Find Your Perfect Job

Job Search Results for threat intelligence analyst

Sort and Filter  | 9 Results for threat intelligence analyst  | Save This Search

Mar 06, 2026

Vancouver, BC

|

Security Engineering

|

Contract

|

$45 - $56 (hourly estimate)

{"JobID":503530,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":0,"Longitude":0,"Distance":null},"State":"British Columbia","Zip":"V6Z 3","ReferenceID":"VAN-4a639bc7-b085-46ff-bf1e-394878ef0c2b","PostedDate":"\/Date(1772823380000)\/","Description":"Senior Security Analyst - Threat HunterWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Senior Security Analyst - Threat Detection (VAN or SEA)","City":"Vancouver","ExpirationDate":null,"PriorityOrder":0,"Requirements":"Threat Hunting \u0026 Security Operations Experience?8+ years of experience in Security Operations, with hands on experience in threat hunting, SOC analysis, or incident response?Demonstrated experience conducting proactive threat hunts across endpoint, identity, network, cloud, and application telemetry?Strong understanding of adversary behaviors, tactics, and techniques, and how they manifest in enterprise environmentsThreat Intelligence \u0026 Hunting Integration?Experience consuming and operationalizing actionable threat intelligence to drive hypothesis based threat hunts?Ability to collaborate closely with Threat Intelligence, Incident Response, and SOC teams to ensure findings translate into detections, response actions, and defensive improvements?Experience validating intelligence through data driven investigation rather than alert only workflowsDetection \u0026 Investigation Skills?Strong analytical skills with experience investigating complex or low signal security events?Familiarity with detection logic aligned to frameworks such as MITRE ATT\u0026CK?Ability to identify gaps in existing detections and recommend improvements based on hunt outcomesSecurity Tooling \u0026 Data Analysis?Hands on experience querying and analyzing telemetry from security tools such as SIEM, EDR, and logging platforms.?Experience and understanding of KQL, Microsoft Sentinel, Microsoft Defender, AWS, Azure?Ability to work directly with large datasets and telemetry to uncover anomalous or malicious activity?Experience contributing to or refining runbooks, playbooks, and investigation workflowsOperationalization \u0026 Reporting?Experience documenting threat hunt hypotheses, methodologies, findings, and outcomes?Ability to build and maintain metrics and reporting that communicate hunt value, trends, and risk to stakeholders?Comfortable transitioning validated findings into detections, response actions, or strategic improvementsCommunication \u0026 Collaboration?Strong written and verbal communication skills, with the ability to explain technical findings to both technical and non technical audiences?Proven ability to collaborate across Security Operations functions and influence improvements without direct authority","Skills":"","Industry":"Security Engineering","Country":"Canada","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":56.0000,"SalaryLow":44.8000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Senior Security Analyst - Threat HunterWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal... opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 09, 2026

Lawrence, IN

|

NOC Technician

|

Contract

|

$37 - $46 (hourly estimate)

{"JobID":504132,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-86.14,"Longitude":39.77,"Distance":null},"State":"Indiana","Zip":"46249","ReferenceID":"IND-0ca7eb1f-3ba3-4dae-a985-d07d4c5b117e","PostedDate":"\/Date(1773079662000)\/","Description":"As a Cyber Security Analyst on our team, you?ll monitor and analyze threats, using state-of-the-art tools. You?ll use your cyber security skills to monitor, detect, and respond to cyber security alerts. You?ll review logs, tool output, and intelligence sources investigate security events, and follow escalation processes. You?ll identify and recommend improvements. You\u0027ll prepare reports and informational documents and work in a team environment. You?ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You?ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You?ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers? goals to stop them from succeeding. This is a great opportunity to hone your cyber security skills with hands-on experience in threat assessment and incident response.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Cyber Analyst","City":"Lawrence","ExpirationDate":null,"PriorityOrder":0,"Requirements":"?Experience with DoD information systems?Ability to support 24/7 operations via a shift work schedule?Top Secret clearance?HS diploma or GED?DoD 8570 IAT Level II and CSSP Analyst Certifications","Skills":"?Experience with DoD STIGs and SRGs and hardening guidance?Knowledge of ESS, ACAS, and DoD SIEM platforms?Bachelor\u0027s degree in Information Systems, Cybersecurity, Engineering, or a related field?DoD 8570 IAT Level III Certification","Industry":"NOC Technician","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":46.0000,"SalaryLow":36.8000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

