Cyber Analyst Jobs in the United States
Leidos
$87100 - $157450
Ashburn, VA
The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. As a member of this highly technical digital forensics team supporting U.S. Customs and Border Protection (CBP), you will be responsible for in-depth cyber forensics, root cause analyses, spillage investigations, and ensure chain of custody during incident investigations in support of the protection of the customers’ systems, networks, and assets.
Cherokee Federal
Quantico, VA
Cherokee Insights is seeking a Cyber Analyst to provide mid-level cyber analysis to identify, assess, and disrupt threats to cleared industry, cleared personnel, DOD, and Defense Counterintelligence and Security Agency (DCSA). Has working knowledge using complex analytic methodologies, such as structured analytic techniques or alternative approaches, to examine biases, assumptions, and theories to eliminate uncertainty, strengthen analytic arguments, and mitigate surprise.
Calibre Systems
$70000 - $78000
Ft. Irwin, CA
The Cyber Social Media / OSINT Analyst provides open-source intelligence (OSINT) support and designs, develops, maintains, and troubleshoots secure web-based platforms hosted on NTC networked application servers. CALIBRE is seeking a Cyber Social Media / Open-Source Intelligence (OSINT) Analyst to support rotational training at the National Training Center (NTC).
Keenbee Talent Soluitions
Colorado Springs, CO
Develop mission thread data supporting mission owners, cybersecurity personnel, defensive cyber operators, and program teams in assessing acceptable mission risk caused by cybersecurity deficiencies. The ideal candidate brings deep experience in mission analysis, cybersecurity, and space mission systems, with the ability to translate technical findings into actionable insights for mission owners, cyber operators, and program offices.
Kforce Inc.
$25 - $30
Troy, MI
Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This onsite contract position is perfect for someone early in their cybersecurity journey and eager to gain real-world experience alongside seasoned professionals.
PlanIT Group
Raleigh, NC
4. Support deploying, configuring, testing, and maintaining Security Orchestration, Automation, and Response (SOAR) platform, and tools integrated with AI/ML capabilities to enhance threat detection, analysis and response. • Perform analysis on hosts running on a variety of platforms and operating systems, to include, but not limited to, Microsoft Windows, UNIX, Linux, as well as embedded systems and mainframes.
Kforce Inc.
$55 - $60
Juno Beach, FL
Vulnerability Management & Cyber Analysis: Serve as a liaison between cybersecurity, IT operations, engineering, and business stakeholders to ensure vulnerabilities are clearly understood, prioritized, and remediated. Summary: We are seeking a Vulnerability Cyber Technical Business Analyst to support our cybersecurity program with a strong focus on vulnerability management, reporting, analytics, and cross functional coordination.
Kforce Inc.
$55 - $60
Juno Beach, FL
Support cybersecurity initiatives with a focus on penetration testing-including understanding test objectives, interpreting results at a high level, and coordinating seamless handoffs to the penetration testing team. The ideal candidate is a self-starter, able to translate complex technical concepts into clear business language, and comfortable working in fast moving, security focused environments.
Kforce Inc.
$55 - $60
Juno Beach, FL
Summary: The Senior IT Business Systems Analyst will support Cybersecurity Strategic Initiatives by partnering with business and technology stakeholders to elicit, analyze, and document requirements, and to support the analysis and improvement of existing business processes and systems. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs.
JT4 LLC
Las Vegas, NV
Analytical disciplines that align with on-going technical services include satellite and terrestrial telecommunications, information operations, computer networking, digital signal processing, radio frequency (RF) / Electronic Warfare (EW) operations (air and ground-based), statistical analysis, software development, electrical engineering, and aeronautical operations. Completion of technical training and at least 20 years of related experience; or an associate's degree and 16 years of related experience; or a related bachelor's degree (engineering, math, computer science, or physics) and 14 years of related experience; or a related master's degree and 10 years of related experience.
The Computer Merchant, LTD.
$100000 - $115000
Concord, MA
Key Responsibilities: Senior cloud security architecture design and implementation, multi-disciplinary team leadership, enterprise cloud cybersecurity framework alignment, integration of new architectural capabilities, systems engineering lifecycle support. * While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations.
The Computer Merchant, LTD.
