<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Corinth Jobs</title>
    <link>http://j.brt.mv/CompanyPortal.do?companyGK=57204&amp;portalGK=48943</link>
    <description><![CDATA[Job Postings available for application.]]></description>
    <language>en-us</language>
    <pubDate>Wed, 13 May 2026 11:30:20 EDT</pubDate>
    <lastBuildDate>Wed, 13 May 2026 11:30:20 EDT</lastBuildDate>
    <generator>BrightMove ATS</generator>
    <item>
      <title><![CDATA[AV & Telecommunications Technician - New York, NY]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27776517&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>03d0fb54-9865-4bf9-a751-1696266992ba</guid>
      <description><![CDATA[Position Title: AV & Telecommunications Technician
Location: Onsite &ndash; Manhattan (SDNY) & Brooklyn (EDNY), New York
Employment Type: Full-Time, Exempt
Salary Range: $80,711 &ndash; $109,990
Work Schedule: Monday&ndash;Friday, 8:00 AM &ndash; 5:00 PM (on-call support required)
Clearance Requirement: Ability to obtain and maintain a Public Trust (NACI Background Investigation)
Citizenship Requirement: U.S. Citizenship required

Position Overview
Corinth is seeking an experienced AV & Telecommunications Technician to serve as the primary technical authority supporting audiovisual systems, courtroom technology, telecommunications, and video conferencing operations for two locations in Manhattan and Brooklyn.
This role operates with a high degree of autonomy and requires strong professional judgment to diagnose complex technical issues, develop solutions independently, and execute corrective actions that directly support federal legal proceedings and law enforcement operations. The ideal candidate is a hands-on technical expert who is adaptable, calm under pressure, and comfortable serving as the on-site decision-maker in mission-critical environments.

Required Qualifications

Minimum five (5) years of experience supporting video conferencing platforms and audiovisual systems
Minimum five (5) years of carrier-level telecommunications experience, including PRI circuits and POTS lines
Strong experience with AV, VoIP, and telephony systems in enterprise or government environments
Demonstrated ability to troubleshoot and resolve complex issues independently
U.S. citizenship and ability to obtain and maintain a Public Trust clearance


Technical Experience & Skills
Audiovisual & Conferencing

Audio-visual equipment setup and operation
Microphone systems (wired/wireless, gain, echo, feedback control)
Projectors, displays, and signal configuration (EDID/HDCP)
Press conference streaming and recording
Video conferencing platforms (Microsoft Teams, Zoom, Webex)

Telecommunications & VoIP

VoIP and eVoIP system administration
PRI circuit and POTS line troubleshooting
Phone system provisioning and administration
Telephony carrier coordination and issue resolution

Networking & IT Support

TCP/IP networking fundamentals
DHCP vs. static IP configuration
VLAN, PoE, and QoS concepts
Ethernet termination, cable testing, and certification
Tier II/III help desk support

Professional Skills

Strong written and verbal communication
Ability to support users at all technical levels
Public speaking and user training experience
Excellent troubleshooting, prioritization, and documentation skills


Key Responsibilities
Courtroom and Trial Support
&bull;        Independently assess and configure courtroom technology for trials and hearings &mdash; including video projectors, flat-screen monitors, televisions, and laptops &mdash; making real-time technical decisions on layout, signal routing, and system compatibility with no supervisory input required.
&bull;        Conduct pre-proceeding technology readiness evaluations for trial rooms and courtrooms, applying professional judgment to identify system risks, determine remediation actions, and independently clear or escalate issues before proceedings begin &mdash; decisions with direct consequence if made incorrectly.
&bull;        Serve as the primary technical liaison and on-site decision-maker between each district and the respective courthouse technicians, independently evaluating, prioritizing, and directing remediation of AV and infrastructure issues affecting SDNY and EDNY courthouse equipment.
Audiovisual Systems
&bull;        Exercise full technical authority in configuring and operating all AV equipment for press conferences, including audio, video, recording, and live streaming, independently determining setup parameters, signal chain configurations, and contingency responses during live events where system failure is not an option.
&bull;        Apply advanced acoustic knowledge to independently diagnose and resolve microphone system issues (wired and wireless), including gain adjustment, echo reduction, and feedback control, making real-time tuning decisions during active proceedings where no delay for consultation is feasible.
&bull;        Independently evaluate, maintain, and restore projectors, displays, and conference room AV environments, applying expert judgment on EDID/HDCP compliance, signal integrity, and failure root cause, and determine the appropriate corrective action without awaiting supervisory direction.
&bull;        Configure, optimize, and troubleshoot conference room video platforms including Microsoft Teams, Zoom, and Webex independently selecting and adjusting platform settings, network parameters, and hardware integrations to ensure seamless operation for government proceedings.
Telephony, VoIP, and Carrier Coordination
&bull;        Exercise independent judgment in managing all telephone system operations, including diagnosing failures, executing in-house repairs, and making the autonomous determination of when an issue requires escalation through EOUSA-designated systems versus resolution at the technician level.
&bull;        Independently program and configure phone systems for incoming staff and deactivate accounts for departing personnel, applying technical judgment to ensure continuity of communications and compliance with security protocols without requiring step-by-step direction.
&bull;        Maintain and optimize current eVoIP systems while independently evaluating migration sequencing, compatibility risks, and cutover timing for transitions to new telephony platforms in coordination with IT staff, providing technical recommendations that directly shape implementation decisions.
&bull;        Independently manage relationships with telephony carriers to maintain and restore T1 and PRI circuits in EDNY and SDNY computer rooms, including analyzing carrier bills for billing errors, identifying discrepancies, and directing corrections without requiring supervisory involvement in the technical assessment.
&bull;        Provide backup coverage for incoming calls on the main office line, exercising judgment to triage, route, and resolve caller needs in a manner consistent with the professional standards of a federal law enforcement environment.
Networking and Cabling
&bull;        Independently assess cabling requirements, design and install new data cabling infrastructure, and diagnose cabling-related network outages, applying technical judgment to determine appropriate cable routing, termination methods, and testing standards without requiring prescriptive direction.
&bull;        Perform Ethernet terminations and independently execute cable testing and certification, determining pass/fail disposition and identifying corrective actions based on professional interpretation of test results.
&bull;        Apply advanced knowledge of TCP/IP, DHCP vs. static IP addressing, VLAN design concepts, and PoE/QoS configurations to independently diagnose network-layer issues affecting AV and telephony systems and implement solutions with an understanding of downstream operational impact.
Help Desk and IT Support
&bull;        Serve as a Tier II/III technical resource for multiple site end-user technology issues, independently triaging requests, determining resolution priority based on mission impact, and resolving complex problems that exceed first-line support capability.
&bull;        Independently plan, configure, and manage video conferences for district employees, assessing platform requirements, network conditions, and participant needs, and serve as the technical decision-maker during live sessions to resolve issues in real time without disrupting proceedings.
&bull;        Develop and maintain a structured labeling and organizational system for AV, server, and VoIP equipment, independently determining taxonomy, asset tracking methodology, and documentation standards to support efficient identification, troubleshooting, and lifecycle management.
&bull;        Lead and execute special projects including PC refresh, network refresh, and VoIP phone system refresh initiatives, independently assessing scope, sequencing tasks to minimize service disruption, and making implementation decisions that reflect both technical best practices and operational realities of a live federal environment.
Training and User Support
&bull;        Independently design and deliver training programs for new telephone system users, assessing learner needs, developing instructional content, and adapting delivery approach based on the technical proficiency of the audience, without requiring a pre-established curriculum.
&bull;        Deliver live demonstrations of desktop device features and telephony toolbar functionality, independently determining the scope, sequence, and depth of content based on the operational needs and technical baseline of each user group.
&bull;        Develop and present new feature and functionality briefings to groups of up to 50 personnel, independently determining appropriate technical depth, anticipating user questions, and communicating complex system changes in operationally relevant terms.
&bull;        Independently assess equipment condition and failure risk, make replacement decisions, and manage spare inventory levels, applying professional judgment to balance cost, availability, and operational continuity to minimize end-user downtime in a mission-critical environment.
Independent Judgment and Decision-Making Authority
&bull;        Determine the appropriate technical response to system failures during active legal proceedings when supervisory guidance is unavailable and delay is operationally unacceptable, a judgment call made independently and in real time.
&bull;        Evaluate multiple technically viable solutions and select or recommend the option that best balances performance, cost, schedule, and mission risk, a determination that is final for all standard-scope decisions within this role.
&bull;        Assess whether a new or changed requirement falls within existing contract scope or warrants a formal change request, and communicate that determination to program management with supporting technical rationale.
&bull;        Identify systemic issues through analysis of failure patterns and maintenance history and independently propose process or configuration changes to address root causes, exercising the same analytical and advisory function expected of a technical expert, not a task-level worker.