As a Cyber Security Analyst on our team, you?ll monitor and analyze threats, using state-of-the-art tools. You?ll use your cyber security skills to monitor, detect, and respond to cyber security... alerts. You?ll review logs, tool output, and intelligence sources investigate security events, and follow escalation processes. You?ll identify and recommend improvements. You'll prepare reports and informational documents and work in a team environment. You?ll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. You?ll analyze incidents to figure out just how many systems are affected and assist recovery efforts. You?ll combine threat intelligence, event data, and assessments from recent events, and identify patterns to understand attackers? goals to stop them from succeeding. This is a great opportunity to hone your cyber security skills with hands-on experience in threat assessment and incident response.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 31, 2026

Houston, TX

|

Security Engineering

|

Contract

|

$62 - $77 (hourly estimate)

{"JobID":513167,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-95.38,"Longitude":29.76,"Distance":null},"State":"Texas","Zip":"77056","ReferenceID":"HOU-25fae8b4-01b5-419a-93c2-bcb69a04efa5","PostedDate":"\/Date(1774979648000)\/","Description":"An employer in the Galleria area of Houston, Texas is seeking a Lead SOC Analyst to join their team. They currently have a global SOC team and are trying to mimic the structure they have in Australia. Right now, there are 2 Leads in Houston overseeing the international team (North and South America) and this person will take the 3rd Lead spot. Their hours will be Monday-Friday 8A-5:30 PM and must sit onsite 3 days a week (their choice of day). Right now, the team works 9/80s and will be off every other Friday. The general rule, is 60% working in office and 40% working from home. This can change depending on what is going on with the team. Most people are onsite 3 days a week. They do allow flexibility as well - this is to be discussed with the manager ahead of time. They will also be on an on-call rotation every 3 weeks and their shift is Thursday-Thursday. They do a follow the sun schedule and pass off to the team in Australia accordingly. This person will be responsible for helping lead a team of 5+ SOC analysts and needs to have experience managing and mentoring junior analysts. This person will be the first escalation point for all major incidents. They need to have extensive threat intelligence review and assessment experience, strong vulnerability management experience and great written and verbal communication as they will provide communication reviews. This position pays between $70-$80/hr depending on skillset and experience.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Lead SOC Analyst","City":"Houston","ExpirationDate":null,"PriorityOrder":0,"Requirements":"5+ years of experience in a Senior SOC Analyst position where they are the major incident escalation point2+ years of experience in a Lead SOC Analyst position managing a team of Junior AnalystsExtensive experience in Threat Intelligence Reviews and AssessmentsExtensive experience in Vulnerability Management (need to have lead a team while doing this)Extensive Incident Response experience","Skills":"Any certifications","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":77.0000,"SalaryLow":61.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

An employer in the Galleria area of Houston, Texas is seeking a Lead SOC Analyst to join their team. They currently have a global SOC team and are trying to mimic the structure they have in... Australia. Right now, there are 2 Leads in Houston overseeing the international team (North and South America) and this person will take the 3rd Lead spot. Their hours will be Monday-Friday 8A-5:30 PM and must sit onsite 3 days a week (their choice of day). Right now, the team works 9/80s and will be off every other Friday. The general rule, is 60% working in office and 40% working from home. This can change depending on what is going on with the team. Most people are onsite 3 days a week. They do allow flexibility as well - this is to be discussed with the manager ahead of time. They will also be on an on-call rotation every 3 weeks and their shift is Thursday-Thursday. They do a follow the sun schedule and pass off to the team in Australia accordingly. This person will be responsible for helping lead a team of 5+ SOC analysts and needs to have experience managing and mentoring junior analysts. This person will be the first escalation point for all major incidents. They need to have extensive threat intelligence review and assessment experience, strong vulnerability management experience and great written and verbal communication as they will provide communication reviews. This position pays between $70-$80/hr depending on skillset and experience.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 06, 2026

Vancouver, BC

|

Security Engineering

|

Contract

|

$45 - $56 (hourly estimate)