$75 - $80
North Quincy, MA
Strong analytical, communication, and presentation skills are critical, as the role requires gathering information from technical subject matter experts and transforming it into documentation and artifacts that support operational consistency, audit readiness, and strategic decision-making . The successful candidate will work closely with members of the EOHHS CISO's Office, IT teams, and agency stakeholders to analyze existing security practices, identify process gaps, and translate informal or undocumented procedures into clear, structured documentation.
Tech Providers Inc.
$52.86
Phoenix, AZ
The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. The focus of the role is not on building the platform from scratch, but on ensuring it is properly designed, securely configured, monitored, and defensible from both a technical and governance perspective.
The Computer Merchant, LTD.
$85000 - $115000
Concord, MA
While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations. This role focuses on evaluating security risks, defining requirements, and supporting the design and implementation of secure cloud solutions.
System One
Columbia, SC
You’ll join a team that delivers mission-critical solutions for government clients, helping public sector organizations stay ahead of emerging cyber threats. System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America.
DCS Corporation
Las Vegas, NV
Provide Advisory & Assistance Services (A&AS) to the United Operational Test Team (UOTT) and the Air Dominance Division shaping and managing the end-to-end data infrastructure and analytic processes that drive operational test and evaluation (OT&E). Primarily assist Operations and Data Analysts in managing and improving data workflows by organizing data, streamlining database processes, and optimizing tools on existing data infrastructures.
Cherokee Federal
Reston, VA
Cherokee Strategic Edge is seeking an Emerging Disruptive Technologies (EDT) Analyst that will be responsible for producing assessments projecting the discovery, development, and deployment of advanced technologies and the potential impact to Defense Critical Infrastructure and U.S. nuclear weapons worldwide. As a trusted partner for more than 60 federal clients, Cherokee Federal LLCs are focused on building a brighter future, solving complex challenges, and serving the government’s mission with compassion and heart.
Integrative Staffing Group, LLC
Huntsville, AL
Mid Level SOC AnalystHuntsville, ALDirect PlacementUp to $110k yearlyRelocation assistance availablePrimary PurposeOur company is seeking a SOC Operations Analyst/Watch-Floor Operations to join our high performing cyber team in support of a large SOC enterprise environment. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Integrative Staffing Group, LLC
Huntsville, AL
Mid Level SOC AnalystHuntsville, ALDirect PlacementUp to $110k yearlyRelocation assistance availablePrimary PurposeOur company is seeking a SOC Operations Analyst/Watch-Floor Operations to join our high performing cyber team in support of a large SOC enterprise environment. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
L3Harris Technologies
Greenville, TX
The candidate must have demonstrated expertise in airspace/range management, FAA certification requirements and systems engineering disciplines associated with a flight test/demonstration program to include requirements definition, design reviews and documentation, and systems integration. Define test requirements, develop test procedures and test plans, execute and manage ground and flight test events, range and airspace management, data collection and analysis, instrumentation of test assets and documentation/ presentation of test results.
Kforce Inc.
$55.25 - $74.75
Huntsville, AL
Perform static and dynamic analysis of known malicious and unknown binary files, reverse engineering of compiled software, functional analysis of source code/scripts, and/or hardware/firmware analysis. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs.
CFS
$70000 - $95000
Deerfield, IL
Our client, a well-established and growing family-owned organization, is seeking an experienced Senior Risk Analyst to oversee and enhance enterprise risk and insurance programs across a multi-site national operation. Key Responsibilities of the Senior Risk Analyst: Lead and manage the company’s comprehensive insurance programs (property, general liability, auto, workers’ compensation, umbrella/excess, cyber, etc.).
VT Industries Inc
Holstein, IA
Design and deliver engaging, role-specific cybersecurity awareness training programs that cover current threats (AI-enhanced phishing, deepfakes, business email compromise) and emerging challenges such as secure use of generative AI and autonomous agentic systems. Proactively monitor networks, endpoints, cloud platforms, OT/IoT systems, and AI/agentic environments using advanced XDR, SIEM, SOAR, and behavioral analytics tools to detect and respond to threats in real time.
Kforce Inc.
$55 - $60
West Palm Beach, FL
The position focuses on leveraging email security platforms to detect, investigate, and respond to email-based threats including phishing, business email compromise (BEC), malware delivery, and account takeover attacks targeting the company. Overview: The client is seeking a Senior Cybersecurity Email Analyst to join our Cyber Command Center, focusing on email threat detection, analysis, and response capabilities.
Kforce Inc.
