AI Job Assist
Job Seekers, Welcome to NWC Career Center
Search Filters
Use this area to filter your search results. Each filter option allows for multiple selections.
Search Results: 1406 Jobs
Create Alert
Loading... Please wait.
Geisinger Logo
Geisinger

Elysburg, Pennsylvania

Baylor University Logo
Baylor University

Waco, Texas

Empire State University SUNY Logo
Empire State University SUNY

Saratoga Springs, New York

University of the Pacific Logo
University of the Pacific

Stockton, California

Miami University Logo
Miami University

Oxford, Ohio

Veterans Affairs, Veterans Health Administration Logo
Veterans Affairs, Veterans Health Administration

Walla Walla, Washington

Brookhaven National Laboratory Logo
Brookhaven National Laboratory

Upton, NY,

Baylor University Logo
Baylor University

Waco, Texas

Geisinger Logo
Geisinger

Wilkes-Barre, Pennsylvania

Geisinger Logo
Geisinger

Bellefonte, Pennsylvania

Syracuse University Logo
Syracuse University

Syracuse, New York

Geisinger Logo
Geisinger

Wilkes-Barre, Pennsylvania

Syracuse University Logo
Syracuse University

Syracuse, New York

Veterans Affairs, Veterans Health Administration Logo
Veterans Affairs, Veterans Health Administration

Big Spring, Texas

University of Michigan - Flint Logo
University of Michigan - Flint

Flint, Michigan

Baylor University Logo
Baylor University

Waco, Texas

Geisinger Logo
Geisinger

Wilkes-Barre, Pennsylvania

Massachusetts College of Art and Design Logo
Massachusetts College of Art and Design

Boston, Massachusetts

Loading... Please wait.
Associate Security Data Analyst
What We Do:Our team, within the Cyber Risk and Resilience Directorate, researches, designs, and develops software tools for the collection, storage, and analysis of network data to provide security insights. We provide both the core network tools to facilitate this capability, and prototypes of new methods to present the data most effectively. We work with data at a scale generally not experienced by most organizations, handling record counts in the tens of billions per day.Developing security insights at this scale requires creativity, efficiency, and contemporary knowledge of modern computing platforms. In some cases, the computing has outpaced the methods, and it is incumbent u


This job listing is no longer active.

Check the left side of the screen for similar opportunities.
Loading. Please wait.