{"JobID":503527,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":0,"Longitude":0,"Distance":null},"State":"British Columbia","Zip":"V6C 3","ReferenceID":"VAN-9a3be7fd-379e-4e87-8224-d25c8127c64a","PostedDate":"\/Date(1772823562000)\/","Description":"Senior Security Analyst - Detection EngineeringDetection Engineering Experience?8+ years of experience in cybersecurity, with at least 3+ years focused on detection engineering, threat detection, or security analytics?Proven experience designing, implementing, and maintaining high fidelity security detections across multiple telemetry sources?Strong understanding of how attacker behaviors manifest in logs, events, and telemetry across enterprise environmentsDetection Design \u0026 Framework Alignment?Demonstrated experience building detections aligned to MITRE ATT\u0026CK, focusing on behavior based rather than signature only detection?Ability to perform detection gap analysis and systematically improve coverage, quality, and resilience of detection content?Experience validating detections through testing, simulation, or retrospective analysis [Security O...n Engineer | Word]Security Tooling \u0026 Query Languages?Hands on experience with SIEM and EDR platforms, including ingesting and querying large volumes of security telemetry?Strong proficiency writing detection logic using KQL and working with Microsoft Sentinel/Defender?Experience using scripting languages such as Python, PowerShell, Bash, or JavaScript to support detection and automation workflowsAutomation \u0026 SOAR?Experience designing and implementing security automation using SOAR platforms to reduce manual effort and improve response consistency?Ability to automate alert enrichment, triage, IOC lookups, and ticketing workflows using Logic Apps?Experience integrating SIEM, EDR, threat intelligence, and case management systems into cohesive workflowsOperational Collaboration?Strong collaboration with SOC analysts, Incident Response, and Threat Intelligence teams to ensure detections are actionable and operationally effective?Ability to support incident response by providing deep technical insight into detections, telemetry, and attacker behaviorsOriginal contract set for 5 months with the opportunity to extendWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Senior Security Analyst - Detection Engineering - VAN OR SEA","City":"Vancouver","ExpirationDate":null,"PriorityOrder":0,"Requirements":"Senior Security Analyst - Detection EngineeringDetection Engineering Experience?8+ years of experience in cybersecurity, with at least 3+ years focused on detection engineering, threat detection, or security analytics?Proven experience designing, implementing, and maintaining high fidelity security detections across multiple telemetry sources?Strong understanding of how attacker behaviors manifest in logs, events, and telemetry across enterprise environmentsDetection Design \u0026 Framework Alignment?Demonstrated experience building detections aligned to MITRE ATT\u0026CK, focusing on behavior based rather than signature only detection?Ability to perform detection gap analysis and systematically improve coverage, quality, and resilience of detection content?Experience validating detections through testing, simulation, or retrospective analysis [Security O...n Engineer | Word]Security Tooling \u0026 Query Languages?Hands on experience with SIEM and EDR platforms, including ingesting and querying large volumes of security telemetry?Strong proficiency writing detection logic using KQL and working with Microsoft Sentinel/Defender?Experience using scripting languages such as Python, PowerShell, Bash, or JavaScript to support detection and automation workflowsAutomation \u0026 SOAR?Experience designing and implementing security automation using SOAR platforms to reduce manual effort and improve response consistency?Ability to automate alert enrichment, triage, IOC lookups, and ticketing workflows using Logic Apps?Experience integrating SIEM, EDR, threat intelligence, and case management systems into cohesive workflowsOperational Collaboration?Strong collaboration with SOC analysts, Incident Response, and Threat Intelligence teams to ensure detections are actionable and operationally effective?Ability to support incident response by providing deep technical insight into detections, telemetry, and attacker behaviorsOriginal contract set for 5 months with the opportunity to extend","Skills":"","Industry":"Security Engineering","Country":"Canada","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":56.0000,"SalaryLow":44.8000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Senior Security Analyst - Detection EngineeringDetection Engineering Experience?8+ years of experience in cybersecurity, with at least 3+ years focused on detection engineering, threat detection, or... security analytics?Proven experience designing, implementing, and maintaining high fidelity security detections across multiple telemetry sources?Strong understanding of how attacker behaviors manifest in logs, events, and telemetry across enterprise environmentsDetection Design & Framework Alignment?Demonstrated experience building detections aligned to MITRE ATT&CK, focusing on behavior based rather than signature only detection?Ability to perform detection gap analysis and systematically improve coverage, quality, and resilience of detection content?Experience validating detections through testing, simulation, or retrospective analysis [Security O...n Engineer | Word]Security Tooling & Query Languages?Hands on experience with SIEM and EDR platforms, including ingesting and querying large volumes of security telemetry?Strong proficiency writing detection logic using KQL and working with Microsoft Sentinel/Defender?Experience using scripting languages such as Python, PowerShell, Bash, or JavaScript to support detection and automation workflowsAutomation & SOAR?Experience designing and implementing security automation using SOAR platforms to reduce manual effort and improve response consistency?Ability to automate alert enrichment, triage, IOC lookups, and ticketing workflows using Logic Apps?Experience integrating SIEM, EDR, threat intelligence, and case management systems into cohesive workflowsOperational Collaboration?Strong collaboration with SOC analysts, Incident Response, and Threat Intelligence teams to ensure detections are actionable and operationally effective?Ability to support incident response by providing deep technical insight into detections, telemetry, and attacker behaviorsOriginal contract set for 5 months with the opportunity to extendWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Dec 03, 2025