$48 - $52.25
Juno Beach, FL
Duties: As a Senior Business Analyst, you will be responsible for providing support and aiding in the enhancing and deployment of new and existing technologies; In addition, you will recommend process and technology-related solutions or improvements to protect the company from cyber security vulnerabilities and threats. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs.
Leidos
$87100 - $157450
Lorton, VA
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. Motivated self-starter with strong written and verbal communication skills for collaborating with technical and non-technical stakeholders, and the ability to create complex technical reports on analytic finding .
Artech LLC
$70 - $75
CHANDLER, AZ
You will review and analyze complex multi-faceted, larger scale or longer-term Information Security Analysis challenges that require in-depth evaluation of multiple factors including intangibles or unprecedented factors. Contribute to the development and implementation of a sustainable CI Lifecycle Management process, including assessment cadence, ownership models, remediation tracking, and sunset considerations.
Vaco LLC
$40 - $60
Los Angeles, CA
Determining compensation for this role (and others) at Vaco by Highspring depends upon a wide array of factors including but not limited to: the individual’s skill sets, experience and training; licensure and certification requirements; office location and other geographic considerations; other business and organizational needs. Role Overview: The Information Security Analyst is a hands-on role within the Information Security function, partnering closely with IT and business stakeholders to ensure consistent, measurable delivery of security services.
Axelon Services Corporation
Arnold, MD
This role is ideal for a cybersecurity professional with experience in modern cyber risk management and securing enterprise systems, particularly within a shared Electronic Health Records (EHR) environment between the Department of Defense (DoD) and the Department of Veterans Affairs (VA). Utilize hands-on experience with cybersecurity tools, network topologies, intrusion detection systems, PKI, and secured networks to assess and mitigate risks.
VSolvit LLC
$120000
undefined, undefined
Founded in 2006, VSolvit (pronounced 'We Solve It') is a technology services provider that specializes in cybersecurity, cloud computing, geographic information systems (GIS), business intelligence (BI) systems, data warehousing, engineering services, and custom database and application development. Some of these include, but are not limited to, adhering to normal working hours, meeting deadlines, following company policies as outlined by the Employee Handbook, communicating regularly with assigned supervisor(s), staying focused on the assigned tasks, and completing other tasks as assigned.
Leidos
$107900 - $195050
Lorton, VA
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. Motivated self-starter with strong written and verbal communication skills for collaborating with technical and non-technical stakeholders, and the ability to create complex technical reports on analytic finding .
Base One Technology
Arlington, VA
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Oglethorpe Power
Tucker, GA
u00b7 Application: At lower levels, this is data entry and collection; at higher levels, it is the \'sole responsibility\' for the administration and implementation of these critical reliability systems. Directs resources as required to address immediate post-operational needs and supports real-time operational queries.
Dunhill Professional Search
$51000 - $63000
Chandler, AZ
Technotopia Solutions LLC
$45 - $55
New Brunswick, NJ
Business Requirements, JIRA, Analytical Thinking, Business Processes, Communication Skills, Problem Solving, Attention to Detail, Business Process Improvement, Requirements Analysis, Automation, SQL Databases, Cyber Security, Enterprise Resource Planning, Business Excellence, User Stories, Testing Skills, Agile Methodology, Software Engineering, Acceptance Testing, Alteryx, Backlogs, Customer Experience, Databricks, Trade Compliance, Transportation Management, Business Planning, Information Engineering, Metrics, System Configuration, Systems Development Life Cycle, Technical Support As a Technical Product Analyst (TPA), you will support the Technical Product Owner (TPO) in translating business needs for Global Trade Compliance products to ensure alignment with business objectives.
DivIHN Integration Inc
$87
Glendale, AZ
Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent. Manufacturing experience supporting production IT systems (both hardware and software) and solutions development to support production needs.
Viva USA Inc.
$57 - $62
undefined, undefined
These features include new Custom Reports/CCL & Report/CCL Alterations, Report Design, new MPages, validation of Service Packages, management of Printers and RRD Hardware, end user training, new user accounts, interface issues outside of the Cerner feed and workflow changes. Typically involved in problem management activities which include performing diagnosis, troubleshooting and critical thinking to solve or fulfill needs of medium and high complexity; utilizing knowledge management and escalate issues when necessary.
DivIHN Integration Inc
$29
Milwaukee, WI
General knowledge of generally accepted accounting principles (GAAP), Federal Energy Regulatory Commission (FERC) accounting, various software packages including SAP, Excel and Word. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.
The Computer Merchant, LTD.
