- UpvoteDownvoteShare Job
- Suggest Revision
Technical/Functional Skills Service Catalog, Service Portal, Incident Management, Change Management, Problem Management, ITSM, Configuration Management (CMDB), Client Scripts, Catalog Client Scripts, UI Scripts, and UI Policies, Data Sources, Import Sets, and Transform maps.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Director will oversee a variety of services such as Tier 1, 2, and 3 Incident Response, Digital Forensics, Data Loss Prevention (DLP) Operations, and Litigation Support. Leadership and Strategy Development: Provide leadership and strategic direction for Incident Response, Digital Forensics, DLP Operations, and Litigation Support teams.
Full-timeRemoteExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in enterprise risk management, penetration tester, red team/incident responder and as a junior security operations ana-lyst. - Provide users with incident response support, including mitigating actions to contain activity and facilitating forensic.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Incident Management: Provide direct support to assigned operational groups on incident investigation and reporting process, help to coordinate injury case management, assist operations leadership in the implementation of corrective actions, provide support on EHS reporting and vendor H&S incident reviews, communicate and discuss key learnings included in Safety Alerts with assigned area of operation.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong analytical and troubleshooting skills- CEH, GCIH, or relevant IT technology certification- Examples of other certifications include:- CERT Certified Computer Security Incident Handler,- ECC CEH (Electronic Commerce Council Certified Ethical Hacker)- GCIH (GIAC Certified Incident Handler)- GISF (GIAC Information Security Fundamentals)- CISSP (ISC2 Certified Information System Security Professional)- Additional certifications at an equivalent may also be considered.
TemporaryExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prepares serious incident reports; and collaborates with the Serious Incident Administrator (SIA); and reports to the Office of the Inspector General Incident Reporting Center (IRC) critical incidents, serious incidents, and the suspected mistreatment of youth.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Two years of full-time wage earning experience supervising or providing rehabilitation/treatment services to youth or adults in a treatment program, correctional program, or a residential setting (e.g. correctional officer, case manager, counselor, or probation or parole officer.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Client and Partner Management Provide support on incident response engagements in collaboration with the Team lead and Engagement Manager leading the engagements to guide client’s containment, remediation, restoration, and forensic investigations.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide leadership and strategic direction for Incident Response, Digital Forensics, DLP Operations, and Litigation Support teams. The Director, Threat Response Operations supports end-to-end incident response through incident bridge facilitation, after action process, incident communication process, ticket audits, and Threat Response Operations documentation management.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity Cyber Intelligence & Incident Response. Working experience in a Threat Intelligence and Incident Response capacity. This role performs advanced threat analysis, threat intelligence gathering & reporting, incident response activities, improves accuracy of security systems, improves existing processes, and works on Cybersecurity focused projects.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O Incident Response, Threat Hunting, Vulnerability Mgmt., Intrusion analysis, Information Assurance, Watch Officer are the most common job roles/environments candidates will come from. Typical tasks include performing monitoring operations; reporting cyber security events and anomalies; providing analysis and recommendations, Vulnerability Management (VM) and Malware Protection / Vulnerability Assessment and Analysis (VAA), Intrusion Analysis and Correlation Information, incident handling, mission operations transfer, exercise and assessment support.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will be an active team member in daily Security Operations which includes Incident Monitoring & Response, Web Application Firewall administration, SIEM administration, Threat Intelligence gathering, Threat Hunting, Tabletop Exercise execution, Red & Blue team engagements, and Vulnerability Management, developing hardened configurations, and improving system protection configurations.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and deploy dashboards and reporting to meet Liberty’s needs Perform incident response activities as directed Validate suspicious events and incidents using open-source and proprietary intelligence sources Perform as an escalation point for Tier I and II Analysts, as necessary, related to alerts Standardize and Maintain Incident Response Playbooks Perform forensic analysis on workstations, malware, malicious domains, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Establish policies and develop procedures for all aspects of security operations, focusing on threat modeling, threat hunting, digital forensics and incident response. Oversee day-to-day cybersecurity operations, incident response, and threat intelligence.
Full-timeExpandApply NowActive JobUpdated 5 days ago
incident job
FEATURED BLOG POSTS
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!
4 Talent Acquisition Trends Going Into 2023
For better or worse, a side effect of the COVID-19 pandemic was a marked shift in talent acquisition practices worldwide. With the struggle to retain talent that began in 2020, companies have had to rethink recruitment strategies. The result has been new talent acquisition trends that are well on their way to becoming commonplace. These are the practices that are going to become even more widespread going into 2023.
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.