Austin, TX

|

Security Engineering

|

Contract-to-perm

|

$36 - $45 (hourly estimate)

{"JobID":473004,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-97.74,"Longitude":30.26,"Distance":null},"State":"Texas","Zip":"78701","ReferenceID":"DGW-0cd49488-17dc-4bbb-99f6-85ee1e64b842","PostedDate":"\/Date(1764780882000)\/","Description":"The Cybersecurity Analyst will be responsible for safeguarding the organization?s information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.The ideal candidate will possess 3?5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.Key ResponsibilitiesSecurity Operations \u0026 Monitoring? Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.? Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.? Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.Network \u0026 Infrastructure Security? Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.? Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.? Perform network hardening to reduce the attack surface, following best practices and compliance standards.Server \u0026 System Hardening? Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.? Review and implement secure configurations, patch management, and vulnerability remediation.Disaster Recovery \u0026 Continuity? Participate in DR drills and testing to validate readiness and response effectiveness.Policy, Documentation \u0026 Compliance? Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.? Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Cyber Security Analyst","City":"Austin","ExpirationDate":null,"PriorityOrder":0,"Requirements":"? Bachelor?s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).? 3?5 years of hands-on experience managing and securing enterprise networks and systems.? Proven experience with:? Cisco XDR, Cisco Firepower, Cisco ASA, Cisco Endpoint? Fortinet Gateways? Duo MFA? Server and Network Hardening? Disaster Recovery implementation and testing? Strong understanding of TCP/IP, VPNs, IDS/IPS, and secure network design principles.? Familiarity with incident response, threat intelligence, and vulnerability management processes.? Cisco certifications such as CCNA, CCNP (Enterprise, Security, or equivalent).? Experience with other routing protocols (EIGRP, BGP) and advanced firewall features.? Familiarity with automation tools (Python, Ansible, Netmiko) for network management.? Experience in high-availability enterprise or government environments.","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":45.0000,"SalaryLow":36.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The Cybersecurity Analyst will be responsible for safeguarding the organization?s information systems, infrastructure, and data through proactive monitoring, analysis, and in supporting the... implementation of advanced security solutions. This position plays a vital role in maintaining a secure technology environment by leveraging tools such as Cisco XDR, Cisco Firepower, Cisco Endpoint, Cisco ASA, Fortinet Gateways, and Duo MFA.The ideal candidate will possess 3?5 years of hands-on experience in network and server hardening, threat detection and response, and disaster recovery planning and execution. Working closely with IT operations, this role ensures that all systems are resilient, compliant, and protected against evolving cyber threats.Key ResponsibilitiesSecurity Operations & Monitoring? Implement, configure, and manage Cisco XDR, Cisco Endpoint Security, and Fortinet Gateways to ensure proactive threat detection and response.? Monitor network and endpoint activities for security incidents using advanced SIEM and XDR tools.? Investigate, analyze, and respond to security breaches, threats, and vulnerabilities.Network & Infrastructure Security? Manage and maintain Cisco Firepower and Cisco ASA firewalls to ensure secure and efficient traffic management.? Administer Duo Multi-Factor Authentication (MFA) for secure user access and identity protection.? Perform network hardening to reduce the attack surface, following best practices and compliance standards.Server & System Hardening? Conduct server hardening across Windows and Linux systems, ensuring compliance with internal and regulatory standards.? Review and implement secure configurations, patch management, and vulnerability remediation.Disaster Recovery & Continuity? Participate in DR drills and testing to validate readiness and response effectiveness.Policy, Documentation & Compliance? Maintain up-to-date documentation of network security configurations, standards, and incident response procedures.? Support compliance initiatives (e.g., NIST, ISO 27001, or CIS Controls) through audits and reporting.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 25, 2026

Philadelphia, PA

|

Help Desk

|

Perm

|

$85k - $95k (estimate)

