- UpvoteDownvoteShare Job
- Suggest Revision
Experience with IDS/IPS technologies, firewall technologies (Palo Alto highly desired), anti-malware systems and advanced end-point protection, Windows Server, and Active Directory technologies, DAST & SAST technologies, cloud or premise based SIEM technologies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with malware, threat intelligence, and/or sandbox analysis. Experienced in endpoint or network security space – AV, EDR, incident response, forensics, SIEM, firewall, HIPS/IDS, etc.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relationship buildingSOC / Incident Response investigative skills, such as digital forensics, memory analysis, malware reverse engineering or threat hunting. Work with SIEM/SOAR teams to implement automation and detections to improve the organizations’ cyber-defense posture.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform defensive cyber operation duties including, but not limited to, ensuring workstation and server compliancy with Trellix Host Based Security System (HBSS) requirements; identifying cybersecurity incidents using HBSS, Splunk, Security Information and Event Manager (SIEM), and other automated tools; performing forensics and remedial action on cybersecurity incidents; and reporting defensive cyber operations statistics.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must understand basic security principles with an understanding of malware, cryptography, threats and vulnerabilities, access control, and application, data, and host security. Must demonstrate skills and interest in supporting a variety of security systems such as SIEM, IDS/IPS, firewalls, proxies, host security software, and vulnerability scanners.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cloud Architect must display superb understanding and be knowledgeable with a multitude of technologies including; AWS, SIEM, firewalls, web application firewalls, VPNs, DNS, Data Loss Prevention, IDS/IPS, and proxies, to name a few.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a cyber threat specialist on our team, you’ll help customers solve problems using the latest software like Splunk, Carbon Black, Tenable, and SIEM products. 7+ years of experience in a Cybersecurity role, such as cyber intelligence, cyber threat analysis, incident response, cyber investigations, malware analysis, or network forensics.
$84,600 a yearExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple solutions such as security orchestration, automation and response; SIEM; intrusion detection and prevention systems (IDS/IPS); threat intelligence platform; directory services; malware sandboxes; vulnerability management; IR playbooks; and endpoint/extended detection and response.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of current Cybersecurity products, information data protection, DLP, Insider Threat, advanced malware detection, SIEM, and forensic tools. Strong background in a wide range of Cybersecurity including current advanced threats, threat protection, data protection, cloud security, malware protection and/or incident response.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee, manage and provide reporting from the Next Generation Firewalls (NGF)s, Anti-Virus, Malware, Security Information and Event Management (SIEM), Intrusion Detection / Prevention (IDS/IPS), Domain Name Services (DNS), Vulnerability scanners, and other security solutions that comprise the Security Architecture of the organization.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct technical examinations of computer-based evidence including logs, packet captures, SIEM & IDS events, disk forensics, malware analysis, and more. Experience and understanding of security concepts, SOAR(Tines), EDR, NDR and SIEM (Chronicle) technologies.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with system management tools such as Intune and MCASExperience of NIST Cyber Security Framework (CSF) and the CIS Critical Security ControlsExperience with SIEM software and log collection facilitiesExperience in information security, malware, and infrastructure securitySkills:Excellent verbal and written communication skillsAbility to effectively communicate and develop project plans with outsourced providersAbility to function effectively in a complex rapidly changing environment.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
ExpandApply NowActive JobUpdated 3 days ago
malware siem jobs
FEATURED BLOG POSTS
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.