Why Join Us

Support high-impact federal missions where your expertise directly affects outcomes
Work autonomously as a trusted technical expert
Engage in diverse, hands-on technical work across AV, telecom, and IT domains
Collaborate with mission-focused professionals in a dynamic environment


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employer-sponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer.
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 30 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Program Manager - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775126&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>bbdce12a-0030-4489-b16e-82b67ea8917a</guid>
      <description><![CDATA[Position Title: Program Manager
Location: Hybrid near Stennis, MS
Employment Type: Full-Time
Salary Range: $185,000 - $210,000
Work Schedule: Standard business hours with on-call support as required
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Program Manager to provide leadership and oversight for a large, complex cybersecurity operations program supporting a missioncritical environment. This role is responsible for managing the successful delivery of security operations, incident response, threat intelligence, threat hunting, forensics, and supporting engineering and development functions.
The Program Manager serves as the primary point of coordination across multiple teams and stakeholders, ensuring operational continuity, quality delivery, and alignment with strategic objectives. This position requires a strong blend of cybersecurity knowledge, program management expertise, and the ability to lead in a fastpaced, highvisibility environment.
The ideal candidate is a seasoned leader with experience managing enterprisescale security programs, mitigating risk, resolving complex issues, and driving continuous improvement across people, processes, and technology.

Key Responsibilities

Provide overall program leadership and operational oversight across a complex cybersecurity operations environment
Serve as the primary point of coordination among internal leadership, operational teams, and external stakeholders
Ensure consistent delivery of services across multiple functional areas, including:

Cybersecurity operations and incident response
Threat detection and analysis
Forensics and investigations
Supporting engineering and automation functions

Lead program planning activities, including resourcing, staffing alignment, risk identification, and issue resolution
Oversee development and execution of management plans related to communications, quality, and risk
Deliver regular status updates, performance metrics, and leadership briefings
Identify operational risks and develop mitigation strategies to ensure continuity and quality of service
Drive continuous improvement across people, processes, and technology
Ensure adherence to applicable security standards, policies, and best practices


Required Qualifications

BA/BS degree or a minimum of five (5) years of experience managing largescale cybersecurity or security operations programs
Five (5) years of program or project management experience in complex, multiteam environments
Active certifications:

CISSP
CISM
PMP

Ability to obtain and maintain a Top Secret / SCI clearance
Proven experience leading enterprisescale security or technology programs
Strong leadership, communication, and stakeholder management skills


Desired Skills

Strong understanding of Security Operations Centers (SOC), incident response, and cyber defense operations
Experience leading geographically dispersed or hybrid teams
Demonstrated strength in risk management, quality assurance, and performance reporting
Ability to communicate effectively with both technical and executive audiences
Experience operating in fastpaced, missionfocused environments


Why Join Us

Lead a highimpact cybersecurity operations program in a missioncritical environment
Work in a role with significant visibility and influence
Collaborate with experienced professionals across cybersecurity, engineering, and operations
Help shape and mature enterprisescale security capabilities


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting.
Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Investigation Support Analyst - Camp Springs,]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775125&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>4936e4a0-ba3c-46c4-a324-b7a3664f744b</guid>
      <description><![CDATA[Position Title: Investigation Support Analyst
Location: Hybrid with possibility of remote, near Camp Springs, MD
Employment Type: FullTime
Salary Range: $110,000 - $126,000
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking a skilled Investigation Support Analyst to support cybersecurity investigations, incident response, and malware analysis efforts. This role is responsible for conducting indepth digital forensic analysis, reverse engineering malicious code, and supporting containment and recovery activities following cybersecurity incidents.
The ideal candidate has handson experience with forensic and cybersecurity tools, strong analytical skills, and a solid understanding of operating systems, networking, and malware analysis techniques.

