- UpvoteDownvoteShare Job
- Suggest Revision
Anomali's Platform offers: "Match" Next-Gen SIEM, "Lens" AI Threat Hunter, "ThreatStream" TIP, Anomali Integrator, Anomali ISAC, Anomali Attack Surface Management, and Anomali Digital Risk Protection, infused with Anomali AI.
$165,000 - $185,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3 years experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applies expertise in counter terrorism, subversion, sabotage, and espionage threats posed by various entities within the area of operations; as well as familiarity with threat analysis, operations, and related systems, such as the Migration Defense Intelligence Threat Data System (MDITDS), Intelligence Information Report (IIR) production, Virtual Counterintelligence/Human Intelligence Analysis and Processing System (VCHAPS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. + Experience with and advanced knowledge of cybersecurity technology domains including, SIEM, Network Security, Endpoint Security, Application Security, and Security Operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 2 years experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
$65,000 - $117,500 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of cybersecurity controls and technologies, such as Intrusion Detection/Prevention Systems (IPS/IDS), Security Incident Event Managers (SIEM), Public Key Infrastructure (PKI), Tunnel Layer Security (TLS), Endpoint Detection and Response (EDR), and Threat Intelligence platforms.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide cybersecurity leadership and management to the SOC team, including security analysts, incident responders, threat intelligence analysts, and other IT security professionals. Manage daily SOC operations, including incident ticketing, workflow management, and metrics reporting, leveraging Security Information and Event Management (SIEM) systems or other security automation tools to streamline processes and enhance efficiency.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Executes threat intelligence reports, threat, vulnerability, and incident management processes to help ensure cybersecurity risks and threats are proactively identified and addressed to maintain the protection of information and information systems.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Anomali, a world-renowned platform leader in Security Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threat detection and incident response (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience gathering, reading, and acting upon Threat Intelligence. The Senior Cybersecurity Operations Analyst will primarily monitor our SIEM and EDR solutions and provide tier 1 and tier 2 operational support for Kingland Corporation, clients, and our software products.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operates products such as SIEM, SOAR, threat intelligence platforms, advanced email protection, EDR, cloud security products, IDS/IPS, Zero Trust tooling, and other security technologies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are in search of a Cybersecurity Analyst to join our Defense Group task force at the Scott Air Force Base, IL. As a valued member of the team, you are to perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis (using raw packet data), net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communications networks, and participate in the coordination of resources during incident response efforts.
$65,000 - $117,500Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Overview: The Information Security Specialist Level 3 (Security Analytics) is responsible for Threat Response and Security Incident Handling. This role provides IT Security Information and Event Management (SIEM), log management, security incident management, and forensics.
$109,000 - $136,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This would include hands-on with firewalls, IDS/IPS, and SIEM. Experience in forensics or general security consulting and familiarity with Managed Security Services a plus. Anomali addresses the global shortage in cyber talent by empowering analysts to contain, eradicate, and block threats in seconds without complex SIEM queries, manual blocks, or long investigations.
RemoteExpandApply NowActive JobUpdated Today
siem threat intelligence jobs
FEATURED BLOG POSTS
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.