Search using our robust engine. Get the recommendations you need to get ahead.
Browse through our expansive list of legal practice areas.
Work where you are or where you would like to be. Find where you will work with LawCrossing.
Use our marketplace to feature your opportunity
Start your search today
Set up your account and manage your company profile on LawCrossing
Look through and compare company profiles
Learn from the legal expert
Discover salaries and the scope of your next job
LawCrossing Works Read Testimonials and Share your Story
Carrot Peelers, Sales, Personality and Your Job Search
Government
Attorney
Information Technology
Litigation - Whistleblower - CFTC
Min 5 yrs required
Senior Cyber Security Analyst The candidate provides subject matter expertise on enterprise cyber security risks, threats, technologies, and potential impact. Continually monitors against authorized security control requirements and reports system risks and application configurations or vulnerabilities. Intercepts and prevents internal and external attacks or attempts against firm systems. Partners with cyber security researchers on data analysis, prototype implementation, collaboration, and feedback. Interprets, analyzes, and executes incident response actions for detected intrusion anomalies and events. Conducts system, network, and software vulnerability assessments and penetration testing. Prepares and presents technical reports and briefings. Contributes to design, development and implementation of countermeasures, cyber security systems integration, and leverages tools specific to cyber security operations. As necessary, shares knowledge with external entities including law enforcement, intelligence and other government organizations and agencies. Work in a cyber-program focused on collaboration, partnership, and “out of the box†creativity. Must have Bachelor's degree and 9-13 years' experience or Masters degree and 7-11 years' experience or PhD or JD and 4-8 years' experience or MD degree and 0-3 years' experience. Advanced Security Certification (CISSP, CEH, EnCE, etc) is required. Thorough understanding of the cyber kill chain or attack vectors is needed. Should be able to demonstrate hands-on experience in: Network protocols, uses, and potential exploitation by malicious software; Applying layered computer network defense techniques and network policy architectures; Tracking malware infections across a wide enterprise Clearly communicating technical information in various forms to senior management, peers, and customers.
Sign Up Now