{"JobID":511061,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-75.16,"Longitude":39.95,"Distance":null},"State":"Pennsylvania","Zip":"19102","ReferenceID":"PHL-145a9ebc-fce0-4c49-a579-69f02b566128","PostedDate":"\/Date(1774466856000)\/","Description":"Insight Global is seeking an IS Analyst to join the IT department of an AM 200 law firm. The Information Security Analyst plays a key role in protecting the firm?s digital assets, client data, and case-related information by implementing and maintaining security controls in alignment with the ISO 27001 Information Security Management System (ISMS). The analyst will proactively monitor, detect, and respond to security threats; ensure compliance with legal industry data protection standards; and support ongoing risk and compliance initiatives. This role is essential for maintaining client trust, ensuring the confidentiality of privileged information, and meeting both ethical and regulatory obligations in the legal sector.Essential Functions \u0026 Responsibilities:-Security Monitoring \u0026 Incident ResponseMonitor networks, systems, and endpoints for potential threats using SIEM, EDR, and IDS/IPS tools.-Analyze security alerts, investigate incidents, and coordinate timely response and remediation.Conduct root cause analyses and prepare post-incident reports.-Maintain and test the Incident Response Plan as part of ISO 27001 continuous improvement.Participate in legal hold or eDiscovery-related security reviews when required.-Risk Management \u0026 ISO 27001 AlignmentSupport the firm?s Information Security Management System (ISMS) and contribute to maintaining ISO 27001 certification.-Conduct periodic risk assessments, identifying potential threats to confidentiality, integrity, and availability of legal data.-Document and monitor risk treatment plans and corrective actions.-Participate in internal and external ISO audits by providing evidence and maintaining control documentation.-Contribute to the ongoing maintenance of the Firm?s risk register.-Seek out opportunities for continuous improvement in processes and procedures.-Vulnerability Management \u0026 Threat Intelligence-Perform regular vulnerability scans and coordinate remediation with IT and service providers.-Monitor industry-standard threat intelligence sources, cybersecurity forums, and dark web feeds for emerging risks, vulnerabilities, and threat actor activities targeting the legal sector.-Track and report vulnerabilities relevant to law firms, third-party vendors, and legal technology platforms (e.g., document management systems, case management tools).-Track and report on patch-management activity to be sure it aligns with required standards.Stay informed on evolving attack vectors such as business email compromise, ransomware, and data exfiltration threats impacting professional services firms.-Governance, Policy, and ComplianceDevelop, maintain, and enforce security policies, procedures, and standards in accordance with ISO 27001 Annex A controls and policy lifecycle.-Ensure adherence to data privacy laws (e.g., GDPR, CCPA) and client contractual obligations.Collaborate with legal teams to align information security practices with attorney?client privilege requirements and ethical obligations.-Support third-party vendor risk assessments and due diligence processes.-Security Awareness \u0026 Continuous Improvement-Support the firm?s security awareness training program and conduct periodic phishing simulations.-Educate staff on secure handling of confidential documents and client communications.-Contribute to the continuous improvement cycle of the ISMS by identifying opportunities for control enhancement.-Keep up to date with the latest developments in cybersecurity, privacy law, and ISO frameworks.-Access Control \u0026 Data ProtectionManage and review access controls, ensuring least privilege and role-based access models are enforced.-Monitor privileged accounts and perform periodic user access reviews.-Work with IT to secure document repositories, collaboration tools, and cloud-based applications.-Review and act as needed to on data loss prevention alerts from various tools.Technical Skills:Experience with ISO 27001, NIST CSF, or CIS Controls.Proficiency with SIEM platforms (e.g., Splunk, Sentinel, LogRhythm).Strong understanding of network protocols, IDS/IPS, and endpoint security.Familiarity with vulnerability management tools (e.g., Qualys, Nessus) and ticketing workflows.Knowledge of encryption, DLP, and secure file transfer solutions used in legal environments.Understanding of cloud security concepts (Microsoft 365, Azure, or AWS).Familiarity with scripting/automation tools and techniques.Knowledge of EDR/XDR solutions and providers.This is a full-time hybrid role, sitting 2 days in office each week in any of the firm\u0027s following offices: Baltimore, Boston, Chicago, Ft. Lauderdale, Harrisburg, Miami, Minneapolis, Newark, New York City, Philadelphia, Princeton, Wayne, PA, West Palm Beach, Wilmington, DE or Washington, D.C.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Information Security Analyst","City":"Philadelphia","ExpirationDate":null,"PriorityOrder":0,"Requirements":"-Bachelor?s degree in Information Security, Computer Science, Information Technology, or a related field. Equivalent experience considered.