- UpvoteDownvoteShare Job
- Suggest Revision
CI Agent can leverage the full spectrum of CI capability to conduct Research, Development and Acquisition (RDA), Supply Chain Risk Management (SCRM), Defense Critical Infrastructure (DCI), Force Protection, and CI Insider Threat program support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years work experience in a field related to Cybersecurity, data protection, Insider Threat, Counterintelligence, or similar role preferred. Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The FSO will be responsible for implementing and providing guidance to customers and management on security issues such as security education, insider threat, classified document control, security investigations, classification control and personnel clearances.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess knowledge of the following program areas: Identity and Access Management, Physical Security, Third Party Risk Management, Enterprise Risk Management, Security Awareness Training, Cryptography, Threat and Vulnerability Management, Incident Response, Business Continuity Planning / Disaster Recovery, Data Classification, Insider Threat, Data Loss Prevention, and Data Protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Seven (7) years’ experience working in the areas of intelligence, information security, network forensics, insider threat. As a Senior Cyber Threat Analyst with our Intel Division, you will identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Operating the Case Management System (CMS), and provide cradle-to-grave tracking, de-confliction, coordination, disposition, and case closure for all insider threat, WV&C, and related complaints, referrals, inquiries, and investigations within the Agency.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of DevOp or DevSecOP Experience, 2-3 year of experience doing capability development for cyber security or insider threat, law enforcement background preferred. Strong agile development background with experience supporting cyber security or insider threat operations.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Evaluate and consult with clients regarding strategies to defend against threats such as ransomware, nation-state attacks, and insider threat when more sophisticated advisory solutions are not viable (lack of adequate budget, client resources, or priority) to improve cyber security posture, reinsurance viability, coverage, etc.
$140,000 - $200,000 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BlueHalo is a national source for classified Cyber/SIGINT missions and a leading provider of blockchain/crypto analytics and platform cyber resiliency, specializing in offensive and defensive cyber and SIGINT warfare technologies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Data Scientist, you will implement GDIT’s cutting-edge Insider Threat technologies and processes to enhance the protection of our nation’s high-value assets and mission-critical data.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reviews, edits, integrates, coordinates, and shares information, activities, and reporting to create a common operating picture across multiple lines of effort in the CMS Division of Strategic Intelligence (DSI), including Counterintelligence (CI), Insider Threat (InTh), Supply Chain Risk Management (SCRM), and the Committee on Foreign Investment in the United States (CFIUS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities Demonstrate a passion and in depth knowledge of cyber intelligence analysis and insider threat detection Develop a deep understanding of the organization's business objectives, risk tolerance, and cybersecurity needs related to insider threats Drive the execution of the operating model development, including coordinating cross-functional teams, managing timelines, and addressing any roadblocks or challenges.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations. Desired Skills Splunk Proofpoint Fidelis Solera Windows Linux Operating Systems Characteristics Investigates, analyzes, and responds to cyber incidents within a network environment or enclave.
Full-timeExpandApply NowActive JobUpdated Today
insider threat jobs
FEATURED BLOG POSTS
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.