Cyber Analyst Jobs in the United States
Calibre Systems
$70000 - $78000
Ft. Irwin, CA
The Cyber Social Media / OSINT Analyst provides open-source intelligence (OSINT) support and designs, develops, maintains, and troubleshoots secure web-based platforms hosted on NTC networked application servers. CALIBRE is seeking a Cyber Social Media / Open-Source Intelligence (OSINT) Analyst to support rotational training at the National Training Center (NTC).
Leidos
$87100 - $157450
Ashburn, VA
The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. As a member of this highly technical digital forensics team supporting U.S. Customs and Border Protection (CBP), you will be responsible for in-depth cyber forensics, root cause analyses, spillage investigations, and ensure chain of custody during incident investigations in support of the protection of the customers’ systems, networks, and assets.
Chicago Transit Authority
Chicago, IL
Bachelor’s degree in information security/cybersecurity, information technology, computer science or related field required plus three (3) years of experience as a security analyst or in related position or an equivalent combination of education or experience relating to this position. • Researches and analyzes cybersecurity threat indicators and their behaviors for the prevention, detection, containment, and correction of security breaches, and recommends threat mitigation strategies.
The Computer Merchant, LTD.
$100000 - $115000
Concord, MA
Key Responsibilities: Senior cloud security architecture design and implementation, multi-disciplinary team leadership, enterprise cloud cybersecurity framework alignment, integration of new architectural capabilities, systems engineering lifecycle support. * While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations.
JT4 LLC
Las Vegas, NV
Analytical disciplines that align with on-going technical services include satellite and terrestrial telecommunications, information operations, computer networking, digital signal processing, radio frequency (RF) / Electronic Warfare (EW) operations (air and ground-based), statistical analysis, software development, electrical engineering, and aeronautical operations. Completion of technical training and at least 20 years of related experience; or an associate's degree and 16 years of related experience; or a related bachelor's degree (engineering, math, computer science, or physics) and 14 years of related experience; or a related master's degree and 10 years of related experience.
The Computer Merchant, LTD.
$75 - $80
North Quincy, MA
Strong analytical, communication, and presentation skills are critical, as the role requires gathering information from technical subject matter experts and transforming it into documentation and artifacts that support operational consistency, audit readiness, and strategic decision-making . The successful candidate will work closely with members of the EOHHS CISO's Office, IT teams, and agency stakeholders to analyze existing security practices, identify process gaps, and translate informal or undocumented procedures into clear, structured documentation.
Tech Providers Inc.
$52.86
Phoenix, AZ
The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. The focus of the role is not on building the platform from scratch, but on ensuring it is properly designed, securely configured, monitored, and defensible from both a technical and governance perspective.
The Computer Merchant, LTD.
$85000 - $115000
Concord, MA
While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations. This role focuses on evaluating security risks, defining requirements, and supporting the design and implementation of secure cloud solutions.
L3Harris Technologies
Greenville, TX
The candidate must have demonstrated expertise in airspace/range management, FAA certification requirements and systems engineering disciplines associated with a flight test/demonstration program to include requirements definition, design reviews and documentation, and systems integration. Define test requirements, develop test procedures and test plans, execute and manage ground and flight test events, range and airspace management, data collection and analysis, instrumentation of test assets and documentation/ presentation of test results.
Integrative Staffing Group, LLC
Huntsville, AL
Mid Level SOC AnalystHuntsville, ALDirect PlacementUp to $110k yearlyRelocation assistance availablePrimary PurposeOur company is seeking a SOC Operations Analyst/Watch-Floor Operations to join our high performing cyber team in support of a large SOC enterprise environment. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
VT Industries Inc
Holstein, IA
Design and deliver engaging, role-specific cybersecurity awareness training programs that cover current threats (AI-enhanced phishing, deepfakes, business email compromise) and emerging challenges such as secure use of generative AI and autonomous agentic systems. Proactively monitor networks, endpoints, cloud platforms, OT/IoT systems, and AI/agentic environments using advanced XDR, SIEM, SOAR, and behavioral analytics tools to detect and respond to threats in real time.
CPC & Associates
Toledo, OH
This pivotal role involves collaboration with the APC team, Operations, and Technical departments to enhance and maintain the refinery’s Distributed Control System (DCS) infrastructure and Process Control Network (PCN). Lead and initiate plant-wide ICS projects, focusing on PCN architecture and cybersecurity.
Leidos
$87100 - $157450
Lorton, VA
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. Motivated self-starter with strong written and verbal communication skills for collaborating with technical and non-technical stakeholders, and the ability to create complex technical reports on analytic finding .