Required Qualifications

Minimum 2 years of experience using digital forensic tools such as EnCase, FTK, AXIOM, or equivalent
At least 3 years of experience with cybersecurity and security monitoring tools, including FireEye, Microsoft ATA, Splunk, Exabeam, Stealthwatch, and Wireshark
Experience with debugging tools (ollydbg, WinDbg, Immunity Debugger) and disassembly tools (IDA Pro)
Handson experience with reverse engineering and malware analysis
Strong understanding of programming and operating system concepts
Basic working knowledge of Linux/UNIX commandline, TCP/IP, and networking fundamentals


Desired Skills

Experience supporting SOC or CSIRT operations
Strong analytical, investigative, and documentation skills
Ability to communicate technical findings clearly to varied audiences
Experience working in incident response or threat analysis environments


Key Responsibilities

Perform digital forensic investigations using tools such as EnCase, FTK, AXIOM, or similar platforms
Use cybersecurity tools (e.g., FireEye, Microsoft ATA, Splunk, Exabeam, Stealthwatch, Wireshark) to support incident detection and response
Conduct malware analysis, reverse engineering, and code disassembly using tools such as IDA Pro
Utilize debugging tools including ollydbg, WinDbg, and Immunity Debugger to analyze malicious activity
Analyze malicious code to determine functionality, impact, and indicators of compromise
Support and lead incident response activities, including containment, eradication, and recovery
Work across multiple operating systems and programming environments to support forensic analysis
Use Linux/UNIX commandline tools and apply TCP/IP and networking concepts during investigations
Maintain detailed, accurate documentation of forensic findings and security incidents
Ensure all activities comply with established security protocols, policies, and procedures


Why Join Us

Work on complex and highimpact cybersecurity investigations
Apply advanced forensic and malware analysis techniques
Collaborate with experienced cybersecurity, incident response, and threat analysis professionals
Support missioncritical systems and data protection efforts


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Applied Intelligence Analyst - Camp Springs, MD]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775122&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>c8048804-0204-4a6e-a8bc-d73ef9b9b1bf</guid>
      <description><![CDATA[Position Title: Applied Intelligence Analyst
Location: Camp Springs, MD
Employment Type: Fulltime
Salary Range: $113,000 - $125,000
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Applied Intelligence Analyst to support missioncritical operations by assessing potential cyber and intelligencerelated incidents and delivering actionable insights. This role focuses on analyzing threat data, correlating intelligence from multiple sources, and producing highquality intelligence products that guide operational decisionmaking.
The ideal candidate brings a strong background in intelligence analysis, cyber threat assessment, and allsource research within the U.S. Intelligence Community.

Required Qualifications

Education & Experience:

Associate degree with 4 years of relevant operational experience OR
Bachelor&rsquo;s degree with 2 years of relevant operational experience

Minimum 5 years of intelligence analysis experience within the U.S. Intelligence Community
Prior analytical experience from the military or other intelligence community organizations
Demonstrated expertise in intelligence collection, analysis, and dissemination techniques
Experience producing finished intelligence products with minimal supervision
Subjectmatter experience in one or more of the following:

Cyber Security
Border Security / Border Protection
Illicit Financial Practices

Experience analyzing raw intelligence data to produce finished intelligence reports
Proficiency working with allsource intelligence resources, including opensource, unclassified, and classified databases
Ability to obtain and maintain a Top Secret / SCI clearance


Desired Skills

Strong analytical and criticalthinking skills
Experience working in fastpaced, missiondriven environments
Ability to clearly communicate complex intelligence findings to technical and nontechnical audiences
Familiarity with cyber threat actor methodologies and malware analysis


Key Responsibilities

Assess indicators of compromise (IOCs) to determine potential impact to organizational systems and operations
Correlate threat intelligence and analyze network events to identify operational risks
Conduct allsource intelligence research to evaluate adversary capabilities, intent, and activity
Develop analytical models to identify malware activity, threat actors, and incident patterns using statistical analysis
Analyze network and system activity through log correlation using tools such as Splunk
Investigate threats across Windows, Linux, databases, applications, web servers, firewalls, and related technologies
Analyze security alerts to determine validity, scope, and potential risk
Respond to advanced threat activity by triaging alerts, reviewing logs, identifying extent of compromise, and generating indicators of compromise
Support efforts to deter, disrupt, and prevent sophisticated cyber threats
Produce timely, accurate intelligence products including written reports, briefings, and presentations


Why Join Us

Support highimpact national security missions
Work alongside experienced intelligence and cyber professionals
Contribute directly to protecting systems, data, and organizational operations


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Threat Hunt Lead - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775133&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>597dcd2d-e6be-4d24-a38f-35f9c789f3ca</guid>
      <description><![CDATA[Position Title: Threat Hunt Lead
Location: Hybrid near Stennis, MS
Employment Type: Full-Time
Salary Range: $116,000 - $126,000
Work Schedule: Standard business hours with oncall support as required
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Threat Hunt Lead to provide technical leadership and operational oversight for proactive threat hunting activities within a missioncritical cybersecurity operations environment. This role is responsible for guiding advanced threat hunting efforts, identifying sophisticated adversary behavior, and improving detection capabilities across enterprise systems and networks.
The Threat Hunt Lead serves as the senior authority for threat hunting methodologies, working closely with security operations, incident response, intelligence, and engineering teams to identify, analyze, and mitigate emerging threats. The ideal candidate brings deep handson threat hunting expertise, strong analytical skills, and the ability to lead complex investigations in a hightempo environment.

Key Responsibilities

Lead and oversee advanced threat hunting operations, identifying malicious activity not detected by standard security controls
Develop, refine, and execute proactive threat hunting strategies and methodologies
Analyze endpoint, network, and log data to uncover indicators of compromise, attacker techniques, and adversary behavior
Leverage intelligence sources, behavioral analytics, and threat frameworks to guide hunt activities
Serve as the primary technical escalation point for complex or highrisk threat investigations
Collaborate with incident response, SOC, SADOM, RDS, and intelligence teams to improve detection and response capabilities
Translate hunt findings into actionable detection improvements, signatures, and analytical content
Produce clear documentation and reporting on hunt findings, trends, and recommendations
Mentor and guide threat hunters and analysts, fostering skill development and operational consistency
Contribute to continuous improvement of processes, tooling, and automation supporting threat hunting


Required Qualifications

BA/BS degree or a minimum of five (5) years of experience in cybersecurity operations, threat hunting, or incident response
Demonstrated expertise in threat hunting, adversary tracking, and behavioral analysis
Handson experience analyzing endpoint, network, and security telemetry
Active cybersecurity certifications such as:

