CrawlJobs Logo

Intrusion Analyst 3

realmone.com Logo

RealmOne

Location Icon

Location:
United States , Central Maryland

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

159000.00 - 209000.00 USD / Year

Job Description:

We are looking for an Intrusion Analyst to analyze target digital network data and identify unauthorized activities using SIGINT and computer network defense resources. You will categorize network traffic, document malicious tactics, techniques, and procedures, and develop mitigation strategies to protect our systems.

Job Responsibility:

  • Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
  • Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
  • Categorize traffic as benign, suspicious, or malicious activity
  • and document malicious tactics, techniques, and procedures (TTPs)
  • Develop and implement mitigation strategies
  • Have a network and/or host-based focus

Requirements:

  • Master’s degree with 6 years of relevant experience
  • Bachelor’s Degree with 8 years of relevant experience
  • Associates degree with 10 years of experience
  • Bachelor’s Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university
  • Relevant experience must be in malware analysis and programming experience in C, C#, C++, Java, Perl, or Python is preferred
  • CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required
  • Position requires active Security Clearance with appropriate Polygraph
What we offer:
  • Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Access to FREE 24/7 learning via Udemy
  • Opportunities to participate in tech councils, industry initiatives, etc.
  • $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Flexible work schedules
  • Generous referral bonus program
  • Employee appreciation + family-friendly corporate events

Additional Information:

Job Posted:
January 07, 2026

Employment Type:
Fulltime
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Intrusion Analyst 3

IT Security Analyst

We are looking for an experienced IT Security Analyst to join our team in Salem,...
Location
Location
United States , Salem
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3 years of experience in IT Security managing security systems
  • Strong understanding of cybersecurity protocols, including intrusion detection systems, firewalls, and vulnerability management
  • Proficiency in tools and strategies for endpoint security and network protection
  • Bachelor's degree in a related field such as Computer Science, Information Technology, or Cybersecurity
  • Familiarity with cloud technologies and configuration management practices
  • Demonstrated ability to audit and analyze security policies and recommend improvements
  • Knowledge of advanced security measures, including AB testing and threat detection
  • Excellent problem-solving skills and ability to work collaboratively within a team environment
Job Responsibility
Job Responsibility
  • Develop, implement, and maintain the organization's IT security program framework to ensure compliance with industry standards
  • Evaluate emerging security technologies and recommend solutions to counteract potential threats and protect sensitive information
  • Identify vulnerabilities within IT systems and deploy security initiatives to mitigate risks across the organization
  • Create and enforce company-wide information security policies, standards, guidelines, and procedures
  • Monitor and manage network vulnerabilities, ensuring the implementation of robust security measures
  • Configure and maintain tools and strategies for endpoint security, protecting devices from unauthorized access or threats
  • Collaborate with teams to audit and improve systems, staying ahead of cybersecurity challenges
  • Conduct regular assessments and testing of intrusion detection systems to ensure optimal performance
  • Provide expertise in configuration management and analyze security requirements for cloud technologies and firewall systems
  • Support organizational efforts to enhance cybersecurity awareness and practices across all departments
What we offer
What we offer
  • medical
  • vision
  • dental
  • life and disability insurance
  • 401(k) plan
  • Fulltime
Read More
Arrow Right

Cryptologic Cyber Planner 3

We are seeking a dynamic Cryptologic Cyber Planner with hands-on experience in s...
Location
Location
United States , Central Maryland
Salary
Salary:
141000.00 - 189000.00 USD / Year
realmone.com Logo
RealmOne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctoral Degree with 4 years of relevant experience
  • Master’s degree with 6 years of relevant experience
  • Bachelor’s Degree with 8 years of relevant experience
  • Associates degree with 10 years of experience
  • HS diploma or GED with 12 years of experience
  • Bachelor’s Degree in any field is acceptable
  • Relevant experience must be in an area directly related to a DoD mission (e.g. collection, cyber and intelligence analysis) and/or similar mission and include strategic and/or operational level planning (e.g. joint operations)
  • External engagement/collaboration experience (e.g. participation in cross-Agency working groups, JDA, field experience, and external customer support
  • Position requires active Security Clearance with appropriate Polygraph
Job Responsibility
Job Responsibility
  • Strategic and operational planning
  • Driving collaboration across agencies
  • Working closely with external partners to deliver impactful cyber and intelligence solutions
  • Shaping mission success through innovative approaches in collection, analysis, and external customer engagement
  • Supporting a team of Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers
What we offer
What we offer
  • Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Access to FREE 24/7 learning via Udemy
  • Opportunities to participate in tech councils, industry initiatives, etc.
  • $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Fulltime
Read More
Arrow Right

SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years of relevant experience in Cyber Fraud or SOC
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Perform monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Cyber Security Engineer

Location
Location
Japan , Tokyo
Salary
Salary:
5000000.00 - 8000000.00 JPY / Year
https://www.randstad.com Logo
Randstad
Expiration Date
March 31, 2027
Flip Icon
Requirements
Requirements
  • Good knowledge in security solutions such as anti-virus software, intrusion detection, firewalls, content filtering and file integrity monitoring
  • Understanding security assessments and their results (e.g. issues identified in vulnerability scans and penetration tests etc.) and experience in fixing detected vulnerabilities to maintain a high-security standard
  • 3 years working experience in IT security engineering or security analyst
  • Experience with risk assessment methodologies
  • 3 years system administration experience supporting or administrating Linux
  • Working experience with bash scripts and versioning tools such as Git
  • Good working knowledge of Kubernetes and Docker
Job Responsibility
Job Responsibility
  • Operate the group’s host intrusion detection system – daily monitoring, alert raising, troubleshooting, maintenance, scale-out
  • Operate department-owned security tools
  • Conduct periodic security scans to pre-emptively find vulnerabilities
  • Implement open-source/third-party tools proof of concepts to assist in detection, prevention and analysis of security threats
  • Suggest implementation of protections (patch management, compensatory controls)
  • Analyze ACLs/firewall rules, provide suggestions on configuration and possible improvements
  • Advise product development teams on compliance-related questions
  • Act as a bridge between security alerts from SOC and affected products owner and development team
What we offer
What we offer
  • 健康保険,厚生年金保険,雇用保険
  • 日曜日,土曜日,祝日
Read More
Arrow Right

Senior Consultant - Proactive Services

As a Senior Consultant in Unit 42 you will have the opportunity to work across a...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management
  • Demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program
  • Possess a deep technical knowledge in Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms
  • Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments
  • Ability to perform detailed assessments, identify areas for improvement and make recommendations to transform an organisation's cyber security operations
  • Demonstrated experience in improving an organisations security operations capabilities
  • Experience in conducting threat hunting and/or compromise assessments
  • Relevant industry certifications including GIAC Defensible Security Architect (GDSA), GIAC Intrusion Analyst (GCIA), GIAC Continuous Monitoring (GMON), CISSP
  • Understanding of cyber risk frameworks or industry standards such as 800-53, ISO 27001/2, PCI, CIS 18, CMMC
  • 3+ years of experience performing cloud security advisement and risk assessments
Job Responsibility
Job Responsibility
  • Work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security
  • Deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape
  • Fulltime
Read More
Arrow Right

Computer Network Digital Analyst 3

We are seeking a Computer Network Digital Analyst to support the CSD primary Mis...
Location
Location
United States , Central Maryland
Salary
Salary:
141000.00 - 183000.00 USD / Year
realmone.com Logo
RealmOne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • An Associate’s Degree with 10 years of experience
  • A Bachelor’s Degree with 8 years of experience
  • A Master’s Degree with 6 years or experience
  • A PhD with 4 years of experience
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree
  • Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Position requires active Security Clearance with appropriate Polygraph
  • Relevant experience with SIGINT and AMOD tools
  • Fluent with stored communications and passive resources
  • Demonstrative experience in crafting analytics to correlate events and identify and isolate malicious campaigns
Job Responsibility
Job Responsibility
  • Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats
  • Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing, and the associated hardware and software
What we offer
What we offer
  • Healthcare Coverage + Insurance: Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • Retirement + Savings: 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • Paid Time Off + More: 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Career Growth + Development: Access to FREE 24/7 learning via Udemy – Opportunities to participate in tech councils, industry initiatives, etc. – $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Flexible work schedules
  • Generous referral bonus program
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst Level 3

As a Computer Network Defense Analyst (CNDA), you will use information collected...
Location
Location
United States , Wahiawa
Salary
Salary:
146300.00 - 176700.00 USD / Year
elevi.net Logo
ELEVI Associates
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Excellent communication and collaboration skills to interface across NSA
  • Be able to ACTIVELY participate in leadership/IC exchanges
  • Strong verbal and written communication skills
  • Author and read highly technical reports
  • Be able to identify intrusions and actors, current intrusion sets, and commercial Cybersecurity Firms
  • Need an understanding of Virtual Private Servers
  • VPNs
  • The Diamond Model
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Your work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • healthcare
  • wellness
  • financial
  • retirement
  • family support
  • continuing education
  • time off benefits
Read More
Arrow Right