Axelon Services Corporation
Arnold, MD
This role is ideal for a cybersecurity professional with experience in modern cyber risk management and securing enterprise systems, particularly within a shared Electronic Health Records (EHR) environment between the Department of Defense (DoD) and the Department of Veterans Affairs (VA). Utilize hands-on experience with cybersecurity tools, network topologies, intrusion detection systems, PKI, and secured networks to assess and mitigate risks.
VSolvit LLC
$120000
undefined, undefined
Founded in 2006, VSolvit (pronounced 'We Solve It') is a technology services provider that specializes in cybersecurity, cloud computing, geographic information systems (GIS), business intelligence (BI) systems, data warehousing, engineering services, and custom database and application development. Some of these include, but are not limited to, adhering to normal working hours, meeting deadlines, following company policies as outlined by the Employee Handbook, communicating regularly with assigned supervisor(s), staying focused on the assigned tasks, and completing other tasks as assigned.
Oglethorpe Power
Tucker, GA
u00b7 Application: At lower levels, this is data entry and collection; at higher levels, it is the \'sole responsibility\' for the administration and implementation of these critical reliability systems. Directs resources as required to address immediate post-operational needs and supports real-time operational queries.
Dunhill Professional Search
$51000 - $63000
Chandler, AZ
Base One Technology
Arlington, VA
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Technotopia Solutions LLC
$45 - $55
New Brunswick, NJ
Business Requirements, JIRA, Analytical Thinking, Business Processes, Communication Skills, Problem Solving, Attention to Detail, Business Process Improvement, Requirements Analysis, Automation, SQL Databases, Cyber Security, Enterprise Resource Planning, Business Excellence, User Stories, Testing Skills, Agile Methodology, Software Engineering, Acceptance Testing, Alteryx, Backlogs, Customer Experience, Databricks, Trade Compliance, Transportation Management, Business Planning, Information Engineering, Metrics, System Configuration, Systems Development Life Cycle, Technical Support As a Technical Product Analyst (TPA), you will support the Technical Product Owner (TPO) in translating business needs for Global Trade Compliance products to ensure alignment with business objectives.
Viva USA Inc.
$57 - $62
undefined, undefined
These features include new Custom Reports/CCL & Report/CCL Alterations, Report Design, new MPages, validation of Service Packages, management of Printers and RRD Hardware, end user training, new user accounts, interface issues outside of the Cerner feed and workflow changes. Typically involved in problem management activities which include performing diagnosis, troubleshooting and critical thinking to solve or fulfill needs of medium and high complexity; utilizing knowledge management and escalate issues when necessary.
DivIHN Integration Inc
$87
Glendale, AZ
Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent. Manufacturing experience supporting production IT systems (both hardware and software) and solutions development to support production needs.
DivIHN Integration Inc
$29
Milwaukee, WI
General knowledge of generally accepted accounting principles (GAAP), Federal Energy Regulatory Commission (FERC) accounting, various software packages including SAP, Excel and Word. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.
Korn Ferry
Jersey City, NJ
Collaborate with cross-functional teams, including engineering, product, cyber risk controls and business stakeholders, to define program scope, objectives, and deliverables, ensuring alignment with overall business goals. Advanced expertise in stakeholder management, with the ability to establish productive working relationships and influence decision-making across cross-functional teams and clients.
22nd Century Technologies, Inc.
$65 - $75
Taylor, TX
As part of our unrelenting focus on quality and compliance, 22nd Century Technologies’ delivery is based on Certified Matured Processes including CMMI L3 Dev & SVC, ISO 20000, ISO 27001, and ISO 9001 quality processes. With a strong focus on the public sector, 22nd Century currently holds government contracts with 14 out of 15 Federal Executive agencies including DoD, 37 other Federal agencies, 50 States, 115+ Local agencies, and 37 School Districts.
First Horizon Bank
Memphis, TN
Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. The Corporate Security Analyst will provide support within Administration Services and other operational segments within Corporate Security by assisting with fraud monitoring, restitution payments, subpoena fulfillment, and other supporting functions.
HTC Global Services Inc
Cayce, SC
Leads product release management functions which may include developing test plans, perform test plans, facilitate end user for end user acceptance testing and may develop application validation scripts for ongoing operations team. Typically involved in problem management activities which include performing diagnosis, troubleshooting and critical thinking to solve or fulfill needs of medium and high complexity; utilizing knowledge management and escalate issues when necessary.
The Computer Merchant, LTD.
