bachelor’s degree in Intelligence Studies, International Relations, Homeland Security, or related field (or equivalent operational experience).
  • Formal Intelligence Training certification (Military, Government, Association, or Private Sector) required.
  • Advanced training in threat assessment, travel risk management, or protective intelligence preferred.
  • Skilled in open-source (OSINT) and social media research, threat monitoring, and incident verification.
  • Experience producing protective intelligence products—threat assessments, travel risk reports, route/residence assessments, and pre-travel advisories.
  • Ability to collect, vet, and analyze information using the intelligence cycle to create accurate, actionable, bias-mitigated reporting.
  • Strong understanding of global security, geopolitical risks, terrorism, crime, and crisis response as they relate to executive travel and operations.
  • Proven ability to support EP operations in real time, providing clear, concise, and timely threat updates to decision-makers.
  • Proficiency in Microsoft Office Suite and familiarity with protective intelligence platforms (e.g., Factal, Dataminr, Babel Street, LifeRaft, Echosec).
Job Responsibility
Job Responsibility
  • Threat Monitoring & Early Warning: Continuously monitor open sources, social media platforms, dark web, and client-specific intelligence tools for threats or hostile surveillance activity directed at principals, their families, residences, travel plans, or affiliated events.
  • Protective Research & Threat Analysis: Conduct in-depth research and analysis on persons of interest (POIs), hostile actors, and groups with the intent or capability to target principals. Assess motivations, capability, opportunity, and intent to identify potential attack indicators.
  • Travel Risk Intelligence: Provide proactive intelligence support to executive protection teams during domestic and international travel, including country risk assessments, route reconnaissance, hotel and venue security reviews, and incident monitoring during trips. Deliver timely updates to traveling principals and EP teams.
  • Protective Operations Support: Deliver actionable, real-time intelligence to EP teams in support of principal movements, protective advances, route planning, and residence/event security. Maintain constant threat environment awareness and communicate relevant changes.
  • Geopolitical & Environmental Risk Tracking: Monitor global and regional security issues, including terrorism, political unrest, crime trends, natural disasters, and health risks—that could affect principals’ safety during travel or at residences/events.
  • Actionable Reporting & Products: Produce timely, clear, and actionable intelligence products including: Threat assessments (strategic and tactical), Travel risk assessments (pre-trip and in-trip updates), Situation reports (SITREPs) and incident summaries, Route and location assessments (residences, hotels, venues, offices)
  • Threat Mitigation Recommendations: Provide practical, proportionate recommendations to EP teams on how to mitigate identified threats, risks, and vulnerabilities. Offer clear triggers and indicators for escalation or operational adjustments.
  • Database & Knowledge Management: Maintain a structured, cross-referenced database of threats, POIs, incidents, and lessons learned to support future operations and ensure continuity of protective intelligence programs.
  • Confidentiality & Security: Safeguard sensitive client information, personal identifiers, and operational details at all times, adhering to strict confidentiality and need-to-know principles.
  • Operational Integration: Serve as the intelligence liaison to executive protection, event security, and corporate security teams, ensuring protective intelligence is integrated into all protective operations.
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right

Facility Security Engineer

Astrion is seeking a Facility Security Engineer to join our team in Colorado Spr...
Location
Location
United States , Colorado Springs
Salary
Salary:
120000.00 - 160000.00 USD / Year
astrion.us Logo
Astrion
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10-12 years total experience
  • Minimum 5-7 years’ experience with SCI or SAP programs
  • Minimum of 3 years’ relevant experience with SAP programs
  • Minimum 3 years’ experience maintaining physical security program
  • In-depth knowledge of Intelligence Community Directive (ICD) 705 and its technical specifications for the design, construction, and accreditation of Sensitive Compartmented Information Facilities (SCIFs)
  • Familiarity with the National Industrial Security Program Operating Manual (NISPOM) and 32 CFR Part 117
  • Experience with personnel security, including managing SCI indoctrination, processing clearances, and conducting security briefings
  • Knowledge of procedures for handling and protecting classified material
  • A thorough understanding of TEMPEST standards and countermeasures
  • Must be familiar with security policy/manuals and the appropriate ICDs, DOD Manuals and other guiding policy documents
Job Responsibility
Job Responsibility
  • Provide multi-disciplined security support to a customer’s facility and organization
  • Provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities
  • Provide multi-disciplinary security support, including specialized analytical/program protection support
  • Act as the Government SAP Security Officer when needed
  • 705 Security Compliance Management: implementation, management, and continuous monitoring of security controls within our Sensitive Compartmented Information Facilities (SCIFs)
  • Clearance management for the full lifecycle of security clearances for Program cleared personnel
  • Implementing and managing tempest accreditation and maintaining countermeasures against compromising emanations from electronic equipment
  • Classification reviews of inbound and outbound correspondence
  • Assist in the maintenance of a document accountability database and associated correspondence
  • Processing inbound and outbound classified mail and receipt records
What we offer
What we offer
  • Competitive salaries
  • Continuing education assistance
  • Professional development
  • Multiple healthcare benefits package options
  • 401K with employer matching
  • Competitive time off policy along with a federally recognized holiday schedule
Read More
Arrow Right