-2?8 years of experience in information technology, information security, risk management, or compliance within a professional services or legal environment preferred.","Skills":"Certifications (Preferred):CompTIA Security+Certified Cisco Network Associate (CCNA)Systems Security Certified Practitioner (SSCP)Certified Information Systems Security Professional (CISSP)","Industry":"Help Desk","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":95000.0000,"SalaryLow":85000.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is seeking an IS Analyst to join the IT department of an AM 200 law firm. The Information Security Analyst plays a key role in protecting the firm?s digital assets, client data, and... case-related information by implementing and maintaining security controls in alignment with the ISO 27001 Information Security Management System (ISMS). The analyst will proactively monitor, detect, and respond to security threats; ensure compliance with legal industry data protection standards; and support ongoing risk and compliance initiatives. This role is essential for maintaining client trust, ensuring the confidentiality of privileged information, and meeting both ethical and regulatory obligations in the legal sector.Essential Functions & Responsibilities:-Security Monitoring & Incident ResponseMonitor networks, systems, and endpoints for potential threats using SIEM, EDR, and IDS/IPS tools.-Analyze security alerts, investigate incidents, and coordinate timely response and remediation.Conduct root cause analyses and prepare post-incident reports.-Maintain and test the Incident Response Plan as part of ISO 27001 continuous improvement.Participate in legal hold or eDiscovery-related security reviews when required.-Risk Management & ISO 27001 AlignmentSupport the firm?s Information Security Management System (ISMS) and contribute to maintaining ISO 27001 certification.-Conduct periodic risk assessments, identifying potential threats to confidentiality, integrity, and availability of legal data.-Document and monitor risk treatment plans and corrective actions.-Participate in internal and external ISO audits by providing evidence and maintaining control documentation.-Contribute to the ongoing maintenance of the Firm?s risk register.-Seek out opportunities for continuous improvement in processes and procedures.-Vulnerability Management & Threat Intelligence-Perform regular vulnerability scans and coordinate remediation with IT and service providers.-Monitor industry-standard threat intelligence sources, cybersecurity forums, and dark web feeds for emerging risks, vulnerabilities, and threat actor activities targeting the legal sector.-Track and report vulnerabilities relevant to law firms, third-party vendors, and legal technology platforms (e.g., document management systems, case management tools).-Track and report on patch-management activity to be sure it aligns with required standards.Stay informed on evolving attack vectors such as business email compromise, ransomware, and data exfiltration threats impacting professional services firms.-Governance, Policy, and ComplianceDevelop, maintain, and enforce security policies, procedures, and standards in accordance with ISO 27001 Annex A controls and policy lifecycle.-Ensure adherence to data privacy laws (e.g., GDPR, CCPA) and client contractual obligations.Collaborate with legal teams to align information security practices with attorney?client privilege requirements and ethical obligations.-Support third-party vendor risk assessments and due diligence processes.-Security Awareness & Continuous Improvement-Support the firm?s security awareness training program and conduct periodic phishing simulations.-Educate staff on secure handling of confidential documents and client communications.-Contribute to the continuous improvement cycle of the ISMS by identifying opportunities for control enhancement.-Keep up to date with the latest developments in cybersecurity, privacy law, and ISO frameworks.-Access Control & Data ProtectionManage and review access controls, ensuring least privilege and role-based access models are enforced.-Monitor privileged accounts and perform periodic user access reviews.-Work with IT to secure document repositories, collaboration tools, and cloud-based applications.-Review and act as needed to on data loss prevention alerts from various tools.Technical Skills:Experience with ISO 27001, NIST CSF, or CIS Controls.Proficiency with SIEM platforms (e.g., Splunk, Sentinel, LogRhythm).Strong understanding of network protocols, IDS/IPS, and endpoint security.Familiarity with vulnerability management tools (e.g., Qualys, Nessus) and ticketing workflows.Knowledge of encryption, DLP, and secure file transfer solutions used in legal environments.Understanding of cloud security concepts (Microsoft 365, Azure, or AWS).Familiarity with scripting/automation tools and techniques.Knowledge of EDR/XDR solutions and providers.This is a full-time hybrid role, sitting 2 days in office each week in any of the firm's following offices: Baltimore, Boston, Chicago, Ft. Lauderdale, Harrisburg, Miami, Minneapolis, Newark, New York City, Philadelphia, Princeton, Wayne, PA, West Palm Beach, Wilmington, DE or Washington, D.C.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Feb 11, 2026

