- UpvoteDownvoteShare Job
- Suggest Revision
8+ years of experience in Cyber/Information Assurance, with a comprehensive understanding of cybersecurity disciplines including but not limited to the Risk Management Framework, DevSecOps, and cybersecurity engineering.
ExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients' crisis management, threat assessment, and physical security requirements. A strong understanding of international and domestic threat actors, including terrorist and extremist groups, cyber threat actors, and the geopolitical threat landscape is preferred.
ExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Second, HIRT also can be called upon to proactively identify malicious activity, otherwise known as a "hunt", specifically focusing on identifying threats from sophisticated threat actors that are often undetected, and in situations beyond the capacity and capability of traditional cyber security tools and techniques.
Full-timeExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide support to training developers regarding cybersecurity topics such as monitoring AOC Enterprise architecture, implementing corrective actions against cyber threat, performing RMF operations and maintenance, and maintaining the defensive cybersecurity system requirements.
$1 a yearExpandUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead in-depth security assessments of sophisticated workflows spanning multiple applications, performing and/or coordinating multiple security assessment workstreams such as threat modeling, penetration testing, DAST scanning, and code review.
ExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Seeking a Compliance Detection Lead with experience gathering data on information systems and device configurations, which is used for system identification, maintenance, cyber threat assessment and investigation, vulnerability detection, or system exploits and that understands DoD and Army Cybersecurity policies in support of U.S. Army Human Resources Command (HRC) at Fort Knox, Kentucky.
Full-timeExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 5 years of experience assessing instructional delivery of cyber training to personnel whose duties include cyber network defense, computer forensics and/or cyber threat emulation/detection.
Full-timeExpandUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possess a strong understanding of security operations concepts such as perimeter defense, BYOD management, data loss protection, insider threat, kill-chain analysis, risk assessment and security metrics.
ExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management , and Cyber Defense support.
ExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cyber security risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
$58,300 - $133,000 a yearExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Primary Responsibilities Operationalize the Cyber Security function by identification of critical information, threat analysis, vulnerability management, risk assessment and application of countermeasures Identify gaps in the IT and OT environment, and implement appropriate remediating / mitigating controls Define SOPs for operational security and implement controls / tools for data protection and risk management based on industry standards.
Full-timeExpandUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in areas such as threat intelligence, vulnerability management, and risk assessment. Adaptability and Continuous Learning: The cybersecurity landscape is dynamic, and a Senior Cyber Security Manager should demonstrate a commitment to staying abreast of emerging threats, technologies, and best practices; the ability to adapt to evolving challenges is crucial.
ExpandApply NowActive JobUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identify information requirements, develop assessment cyber strategies and assist Red Team Program Leader collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR.
ExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintains network device and information security incident, damage and threat assessment programs. Join CACI as a Sr. Cyber Analyst. Sr. Cyber Analyst. Join CACI as a Sr. Cyber Analyst.
ExpandApply NowActive JobUpdated 1 days ago
threat assessment cyber jobs
FEATURED BLOG POSTS
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.