$80 - $85
Washington, DC
A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring, identifying and analyzing anomalous activities with familiarity in host-based tools, intrusion detection systems, intrusion analysis functions, security information event management (SIEM) platforms, endpoint threat detection tools, and ticket management in a SOC Operations environment. * While an hourly range is posted for this position, an eventual hourly rate is determined by a comprehensive salary analysis which considers multiple factors including but not limited to: job-related knowledge, skills and qualifications, education and experience as compared to others in the organization doing substantially similar work, if applicable, and market and business considerations.
ABCS, Inc.
$40 - $46
Phoenix, AZ
CISSP, CCSP, GSTRT, GSNA, or CAP certification. Risk Management Framework (RMF).
ABCS, Inc.
$45 - $46
Phoenix, AZ
The team member will help develop plans and materials to support user adoption, training, and customer service, working through direct and regular contact with users from other divisions, programs, and service units to provide regular insight and guidance in prioritizing enhancements for the data systems. The team member will work with other personnel across departments to define requirements for projects, identify data dependencies and relationships to develop logical and physical data models, data flows and system activity diagrams, and write specifications for managing enterprise information policies.
DCS Corporation
Las Vegas, NV
Assist customer preparing and reviewing documentation to include System Security Plans (SSPs), Risk Assessment Reports, Authorization to Operate (ATO) packages, policies, and Security Controls. Providing Information System Security Operations support, integration services, technical assessments, and solutions to enable cybersecurity.
V2Soft
Farmers Branch, TX
V2Soft is a global leader in IT services and business solutions, delivering innovative and cost-effective technology solutions worldwide since 1998. Beyond our work, we actively support local communities and non-profits, reflecting our core values.
Booz Allen Hamilton INC.
Bremerton, WA
This PM willwork acrossthe end-to-end product lifecycle, from identifying high-impact AI use cases, such as new patterns to detectliving-of-the-land (LOTL)attacks, and defining the technical roadmap, to collaborating with engineering and data science teams to build trustworthy, auditable features, and finally, partnering with go-to-market teams to ensure the product successfully meets the complex security and audit requirements ofour mostregulated customers. You willexperience theenergyof a start-up,with the resources, mentorship, and stability of an established tech companywhilebeingable to look acrossindustry&capability areas to craftnewoutcomesleveragingthedeep catalog of existing technologyand customersolutions.
Signature Performance, Inc.
$130000 - $160000
Seattle, WA
In the role of Cyber Security Engineer, you will be responsible collecting and correlating security logs, developing threat detection rules and playbooks, investigating security incidents, automating response workflows, and supporting security operations center (SOC) teams to improve an organization's security posture. Our performance-driven philosophy boasts competitive pay and additional position specific incentives, where world-class training and development, resources, and events drive our award-winning culture where everyone thrives.
KPMG LLP
Seattle, WA
Handle and coordinate tasks such as incident management, threat hunting, forensic analysis, and remediation efforts to mitigate threats; conduct regular assessments to identify vulnerabilities and insecure configurations and review security change requests to ensure robust protective measures. Configure and monitor security tools, including alerts, correlation rules, and reporting mechanisms; implement automation and orchestration to improve the efficiency and effectiveness of security monitoring and response processes, aiming for a unified "single pane of glass" solution.
Trident Seafoods Corporation
$130000 - $160000
Seattle, WA
As a Senior Cyber Security Analyst, you will take a role in assessing, planning, and enacting security measures to help protect our organization from security breaches and attacks on its computer networks and systems. This role provides vulnerability analysis, cyber security awareness administration, policy management, project deliverables, and participates in security related initiatives to help strengthen our overall security posture.
OKTA
Bellevue, WA
Incident Command & Escalation: Serve as the senior leader during AMER-based security events, empowering your team to lead investigations while providing the air cover and strategic guidance they need to succeed. The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, Illinois, New York, and Washington is between: $193,000—$289,000 USD.
GTT, LLC
Augusta, ME
The department operates under the NIST Risk Management Framework (RMF) and undergoes audits by the Social Security Administration and other agencies. Start: As Soon As PossibleJob SummaryThe Cyber Analyst supports critical infrastructure systems for the Department of the Secretary of State (SoS).
GTT
Augusta, ME
The department has implemented the NIST Risk Management Framework (RMF) and requires information security expertise to assist with creating, revising, and managing RMF-related documentation, as well as preparing for independent system assessments. The information system is audited by the Social Security Administration and other entities to ensure appropriate security controls are in place to protect sensitive information.