Jessup, MD

|

Security Engineering

|

Contract

|

$70 - $88 (hourly estimate)

{"JobID":493487,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-76.77,"Longitude":39.12,"Distance":null},"State":"Maryland","Zip":"20701","ReferenceID":"BAL-72b9f1d3-4470-45a5-b5f1-8916d9384c98","PostedDate":"\/Date(1770818176000)\/","Description":"Insight Global is actively hiring multiple Cyber Network Operators and Exploitation Analyst (Blue Team and Red Team) to join our team supporting a large Intelligence Program out of Fort Meade. The selected candidates will work on a team of Senior Analyst providing a wide range of Computer Network Operations (CNO) including Defensive Cyber Operations, Offensive Cyber Operations, and Exploitation Operations. Candidates should have s strong hands on experience with tools such as DataXplorer, XKS, UTT, etc. as well as tools such as Snort, Bro, Metasploit, etc. specifically performing Computer Network Operations. Salaries offered will be based on candidates level of expertise, education, and clearance level; but likely fall between 175K - 300KWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"TS/SCI Polygraph Cyber Exploitation Analyst","City":"Jessup","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- Active TS/SCI with Polygraph- Bachelors Degree and 5+ years of hands on experience in Defensive Cyber, Offensive Cyber, or Exploitation Activities. An Associates Degree or JCAC Graduate and 8 years of experience is also acceptable in lieu of Bachelors Degree- Hands on experience with classified and unclassified tools including IDS/IPS Tools, Offensive Cyber or Threat Hunting tools; as well as Agency specific Tools such as DataXplorer and XKeyScore- Experience preforming technical analysis of computer systems including packet capture analysis, identifying and vulnerabilities and indicators of compromise, and performing computer network operations","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":88.0000,"SalaryLow":70.4000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is actively hiring multiple Cyber Network Operators and Exploitation Analyst (Blue Team and Red Team) to join our team supporting a large Intelligence Program out of Fort Meade. The... selected candidates will work on a team of Senior Analyst providing a wide range of Computer Network Operations (CNO) including Defensive Cyber Operations, Offensive Cyber Operations, and Exploitation Operations. Candidates should have s strong hands on experience with tools such as DataXplorer, XKS, UTT, etc. as well as tools such as Snort, Bro, Metasploit, etc. specifically performing Computer Network Operations. Salaries offered will be based on candidates level of expertise, education, and clearance level; but likely fall between 175K - 300KWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Jun 25, 2025

Reston, VA

|

Security Engineering

|

Contract

|

$56 - $70 (hourly estimate)

{"JobID":421667,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-77.34,"Longitude":38.95,"Distance":null},"State":"Virginia","Zip":"20190","ReferenceID":"BAL-072c0053-029c-46ca-b9bc-69d9fbec520a","PostedDate":"\/Date(1750862210000)\/","Description":"Insight Global is actively hiring multiple Cyber Network Defense and Exploitation Analyst (Blue Team and Red Team) to join our team supporting a large Intelligence Program out of Fort Meade. The selected candidates will work on a team of Senior Analyst providing a wide range of Computer Network Operations (CNO) including Defensive Cyber Operations, Offensive Cyber Operations, and Exploitation Operations. Candidates should have s strong, hands on background in similar type environments, and have hands on experience with multiple intelligence tools, classified and unclassified cyber tools, and experience performing hands on Cyber Operations. An active TS/SCI with CI Polygraph is required for this position. Fullscope Polygraph is highly preferredSalaries offered will be based on candidates level of expertise, education, and clearance level; but likely fall between 150K - 300KWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"TS/SCI with Poly Cyber Network Defense and Exploitation Analyst","City":"Reston","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- Active TS/SCI with Polygraph- Bachelors Degree and 5+ years of hands on experience in Defensive Cyber, Offensive Cyber, or Exploitation Activities. An Associates Degree or JCAC Graduate and 8 years of experience is also acceptable in lieu of Bachelors Degree- Hands on experience with classified and unclassified tools including IDS/IPS Tools, Offensive Cyber or Threat Hunting tools; as well as Agency specific Tools such as DataXplorer and XKeyScore- Experience preforming technical analysis of computer systems including packet capture analysis, identifying and vulnerabilities and indicators of compromise, and performing computer network operations","Skills":"- Active TS/SCI with Fullscope Polygraph- GCIA, GCIH, GPEN, or OSCP Certifications","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":70.0000,"SalaryLow":56.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is actively hiring multiple Cyber Network Defense and Exploitation Analyst (Blue Team and Red Team) to join our team supporting a large Intelligence Program out of Fort Meade. The... selected candidates will work on a team of Senior Analyst providing a wide range of Computer Network Operations (CNO) including Defensive Cyber Operations, Offensive Cyber Operations, and Exploitation Operations. Candidates should have s strong, hands on background in similar type environments, and have hands on experience with multiple intelligence tools, classified and unclassified cyber tools, and experience performing hands on Cyber Operations. An active TS/SCI with CI Polygraph is required for this position. Fullscope Polygraph is highly preferredSalaries offered will be based on candidates level of expertise, education, and clearance level; but likely fall between 150K - 300KWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Feb 24, 2026

Colorado Springs, CO

|

Security Engineering

|

Contract-to-perm

|

$58 - $72 (hourly estimate)