$80 - $85
Washington, DC
A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring, identifying and analyzing anomalous activities with familiarity in host-based tools, intrusion detection systems, intrusion analysis functions, security information event management (SIEM) platforms, endpoint threat detection tools, and ticket management in a SOC Operations environment. * While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations.
US Tech Solutions
$60 - $80
Concord, CA
The Monitoring & Response Team (also known as M&R) is the 24x7 security operations team that is essentially client’s first line of defense that is continuously preventing, detecting, analyzing, and responding to cybersecurity events to improve the organization’s security posture. Responsible for the delivery of information security services including intelligence research, threat assessment, security event monitoring/analysis, vulnerability management and security tool administration in support of client enterprise security goals and objectives.
ECLARO
$65 - $70
Arlington, TX
This position serves as a subject matter expert for CIAM technologies supporting external users, applications, and digital services, while also contributing to broader security operations including but not limited to vulnerability management, network security, email security, and privileged access management (PAM). Position Overview:The Senior Security Analyst – Customer Identity & Access Management (CIAM) is a senior-level cybersecurity role responsible for securing, administering, and advancing the organization's customer-facing identity, authentication, and access platforms.
Lucas Group
Jersey City, NJ
Collaborate with cross-functional teams, including engineering, product, cyber risk controls and business stakeholders, to define program scope, objectives, and deliverables, ensuring alignment with overall business goals. Advanced expertise in stakeholder management, with the ability to establish productive working relationships and influence decision-making across cross-functional teams and clients.
HTC Global Services Inc
Cayce, SC
Leads product release management functions which may include developing test plans, perform test plans, facilitate end user for end user acceptance testing and may develop application validation scripts for ongoing operations team. Typically involved in problem management activities which include performing diagnosis, troubleshooting and critical thinking to solve or fulfill needs of medium and high complexity; utilizing knowledge management and escalate issues when necessary.
ABCS, Inc.
$40 - $46
Phoenix, AZ
CISSP, CCSP, GSTRT, GSNA, or CAP certification. Risk Management Framework (RMF).
ABCS, Inc.
$45 - $46
Phoenix, AZ
The team member will help develop plans and materials to support user adoption, training, and customer service, working through direct and regular contact with users from other divisions, programs, and service units to provide regular insight and guidance in prioritizing enhancements for the data systems. The team member will work with other personnel across departments to define requirements for projects, identify data dependencies and relationships to develop logical and physical data models, data flows and system activity diagrams, and write specifications for managing enterprise information policies.
DCS Corporation
Las Vegas, NV
Assist customer preparing and reviewing documentation to include System Security Plans (SSPs), Risk Assessment Reports, Authorization to Operate (ATO) packages, policies, and Security Controls. Providing Information System Security Operations support, integration services, technical assessments, and solutions to enable cybersecurity.
V2Soft
Farmers Branch, TX
V2Soft is a global leader in IT services and business solutions, delivering innovative and cost-effective technology solutions worldwide since 1998. Beyond our work, we actively support local communities and non-profits, reflecting our core values.
Booz Allen Hamilton INC.
Bremerton, WA
This PM willwork acrossthe end-to-end product lifecycle, from identifying high-impact AI use cases, such as new patterns to detectliving-of-the-land (LOTL)attacks, and defining the technical roadmap, to collaborating with engineering and data science teams to build trustworthy, auditable features, and finally, partnering with go-to-market teams to ensure the product successfully meets the complex security and audit requirements ofour mostregulated customers. You willexperience theenergyof a start-up,with the resources, mentorship, and stability of an established tech companywhilebeingable to look acrossindustry&capability areas to craftnewoutcomesleveragingthedeep catalog of existing technologyand customersolutions.
OKTA
Bellevue, WA
Incident Command & Escalation: Serve as the senior leader during AMER-based security events, empowering your team to lead investigations while providing the air cover and strategic guidance they need to succeed. The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, Illinois, New York, and Washington is between: $193,000—$289,000 USD.
Signature Performance, Inc.
$130000 - $160000
Seattle, WA
In the role of Cyber Security Engineer, you will be responsible collecting and correlating security logs, developing threat detection rules and playbooks, investigating security incidents, automating response workflows, and supporting security operations center (SOC) teams to improve an organization's security posture. Our performance-driven philosophy boasts competitive pay and additional position specific incentives, where world-class training and development, resources, and events drive our award-winning culture where everyone thrives.