Threat Simulation Analyst

We're looking for a Threat Simulation Analyst to join our Group CISO team. You'l...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
legalandgeneral.com Logo
LegalAndGeneral
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of Strategic, Operational and Tactical threat intelligence
  • A current understanding of cyber security incidents and how they could be practised within exercises to test the resilience of L&G
  • Experience in the creation and implementation of short-term and long-term plans for developing a programme of exercises
  • Threat intelligence and/or Information Technology industry certification (CREST, SANS or equivalent) would be great
  • Prior experience of delivering tabletop exercises or crisis simulations would be a huge plus!
Job Responsibility
Job Responsibility
  • Developing threat simulation exercises and scheduling quarterly (at least) exercises with all Group Business Units
  • Reviewing threat intelligence, data and trends and creating CSIRT exercises that support the development of mitigations
  • Developing and creating metrics by which progress of the threat simulation exercises can be demonstrated
  • Leading regular reviews with internal stakeholders to obtain and ensure that current and possible threats are exercised to best practice
  • Conducting threat intelligence research utilising open source, paid, community and national feeds to monitor and assess current and emerging threats that could pose a risk to L&G
  • Coordinating with other security and operational teams to ensure any threat assessments and actions are progressed as required
  • Producing written or verbal threat intelligence artifacts as required, identifying trends within physical security, cyber security or geo-politics
  • Defining, developing and delivering processes and systems to ensure a consistent and good level of service that means divisions can comply with all regulatory and security requirements
What we offer
What we offer
  • The opportunity to participate in our annual, performance -related bonus plan and valuable share schemes
  • Generous pension contribution
  • Life assurance
  • Healthcare Plan (permanent employees only)
  • At least 25 days holiday, plus public holidays, 26 days after 2 years’ service. There’s also the option to buy and sell holiday
  • Competitive family leave
  • Participate in our electric car scheme, which offers employees the option to hire a brand-new electric car through tax efficient salary sacrifice (permanent employees only)
  • There are the many discounts we offer – both for our own products and at a range of high street stores and online
  • In 2023, some of our workspaces were redesigned. Our offices are great spaces to connect and collaborate and have your wellbeing at the heart
  • Fulltime
Read More
Arrow Right
New

Cyber Threat Intelligence Analyst

The Intelligence Lead Analyst is a senior level professional responsible for dri...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6-10 years of relevant experience
  • Working knowledge in one or more of the following areas: Advanced Persistent Threat, Third Party Risks/Threats, Cybercrime, Extremist Groups and Cyber Terrorists, Hacktivism, Distributed Denial of Service attacks, Fraud, Malware, Mobile Threats
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
  • Master’s degree preferred
Job Responsibility
Job Responsibility
  • Analyze regional threat data and determine a correlation if any, to existing intelligence requirements
  • Monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Research and identify malicious activity by performing post-mortem analysis on logs, traffic flows, and other activities
  • Conduct intrusion analyses to ascertain the impact of an attack, and develop mitigation techniques for future attacks
  • Evaluate networks and programs to assess potential weaknesses and points of entry
  • Analyze and present to senior leadership discovered patterns to forecast future cyber-attacks and their potential impact
  • Liaise with intelligence communities, law enforcement, industry partners, peer financial institutions, and information sharing communities
  • Triage, process, analyze, and disseminate intelligence alerts, reports, and briefings
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency.
  • Fulltime
Read More
Arrow Right