{"JobID":498555,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-104.76,"Longitude":38.86,"Distance":null},"State":"Colorado","Zip":"80912","ReferenceID":"DEN-6cbfa877-fe19-4694-80a2-40ea135516c5","PostedDate":"\/Date(1771899338000)\/","Description":"Insight Global is seeking a Senior Security Integration Engineer (Elastic Stack) to support the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. The right candidate will possess advanced expertise in logging architecture, SIEM design, data normalization, and systems integration. Job Responsibilities:? Onboarding, integrating, and optimizing security data sources into the Elastic Security Platform. ? Collaborate with customer technical teams to map their environment, plan ingestion strategies, update network and data flow diagrams, validate logging pipelines, and ensure successful end-to-end SIEM integration. ? Conduct assessments of customer environments and identify required logging, telemetry, and network visibility gaps. ? Translate customer operational requirements into ingestion roadmaps and technical implementation plans. ? Develop, maintain, and version-control network diagrams, data flow diagrams, and SIEM onboarding documentation. ? Produce runbooks, integration guides, and operational reference materials. ? Monitor ingestion health and coordinate issue resolution with customers and internal teams. ? Ensure adherence to security policies, logging standards, and architectural governance. ? Provide technical guidance and mentorship to junior engineers working on data ingestion and SIEM onboarding tasks. ? Contribute to onboarding playbooks, best practices, and internal training sessions. ? Serve as a subject-matter expert on Elastic SIEM capabilities and logging integration patterns. This is a contract to hire position, onsite full-time in Colorado Springs, CO or Huntsville, AL the salary range for this role is between $62 - 72/hr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Secret Senior Security Integration Engineer (Elastic Stack)","City":"Colorado Springs","ExpirationDate":null,"PriorityOrder":0,"Requirements":"? Active DoD Secret Security Clearance ? Must be able to obtain/maintain a DoD Top Secret Security Clearance? Current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP)? 10+ years of general (full-time) work experience o May be reduced with completion of advanced education ? 5+ years of experience in cybersecurity engineering, systems integration, or SIEM operations. ? 2+ years of experience in a lead or senior role, mentoring and guiding other team members. ? Posses a strong understanding of enterprise networks, including routing, switching, VPNs, firewalls, and network security tools. ? Experience with data ingestion, processing, and enrichment techniques. ? Experience building and maintaining network and data flow diagrams (e.g., Visio, Lucidchart, Draw.io). ? Must be proficient in Linux systems, command-line tools, and system administration fundamentals. ? Must have experience working directly with customers in a technical consulting or engineering capacity.","Skills":"? Have 1, or more, of the following: Elastic Certified Engineer, Elastic Certified Analyst, or relevant Elastic certifications. ? Have experience with cloud platforms and logging pipelines (AWS, Azure, GCP, cloud\u0002native telemetry). ? Be familiar with ECS (Elastic Common Schema) and data normalization best practices.? Have experience implementing detection engineering or threat hunting workflows in Elastic Security. ? Have knowledge of scripting languages (Python, PowerShell, Bash) to automate ingestion and data validation. ? Have experience integrating EDR, NDR, IAM, and vulnerability management logs into a SIEM. ? Have an understanding of MITRE ATT\u0026CK, cyber kill chain, and threat intelligence ingestion. ? Have experience mentoring or leading small technical teams.","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":72.0000,"SalaryLow":57.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is seeking a Senior Security Integration Engineer (Elastic Stack) to support the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES)... contract. The right candidate will possess advanced expertise in logging architecture, SIEM design, data normalization, and systems integration. Job Responsibilities:? Onboarding, integrating, and optimizing security data sources into the Elastic Security Platform. ? Collaborate with customer technical teams to map their environment, plan ingestion strategies, update network and data flow diagrams, validate logging pipelines, and ensure successful end-to-end SIEM integration. ? Conduct assessments of customer environments and identify required logging, telemetry, and network visibility gaps. ? Translate customer operational requirements into ingestion roadmaps and technical implementation plans. ? Develop, maintain, and version-control network diagrams, data flow diagrams, and SIEM onboarding documentation. ? Produce runbooks, integration guides, and operational reference materials. ? Monitor ingestion health and coordinate issue resolution with customers and internal teams. ? Ensure adherence to security policies, logging standards, and architectural governance. ? Provide technical guidance and mentorship to junior engineers working on data ingestion and SIEM onboarding tasks. ? Contribute to onboarding playbooks, best practices, and internal training sessions. ? Serve as a subject-matter expert on Elastic SIEM capabilities and logging integration patterns. This is a contract to hire position, onsite full-time in Colorado Springs, CO or Huntsville, AL the salary range for this role is between $62 - 72/hr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

1 - 9 of 9