CISSP
CEH
GCED / GCIH / GCIA
Or other comparable certifications approved in advance

Ability to obtain and maintain a Top Secret / SCI clearance (SCI eligibility required)


Desired Skills

Deep familiarity with adversary tactics, techniques, and procedures (TTPs)
Experience conducting hypothesisdriven and datadriven threat hunts
Strong understanding of endpoint detection and response (EDR), SIEM, and security analytics platforms
Experience correlating threat intelligence with operational telemetry
Ability to communicate complex findings clearly to both technical and leadership audiences
Experience leading or mentoring analysts in advanced security operations environments


Why Join Us

Lead proactive threat hunting efforts in a highimpact cybersecurity environment
Work with skilled cyber professionals across intelligence, operations, and engineering
Influence detection strategy and enterprise security posture
Contribute directly to identifying and stopping advanced threats


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting.
Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Operations Manager (OPS Manager) - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775131&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>da75e713-8aa5-48e9-a2cb-2950ea2c5441</guid>
      <description><![CDATA[Position Title: Operations Manager (OPS Manager)
Location: Hybrid near Stennis, MS
Employment Type: Full-Time
Salary Range: $138,000 - $148,000
Work Schedule: Standard business hours with oncall support as required
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Operations Manager (OPS Manager) to oversee daytoday execution and continuity of a large, complex cybersecurity operations environment. This role is responsible for ensuring consistent performance, operational readiness, and coordination across multiple functional teams supporting missioncritical security operations.
The Operations Manager works closely with senior leadership to manage operational workflows, respond to surge activity, and ensure teams are aligned with established processes, standards, and objectives. The ideal candidate brings strong cybersecurity operations experience, leadership presence, and the ability to manage competing priorities in a fastpaced environment.

Key Responsibilities

Ensure continuity of operations across multiple cybersecurity functional areas
Support oversight of daily security operations, responding to increased workload, staffing gaps, or significant security events as needed
Assist senior program leadership with operational planning, coordination, and execution
Perform operational duties during surge scenarios or incidents, including handson support when warranted
Lead development and maintenance of:

Policies and procedures
Operational playbooks and workflows
Training materials and afteraction reports

Support security gap assessments and identification of process improvement opportunities
Contribute to development of structured response processes, including automation and workflow optimization
Collaborate with technical, engineering, and operations teams to ensure alignment with operational priorities
Provide clear status updates, operational insights, and recommendations to leadership


Required Qualifications

BA/BS degree or a minimum of five (5) years of experience in security engineering, security operations, or security incident response
Active CISSP and CISM certifications (or other comparable certifications approved in advance)
Demonstrated experience managing or supporting complex cybersecurity operations environments
Ability to obtain and maintain a Top Secret / SCI clearance (SCI eligibility required)


Desired Skills

Strong understanding of Security Operations Center (SOC) processes and incident response frameworks
Experience developing operational procedures, playbooks, and response workflows
Familiarity with cybersecurity automation and orchestration concepts
Ability to lead in dynamic, hightempo operational environments
Strong written and verbal communication skills, including the ability to brief leadership
Proven ability to collaborate across technical and operational teams


Why Join Us

Play a critical leadership role ensuring stability and effectiveness of cybersecurity operations
Work closely with senior leaders and highly skilled cyber professionals
Contribute directly to operational maturity and process improvement
Engage in meaningful, missionfocused work in a complex technical environment


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting.
Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[SADOM Lead (Security Application, Device Operations & Maintenance) - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775130&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>fdbe2982-cebc-4f87-ad4e-3dc29cf59a15</guid>
      <description><![CDATA[Position Title: SADOM Lead (Security Application, Device Operations & Maintenance)
Location: Hybrid near Stennis, MS
Employment Type: Full-Time
Salary Range: $120,000 - $132,000
Work Schedule: 12x5 coverage (Monday&ndash;Friday, 6:00 AM &ndash; 6:00 PM CST) with after-hours support as required
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced SADOM Lead to provide technical leadership and operational oversight for security applications, devices, and tools supporting a missioncritical cybersecurity operations environment. This role is responsible for ensuring the availability, performance, and continuous improvement of security technologies that enable incident detection, response, and analysis.
The SADOM Lead serves as the senior technical authority for tool operations and maintenance, leading a team of engineers responsible for administration, integration, tuning, and optimization of enterprise security platforms. The ideal candidate combines strong handson technical expertise with leadership experience in hightempo security operations environments.

Key Responsibilities

Lead and oversee operations and maintenance of security applications and devices supporting cybersecurity operations
Ensure 24x7 availability of security tools, providing 12x5 coverage with after-hours support as required
Direct and support engineers in:

Administration, configuration, patching, upgrades, and optimization of security tools
Deployment and integration of new security technologies and content

Manage and tune detection signatures to maximize true positives and minimize false positives
Oversee documentation of configurations, procedures, and tool tuning activities
Develop and maintain standard operating procedures (SOPs) and technical documentation
Coordinate execution of approved access requests, user recertifications, and account removals
Serve as the primary technical escalation point for complex tool or platform issues
Collaborate with security operations, engineering, and development teams to ensure tools align with operational needs
Identify opportunities to enhance tool effectiveness, automation, and operational resilience


Required Qualifications

BA/BS degree or a minimum of three (3) years of experience in incident detection and response and three (3) years of experience in one or more of the following:

System administration
Network engineering
Software engineering or development
Database administration

At least two (2) active cybersecurity certifications, such as:

Security+ CE
CASP
CCNA
CISSP
Or other comparable certifications

Demonstrated experience administering and supporting enterprise security tools
Ability to obtain and maintain a Top Secret / SCI clearance (SCI eligibility required)


Desired Skills

Experience leading technical teams in security operations environments
Strong understanding of security monitoring, detection, and response workflows
Experience with configuration management and automation tools (e.g., Ansible, Chef, PowerShell)
Ability to clearly document processes and communicate technical concepts to diverse audiences
Strong problemsolving skills and comfort operating in fastpaced, missionfocused environments


Why Join Us

Lead a critical function supporting enterprisescale cybersecurity operations
Work handson with advanced security tools and technologies
Collaborate with experienced cyber professionals across operations and engineering
Make a direct impact on the reliability and effectiveness of security defenses