Threat Analyst

As a Threat Analyst at NTT DATA, you will be responsible for researching and ana...
Location
Location
Romania , Sibiu
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, International Relations, or Intelligence Studies strongly preferred
  • Minimum 1–3 years of experience in cybersecurity or IT security roles
  • Advanced scripting capabilities (Python, PowerShell preferred)
  • Strong proficiency with threat intelligence platforms like MISP, ThreatConnect, or Anomali, Security Alliance
  • Deep familiarity with MITRE ATT&CK framework, dark web monitoring techniques, and attack simulation techniques
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation
  • Strong analytical and problem-solving abilities
  • Excellent written and verbal communication skills
  • Attention to detail and accuracy in technical analysis
  • Direct experience working in government, military, or intelligence organizations advantageous
Job Responsibility
Job Responsibility
  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle
  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation
  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required
  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies
  • Represent NTT DATA at external security forums and intelligence-sharing communities
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or joining our accredited Coaching School
  • Epic parties or themed events
  • Fulltime
Read More
Arrow Right

Business Intelligence Developer

The CTI Enterprise Analytical Services (EAS) organization is actively recruiting...
Location
Location
India , Pune
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience with Business Intelligence tool or data federation tools such as Starburst developer or administrator
  • 3+ years of Linux, Shell scripting, Ansible experience
  • 8+ years overall IT experience
  • Knowledge of the Hadoop ecosystem with experience in Hive, Spark, etc. is a plus
  • Knowledge of Java or any programming language is a plus
  • Good interpersonal skills with excellent communication skills - written and spoken English
  • Able to interact with client projects in cross-functional teams
  • Good team player interested in sharing knowledge and cross-training other team members and shows interest in learning new technologies and products
  • 5+ years of hands-on experience in setting up security (authentication and authorization) for Business Intelligence or data federation products
  • Experience with container technologies, Kubernetes, and cloud architectures, including some exposure to public cloud platforms such as AWS, GCP
Job Responsibility
Job Responsibility
  • Deliver the tooling and capabilities needed to enable data & analytics services such as Starburst, Tableau on massive, distributed data sets
  • Understand Engineering needs including those required to build, maintain, and operate the system through all phases of its life
  • Create and maintain continuous integration and deployment processes including testing and monitoring to ensure the solution is reliable and measurable
  • Take full ownership of designing solutions, and building blueprints, prototypes, and frameworks to drive enablement of new capabilities
  • Collaborate with cross-functional teams to build a portfolio of capabilities for recommendation and use in new product developments
  • Publish best practices, configuration recommendations, design patterns, tool/technology selection methodologies, and playbooks for Engineering and user communities
  • Collaborate with cross-functional Engineering teams to build a portfolio of capabilities to recommend and use in analytical product development across Citi lines of Businesses
  • Enable Hybrid cloud implementation along with security for Business Intelligence products
  • Enable Business Intelligence products on external Cloud platforms as SaaS or PaaS solutions and integrate with various Cloud and on-prem data sources
  • Build reusable security and deployment framework for Business Intelligence services enabled on Cloud and on-prem
  • Fulltime
Read More
Arrow Right
New

Cybersecurity Community Champion

The Cybersecurity Community Champion is a technical, customer-facing role design...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong background in cybersecurity engineering, security operations, or IT security
  • Hands-on experience with modern security challenges (malware, ransomware, lateral movement, endpoint protection, Zero Trust concepts)
  • Deep understanding of Zero Trust architecture and philosophy
  • Comfortable explaining complex technical concepts clearly and respectfully
  • Strong written communication skills
  • able to engage thoughtfully in public forums
  • Ability to balance being helpful and educational with appropriate product advocacy
  • High integrity and strong judgment when engaging publicly on behalf of the brand
Job Responsibility
Job Responsibility
  • Actively engage with cybersecurity practitioners across online communities (forums, social platforms, comment threads, Discord/Slack groups, etc.)
  • Provide thoughtful, technically accurate responses to real-world security questions and challenges
  • Advocate for Zero Trust principles, helping the community understand prevention-first security approaches
  • Represent ThreatLocker as a knowledgeable, approachable expert
  • Identify opportunities where ThreatLocker solutions are relevant and introduce them naturally and ethically
  • Monitor community sentiment, emerging topics, and common pain points to inform marketing, product, and leadership teams
  • Collaborate with marketing, product, and threat intelligence teams to ensure messaging is accurate and aligned
  • Participate in industry conversations, live events, AMAs, and community initiatives as needed
  • Help build long-term trust and brand credibility within the cybersecurity ecosystem
Read More
Arrow Right