Motorola Solutions
Seattle, WA
This position is subject to working in high security areas governed by the US Department of Justice's "Criminal Justice Information Services (CJIS) Security Policy" and therefore requires successfully passing a more stringent fingerprint background check administered by Motorola Solutions Inc. customers. Experience and technical knowledge in security engineering, secure architecture development, system and network security, authentication and security protocols, applied cryptography, and application security.
Chelan County PUD
$89200 - $129500
Wenatchee, WA
Cybersecurity Analysis, Detection and Response: Continuously monitor and investigate security anomalies, intrusions, breaches, and illegal or suspicious activities across enterprise systems and environments—including on-premises, cloud, and endpoints—using tools such as Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Network Access Control (NAC), Intrusion Detection and Prevention Systems (IDPS), and other advanced tools including AI-enhanced detection and automation. The role includes auditing cybersecurity controls across on-premises and cloud environments, identifying vulnerabilities, and prioritizing patching based on risk—all with the goal of reducing cybersecurity risk to the District in a manner that supports business needs and reliable service delivery.
Booz Allen Hamilton INC.
Joint Base Lewis-McChord, WA
Completion of DoD Intelligence Analyst Course, All Source Intelligence Analyst MOS Course, DHS Basic Intelligence and Threat Analysis Course, ODNI Analysis 101 Course, or a Certified Defense All-Source Analysis (CDASA) Professional Course. Experience as an All-Source Intelligence Analyst in the planning, collection, and implementation of all intelligence disciplines across the full spectrum of operations that includes imagery, signals, measurements, human, and open-source data into information to support national defense.
Integration Innovation, Inc.
Huntsville, Alabama
About i3: i3 is a technically diverse, 100% team member owned business, headquartered in Huntsville, Alabama specializing in missile and aviation systems engineering and logistic services, electronic warfare and electromagnetic effects analysis, UAS system integration and flight operations, full lifecycle C5ISR engineering services, cybersecurity and IT/IA innovative solutions and virtual training, simulation & serious game development and implementation. We have established a broad offering of products and capabilities collectively providing decades of experience supporting the full complement of DoD military services, Missile Defense Agency, National Aeronautics and Space Administration, and a variety of other Government organizations and private industry customers.
General Atomics
San Diego, CA
Additionally, this role takes on initial cybersecurity architecture responsibilities, contributing to security design, NIST-aligned reference architectures, and security capability development. + This role is part of the Cybersecurity Engineering career track, focusing on security technology implementation, architecture, and strategic security enforcement solutions, independent of the analyst track.
Connect Talent Solutions
Hampton, undefined
Knowledge in emerging technologies including cloud, AI and virtualization, networking, systems engineering, identity management, web technologies, system administration, and system security is preferred. The ideal candidate will provide a broad range of information assurance activities and has a strong knowledge of systems, operating environments, system security, and networking.
Nalley Consulting
College Park, MD
Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments specific to the cyber domain. Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings.
Peraton Inc
East Port Orchard, WA
Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks, or leaks. Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
Valiant Government Services, LLC
Joint Base Lewis Mcchord, WA
Valiant Integrated Services, a leader in the Defense Services industry, is looking for an experienced, highly skilled Military Analyst for the Intelligence Warfighting Function to join a team providing Military Intelligence Simulation training support services to the Army at the Mission Training Complex (MTC), JBLM, Washington. * Specific to IEWTPT: Configures and operates the Technical Control Cell (TCC), Target Signature Arrays (TSA), and Virtual Reality Scene Generator (VRSG)/simulation interface to process the enhanced constructive information into native protocols of the organic ISR systems being stimulated.
Valiant Government Services, LLC
Joint Base Lewis Mcchord, WA
Mountain West Bank
Spokane, WA
The role plays a key part in the implementation and optimization of thirdparty risk management technology, including configuring a new TPRM tool to align with regulatory, operational, and business needs while introducing enhanced features, streamlining workflows, and reducing internal and external stakeholder friction. The role requires demonstrated experience evolving risk management programs, including assessing current state processes, defining future state requirements, and executing strategic enhancements that drive efficiency, scalability, and enterprise value.
OKTA
Bellevue, WA
Support audit, governance, risk and compliance teams in scanning and reporting on various regulatory compliance and industry best practices including PCI, ISO 27001/27017/27018 , NIST SP 800-53 and SOC 2. Assist Okta's Public Sector compliance team in their preparation and maintenance of POAMs (Plan of Action & Milestones) and Continuous Monitoring (ConMon) processes. The Staff Vulnerability Management Analyst for Public Sector is a key member of the Okta Security team and an essential collaborator with our broader Engineering organization playing a key part in executing the Vulnerability Management Program's strategy.