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting.
Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[RDS Lead (Cybersecurity Solutions Research & Development Lead) - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775132&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>1bd6d003-9d5d-46d2-b3c0-8edd8e9c20d6</guid>
      <description><![CDATA[Position Title: RDS Lead (Cybersecurity Solutions Research & Development Lead)
Location: Hybrid near Stennis, MS
Employment Type: Full-Time
Salary Range: $120,000 - $130,000
Work Schedule: Standard business hours with oncall support as required
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced RDS Lead to provide seniorlevel technical leadership for cybersecurity solutions research and development in a missioncritical environment. This role serves as the highest technical escalation point, supporting complex security initiatives, emerging threat mitigation, and development of innovative security capabilities.
The RDS Lead bridges multiple operational and engineering functions, ensuring continuity, technical consistency, and alignment across cybersecurity operations, incident response, engineering, and development teams. The ideal candidate is a handson cybersecurity expert with deep technical breadth, strong problemsolving skills, and the ability to lead complex initiatives from concept through implementation.

Key Responsibilities

Serve as the technical authority and escalation point for complex cybersecurity issues
Lead research and development efforts to identify, design, and implement solutions addressing security gaps
Provide subjectmatter technical expertise across multiple cybersecurity disciplines, supporting operational and engineering teams
Identify and recommend industry best practices to enhance security operations and overall cyber posture
Support analysis of alternatives and development of innovative technical approaches
Develop security controls and capabilities using structured user stories aligned to established frameworks and policies
Collaborate with stakeholders to prioritize, organize, and implement security enhancements
Support design and deployment of incident response solutions and defenseindepth strategies
Provide technical guidance and mentorship to engineering and operations personnel
Participate in special cybersecurity initiatives and projects as assigned


Required Qualifications

BA/BS degree or a minimum of five (5) years of experience in security engineering or security operations and five (5) years of experience in security incident response
Active CISSP certification (or other comparable certification approved in advance)
Active CISM and CEH certifications (or comparable alternatives approved in advance)
Demonstrated experience solving complex cybersecurity problems across enterprise environments
Ability to obtain and maintain a Top Secret / SCI clearance (SCI eligibility required)


Desired Skills

Deep understanding of cybersecurity operations, incident response, and security engineering
Experience developing security solutions aligned to frameworks and best practices
Strong analytical and criticalthinking skills
Ability to communicate complex technical concepts clearly to technical and nontechnical audiences
Experience working across multiple cybersecurity functions and disciplines
Comfort operating in hightempo, missionfocused environments


Why Join Us

Lead advanced cybersecurity research and development efforts
Influence design and implementation of enterprisescale security solutions
Collaborate with experienced cybersecurity professionals across multiple domains
Make a direct impact on the effectiveness and resilience of security defenses


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting.
Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth is an Equal Opportunity Employer
We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Threat Intelligence Lead - Camp Springs, MD]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775120&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>3db4273c-121c-4e0f-a274-6337eaff1f27</guid>
      <description><![CDATA[Position Title: Threat Intelligence Lead
Location: Camp Springs, MD
Employment Type: FullTime
Salary Range: $150,000 - $165,000
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Threat Intelligence Lead to support cyber intelligence (CI) operations focused on identifying, analyzing, and reporting on cybercrime, hacktivism, and Advanced Persistent Threats (APTs). This role leads intelligence analysis efforts that leverage opensource, social media, technical, human, and classified intelligence sources&mdash;including the Deep and Dark Web&mdash;to assess adversary actors, intent, and capability.
The ideal candidate brings deep experience within the U.S. Intelligence Community, strong analytical judgment, and the ability to produce highquality intelligence products with minimal oversight.

Required Qualifications

Education & Experience:

Associate degree with 4 years of operational intelligence experience, OR
Bachelor&rsquo;s degree with 2 years of operational intelligence experience

Minimum 5 years of intelligence analysis experience within the U.S. Intelligence Community
Prior analytical experience in the military or other intelligence organizations
Demonstrated expertise in intelligence collection, analysis, and dissemination techniques
Ability to independently produce highquality, finished intelligence reports
Experience analyzing raw intelligence data to produce actionable intelligence products
Experience working with allsource intelligence, including opensource, unclassified, and classified databases
Subjectmatter experience in one or more of the following areas:

Cybersecurity
Border Security / Border Protection
Illicit Financial Practices

Ability to obtain and maintain a Top Secret / SCI clearance


Desired Skills

Strong leadership, analytical, and research skills
Familiarity with adversary infrastructure tracking and threat actor profiling
Ability to communicate complex intelligence findings clearly to technical and nontechnical audiences
Experience publishing intelligence products to internal or interagency communities


Key Responsibilities

Conduct research and analysis on emerging cyber threats, cyber warfare techniques, and adversary offensive capabilities
Identify current, emerging, or planned targeted intrusions against the enterprise using public and private intelligence sources and advanced analytical methodologies
Perform opensource and webbased research, including analysis of the Deep Web and Darknet
Collect and analyze classified APT intelligence, including:

Event and threat correlation
Trend analysis
Proactive adversary infrastructure identification and tracking
Strategic, securityfocused intelligence assessments

Analyze adversary tactics, techniques, and procedures (TTPs), motivations, and access to intended targets
Assist with automation of Indicators of Compromise (IOC) collection and implementation
Generate and publish intelligence reports and briefings for internal stakeholders and the broader intelligence community
Analyze mobility and technical reports to identify vulnerabilities in governmentfurnished mobile devices
Collaborate with technical and operational teams to evaluate and test security solutions that support program objectives


Why Join Us

Lead intelligence efforts supporting highimpact national security missions
Work at the intersection of cyber threat intelligence and operational defense
Collaborate with experienced intelligence, cybersecurity, and operational professionals
Influence proactive defense strategies through highquality intelligence analysis


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Advanced Threat Hunter (ATH) - Leesburg, VA]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27775124&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>d2a6a2cc-879b-45b2-b6a9-d74280a3f556</guid>
      <description><![CDATA[Position Title: Advanced Threat Hunter (ATH)
Location: Remote
Employment Type: FullTime
Salary Range: $100,000 - $116,000
Work Schedule: 12x5 coverage (Monday&ndash;Friday, 6:00 AM &ndash; 6:00 PM CST) with afterhours oncall support
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI

Position Overview
We are seeking an experienced Advanced Threat Hunter (ATH) to support proactive detection, analysis, and mitigation of highly sophisticated cyber threats. This role focuses on identifying advanced persistent threats (APTs), analyzing complex network and application activity, and strengthening organizational defenses through advanced analytics, deception technologies, and continuous risk assessment.
The ideal candidate is highly technical, analytical, and experienced in threat hunting, malware analysis, and enterprise security monitoring in missioncritical environments.

Required Qualifications

Demonstrated experience with APT detection and prevention tools such as:

FireEye HX
Cisco Advanced Malware Detection
ThreatGrid
Exabeam

Strong experience with:

Windows servers, domain controllers, databases, Group Policy, and firewall/network filtering
Linux/Unix operating systems and file systems

Experience performing:

NETFLOW and PCAP analysis using tools such as Wireshark, Cisco Stealthwatch, or AWS VPC Flow Logs
Realtime security event monitoring and anomaly detection using Splunk

Proven experience conducting:

Malware forensic analysis (live system, sandbox, static, and memory/RAM analysis)
Full lifecycle malware investigation and documentation

BA/BS or minimum of three (3) years of experience in forensics and incident response
Minimum two (2) years of handson experience with Splunk and Wireshark
At least two (2) active cybersecurity certifications, such as:

Security+
CISSP
GCIH, GCIA, GREM, GSEC, GCED, GCFA, GSLC, GSNA, GAWN, GPPA, GSE
Or other comparable certifications



Desired Skills

Strong analytical, problemsolving, and investigative skills
Ability to clearly document and communicate technical findings to diverse audiences
Experience working in highvisibility, missionfocused environments
Strong collaboration skills with SOC and engineering teams


Key Responsibilities

Provide 12x5 operational coverage and afterhours oncall support to detect, analyze, and mitigate advanced cyber threats
Conduct advanced packetlevel traffic analysis and reconstruct network activity to identify anomalies, trends, and threat patterns
Perform indepth web and application log analysis to identify suspicious or malicious behavior
Search for indicators consistent with advanced persistent threats (APTs)
Perform pattern, trend, and behavior analysis using multiple data sources
Design, deploy, and manage deception technologies (e.g., honeypots, lures, traps)
Conduct forensic analysis and documentation of malware incidents from initial compromise through remediation
Collaborate with SOC teams to assess and monitor key risk areas, including publicfacing systems and sensitive databases
Develop and maintain SOPs, provide training, and support implementation of security solutions
Produce clear, comprehensive reports and actionable recommendations based on findings
Identify opportunities to enhance cyber detection capabilities and close security gaps
Support cyber requirements analysis and tracking activities


Why Join Us

Work on advanced cyber defense missions protecting critical systems and data
Apply cuttingedge threat hunting and forensic techniques
Collaborate with experienced cybersecurity professionals in a dynamic environment


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[CSIRT Lead - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774820&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>2ba19a30-8ea6-4cfd-ab34-12cad8a7b157</guid>
      <description><![CDATA[Position Title: CSIRT Lead
Location: Stennis, MS
Employment Type: FullTime
Salary Range: $95,000 - $105,000
Work Schedule: M-F and on-call support
Clearance Requirement: Ability to obtain and maintain Top Secret / SCI (TS/SCI) clearance

Position Overview
We are seeking a CSIRT Lead to provide leadership and operational oversight within a Cyber Security Incident Response Team (CSIRT) environment. This role is responsible for guiding incident response activities, coordinating analysis and remediation efforts, and ensuring timely, effective handling of cybersecurity events and incidents.
 
The CSIRT Lead serves as a senior technical and operational authority, working closely with analysts, engineers, and stakeholders to maintain situational awareness, manage incident workflows, and support continuous improvement of incident response processes.

Required Qualifications

Bachelor&rsquo;s degree or equivalent relevant experience
Demonstrated experience leading or supervising incident response or security operations teams
Strong background in cybersecurity incident detection, analysis, and response
Experience working in a 24x7 operations or missioncritical environment
Strong analytical, decisionmaking, and problemsolving skills
Ability to effectively communicate technical information to diverse audiences


Certifications
The following certifications are required or expected for this role:

Security+ or ISC&sup2; CISSP (or comparable certification)
GCIH or other comparable incident response certifications (preferred)


Technical Skills (Desired)

Experience with security monitoring and incident management tools
Familiarity with incident tracking systems and workflow management platforms
Knowledge of common attack vectors, threat tactics, and incident response methodologies
Strong documentation and reporting skills


Key Responsibilities

Lead and oversee daytoday CSIRT operations in a 24x7 incident response environment
Coordinate monitoring, triage, investigation, and response to cybersecurity events and incidents
Provide guidance and escalation support to CSIRT analysts during complex or highimpact incidents
Ensure incidents are properly documented, tracked, and resolved in accordance with established procedures
Support incident coordination activities, including incident bridges and response communications
Develop, maintain, and enhance incident response SOPs, playbooks, and reporting processes
Provide situational awareness and status updates to leadership as required
Support coordination with internal teams and external partners during incident response activities
Participate in afteraction reviews and contribute to lessons learned and process improvements
Assist with training and mentoring CSIRT analysts to strengthen team capabilities


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, well being, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employer sponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Technical Writer (Cybersecurity) - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774816&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>9c7b3d4c-e237-422b-b084-8f6d92be5956</guid>
      <description><![CDATA[Position Title: Technical Writer
Location: Stennis, MS
Employment Type: FullTime
Salary Range: $72,000 - $84,000
Citizenship: U.S. Citizen required

Position Overview
We are seeking an experienced Technical Writer to support the development of clear, accurate, and highquality technical documentation in a cybersecurity environment. This role is responsible for translating complex technical and cyber concepts into wellstructured documentation for a variety of stakeholders, working closely with subjectmatter experts (SMEs) in a fastpaced, missiondriven environment.
 
The ideal candidate has a strong background in IT and cybersecurity documentation, excellent communication skills, and the ability to synthesize technical data into usable, audienceappropriate materials.

Required Qualifications

Minimum three (3) years of experience preparing and writing complex technical documentation
Minimum two (2) years of experience specializing in IT technical writing
Experience working in a cybersecurity or IT environment
Strong written and verbal communication skills with the ability to clearly explain technical concepts
Advanced proficiency in Microsoft Excel and Microsoft Access for reporting and data analysis
Ability to read, interpret, and extract information from security and technical documentation


Certifications

At least one active certification, such as:

CompTIA A+, Network+, or Security+
ISC2 CISSP
Or other comparable certification (subject to Government PM approval)



Preferred Qualifications

Bachelor&rsquo;s degree in English, Journalism, Business, Cybersecurity, or a related field
Prior experience as a technical writer in a cybersecurity environment
Strong interpersonal, collaboration, and stakeholderengagement skills
Ability to produce highquality content under tight deadlines


Key Responsibilities

Prepare, write, edit, and maintain complex technical documentation related to IT and cybersecurity operations
Collaborate closely with technical and cybersecurity SMEs to gather information and clarify requirements
Translate technical, cyber, and security concepts into clear, concise, and wellorganized documentation
Review security documentation and extract relevant security control information as needed
Support reporting efforts through data mining, correlation, and analysis using Microsoft Excel and Access
Ensure documentation is accurate, consistent, and aligned with applicable standards and requirements
Manage multiple documentation tasks while meeting deadlines in a fastpaced environment


Why Join Us

Support missioncritical cybersecurity and IT programs
Work directly with technical experts and leadership
Produce documentation that directly supports security operations and compliance


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[SADOM Analyst - Leesburg, VA]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774818&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>656c7d19-3470-4fab-9349-adbc58b77acd</guid>
      <description><![CDATA[Position Title: SADOM Analyst
Location: Remote
Employment Type: FullTime
Salary Range: $105,000 - $120,000
Work Schedule: 12x5 coverage (Monday&ndash;Friday, 6:00 AM &ndash; 6:00 PM CST) with afterhours remote O&M support as needed
Clearance Requirement: Ability to obtain and maintain Top Secret clearance

Position Overview
We are seeking a SADOM Analyst to support Security Operations (SecOps) by operating, maintaining, and optimizing security applications and devices that enable incident response and continuous monitoring. This role is responsible for ensuring 24x7 availability of critical security tools and providing expert operations, maintenance, and engineering support across a diverse security technology stack.
 
The ideal candidate has a strong background in systems administration, security tooling, and incident response support, with experience maintaining enterprisescale security platforms in a SOC environment.

Required Qualifications

Certifications:

At least two (2) active certifications, such as:

CompTIA A+
Network+
Security+
ISC2 CISSP
Or other comparable certifications (subject to approval)


Education & Experience:

Bachelor&rsquo;s degree or
Minimum three (3) years of experience in incident detection and response and
Minimum three (3) years of experience in one or more of the following:

Systems administration
Database administration
Network engineering
Software engineering or development


Ability to obtain and maintain the required security clearance based on work location
Experience with a combination of the following tools is required:

&middot;        FireEye HX
&middot;        Cisco ThreatGrid
&middot;        Cisco Stealthwatch
&middot;        Teramind
&middot;        Exabeam
&middot;        AWS CloudWatch
&middot;        Swimlane
&middot;        Tenable.io
&middot;        Malware Information Sharing Platform (MISP)

Desired Skills

Experience working in a SOC or SecOps environment
Strong troubleshooting and systems optimization skills
Experience supporting both onprem and cloudbased security tools
Strong documentation and communication skills
Ability to work independently and as part of a distributed team


Key Responsibilities

Operate and maintain security configurations and applications supporting incident response with 24x7 availability
Provide 12x5 operational expertise for integration, deployment, recapitalization, operations, and maintenance of security technologies
Develop, deploy, test, patch, upgrade, and optimize security incident response tools and devices
Perform fullscope administration of SecOps tools, including configuration, access management, and system optimization
Create and maintain procedures and technical documentation for SecOps hardware and software
Use configuration management tools (e.g., Ansible, Chef, PowerShell) to manage and maintain systems
Manage, implement, and tune signature sets across multiple monitoring technologies to maximize detection accuracy and minimize false positives
Document all tuning activities in the Tools Tuning Activities Log
Implement approved access requests, conduct user recertification, and remove unauthorized users from SecOps tools
Assist stakeholders with tool access, reporting, queries, and continuous monitoring processes
Support security tools hosted both onpremises and in cloud environments


Why Join Us

Support missioncritical security operations and incident response capabilities
Work with advanced security technologies in a SOC environment
Collaborate with experienced cybersecurity and engineering professionals
Play a key role in maintaining and improving enterprise security operations


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[CSIRT Analyst - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774823&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>08603e6d-ba10-4c96-b4d5-cc6ec388e30f</guid>
      <description><![CDATA[Position Title: CSIRT Analyst (Computer Security Incident Response Team)
Location: Stennis, MS
Employment Type: FullTime 
Salary Range: $70,000 - $80,000
Work Schedule: 24x7x365 coverage on rotating shifts including nights and weekends
Clearance Requirement: Ability to obtain and maintain Top Secret clearance

Position Overview
We are seeking a CSIRT Analyst to support 24x7 cybersecurity monitoring, incident response, and threat mitigation operations within a Security Operations Center (SOC) environment. The CSIRT serves as the primary incident response function of the SOC and is responsible for identifying, analyzing, responding to, and reporting cybersecurity events and incidents.
 
This role is critical to minimizing the impact of cyber incidents, coordinating recovery activities, and strengthening defenses to prevent future events. The ideal candidate has a strong foundation in incident response, security monitoring, and cyber threat analysis, and is familiar with the MITRE ATT&CK framework.

Required Qualifications

Bachelor&rsquo;s degree or a minimum of one (1) year of experience in cybersecurity operations or incident response
At least one active cybersecurity certification, such as:

CompTIA Security+
ISC2 CISSP
Or other comparable certification (subject to approval)

Knowledge of computer security incident response principles and practices
Familiarity with SOC operations and incident tracking workflows
Ability to obtain and maintain a Top Secret clearance


Desired Skills

Experience working in a SOC or CSIRT environment
Familiarity with the MITRE ATT&CK framework
Strong analytical and documentation skills
Ability to work effectively in a shiftbased, hightempo operational environment
Strong communication skills for technical and nontechnical audiences


Key Responsibilities

Provide 24x7x365 onsite monitoring and incident recording of security alerts and events in near real time
Analyze security data from multiple sources including security tools, system logs, and external reports
Track and manage incidents using platforms such as Swimlane, ServiceNow, and DHS ECOP
Conduct packetlevel traffic analysis and reconstruct network activity to identify anomalies and threats
Perform indepth web and email log analysis to identify suspicious or malicious activity
Analyze phishing emails and suspicious files to identify malicious code and indicators of compromise
Determine commandandcontrol indicators and recommend tactical mitigation measures (e.g., internet filtering)
Coordinate and advise Incident Response Handlers during active security incidents
Support coordinated incident response and reporting in accordance with policies
Develop, maintain, and follow documented SOPs, automated playbooks, and SOC CONOPS
Provide security situational awareness and coordinate with SOC leadership, CISO, DCISO, and Privacy officials
Participate in critical incident bridge calls and component SOC coordination calls
Produce timely incident reports, resolution emails, and weekly, monthly, and quarterly metrics and summaries
Support monitoring and response to emailbased threats, including phishing and spearphishing campaigns


Why Join Us

Play a key role in protecting critical systems and data
Work within a missionfocused SOC and incident response team
Gain handson experience responding to realworld cyber threats
Collaborate with cybersecurity professionals


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Security Solutions R&D Analyst - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774817&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>7df2b68a-19b4-4904-af13-d22a2316309e</guid>
      <description><![CDATA[Position Title: Cyber Security Solutions R&D Analyst
Location: Hybrid w/ possibility of remote, near Stennis, MS
Employment Type: FullTime
Salary Range: $98,000 - $110,000
Clearance Requirement: Ability to obtain and maintain a Secret security clearance

Position Overview
We are seeking a Cyber Security Solutions R&D Analyst to support research, development, and engineering activities focused on improving security operations and addressing complex cybersecurity challenges. This role serves as a technical problemsolver and subject matter contributor, working across teams to research solutions, analyze security gaps, and support the development and enhancement of cybersecurity capabilities.
 
The ideal candidate brings handson technical expertise, a strong understanding of security operations, and the ability to translate emerging threats and requirements into actionable solutions.

Required Qualifications

Bachelor&rsquo;s degree or equivalent relevant experience
At least three (3) years of experience in cybersecurity engineering, security operations, or incident response
Strong understanding of security principles, tools, and technologies used in operational environments
Experience developing or supporting security controls, automations, or analytical solutions
Ability to apply structured problemsolving methodologies to complex technical challenges


Certifications
One of the following certifications (or comparable certifications) is required:

ISC&sup2; CISSP
CISM
CEH
Or other comparable cybersecurity certifications


Technical Skills (Desired)

Experience with scripting languages such as Python, JavaScript, Perl, or similar
Ability to develop or support dashboards, queries, and analytics using security monitoring tools
Familiarity with security frameworks, standards, and best practices
Strong documentation and technical communication skills


Key Responsibilities

Conduct research and development activities to address identified cybersecurity gaps and challenges
Provide technical analysis and engineering support across cybersecurity operations and initiatives
Assist with documenting analyses of alternatives and recommended security solutions
Support development and enhancement of security processes, procedures, and controls
Serve as a technical escalation point for complex cybersecurity issues
Apply industry best practices to improve security operations and defensive capabilities
Develop and maintain security controls and user stories aligned with recognized cybersecurity frameworks
Perform scripting and analysis to support dashboards, metrics, and security visibility
Support vulnerability analysis, penetration testing efforts, and security assessments as needed
Collaborate across functional areas to ensure continuity of operations and effective solution integration


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, well being, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employer sponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 EDT</pubDate>
    </item>
    <item>
      <title><![CDATA[Functional Analyst - Stennis, MS]]></title>
      <link>http://j.brt.mv/jb.do?reqGK=27774782&amp;companyGK=57204&amp;portalGK=48943</link>
      <guid>e6b1fdd2-dade-4b6a-a1a8-fff8ffbbdc9e</guid>
      <description><![CDATA[Position Title: Functional Analyst
Location: Stennis, MS
Employment Type: FullTime
Salary Range: $120,000 - $130,000
Citizenship: U.S. Citizen required

Position Overview
We are seeking a Functional Analyst to support cybersecurity and IT operations by analyzing business processes, interpreting requirements, and helping design effective, welldocumented workflows. This role works closely with technical teams and key stakeholders to ensure operational needs are clearly understood and translated into actionable requirements.
 
The ideal candidate is detailoriented, comfortable working in structured environments, and skilled at bridging the gap between business objectives and technical implementation.

Required Qualifications

Bachelor&rsquo;s degree or equivalent relevant experience
Minimum two (2) years of experience in a consulting or clientsupport environment
Minimum two (2) years of business or functional analysis experience
Minimum two (2) years of experience supporting IT or cybersecurity teams
Demonstrated experience gathering, analyzing, and documenting requirements
Strong written and verbal communication skills
Ability to work effectively with crossfunctional teams in a structured environment


Certifications
One of the following certifications (or a comparable certification) is required:

CompTIA Security+
ISC&sup2; CISSP


Key Responsibilities

Analyze and document functional and technical requirements supporting IT and cybersecurity operations
Work with stakeholders to assess current processes and define improved futurestate workflows
Develop and maintain requirements documentation, process maps, user stories, and functional specifications
Facilitate working sessions and discussions with technical and nontechnical teams
Collaborate with engineers and operational teams to support solution design and implementation
Assist with process improvement initiatives and proofofconcept efforts
Prepare clear documentation and presentation materials for leadership review
Support reporting, metrics development, and program tracking efforts as needed


Why Join Us

Opportunity to contribute to missionfocused operational support
Collaborative environment working alongside technical professionals
Meaningful involvement in process improvement and capability development


Benefits Overview
Corinth offers a comprehensive benefits package to support employees&rsquo; health, wellbeing, and financial security. Benefits for eligible employees include multiple medical plan options, dental and vision coverage, health savings and flexible spending accounts, employersponsored life and disability insurance, and access to wellness and health advocacy resources. Employees are also eligible to participate in a 401(k) retirement savings plan with company match and immediate vesting. Paid time off benefits include paid holidays, paid time off (PTO), sick leave, paid volunteer time, parental leave, and other leave programs. All employees have access to an Employee Assistance Program (EAP) offering confidential counseling and support services. Professional development and training opportunities are also provided.

Corinth Consulting Group, LLC is an Equal Opportunity Employer. We are committed to a workplace free from discrimination and harassment in accordance with all applicable laws.]]></description>
      <pubDate>Thu, 02 Apr 2026 00:00:00 EDT</pubDate>
    </item>
  </channel>
</rss>

