- UpvoteDownvoteShare Job
- Suggest Revision
Basic Qualifications:At least 8 years of experience with technology or cyber security risk management frameworksAt least 5 years of experience developing, evaluating, or implementing cybersecurity, technology, or risk assessment activitiesAt least 2 years of cloud risk, governance, control, and security experienceCISA, CISM, CRISC, CISSP, CCAKAt least 2 years of experience with briefing executive leadership on risks, controls, metrics and roadmaps for digital products.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The DoD Red Team (NE-MAR) is one of the assessment programs within the Defense Threat Reduction Agency's (DTRA)-Operational Nuclear Enterprise Support Directorate, Mission Assurance Department (NE-MA.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate with IT Security management on developing, implementing and managing security controls and defenses related to the execution for the Information Security Standard Program, including Intrusion Detection, Threat Protection, Log Monitoring, Vulnerability Assessment, and Information Security Process & Reporting.
ExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cyber security risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants must pass a Criminal History Record Check (CHRC) and Security Threat Assessment (STA) prior to receiving a security badge. Maintaining Enterprise telecom systems; PowerShell scripting and automation; database administration; VDI;PKI; and cloud computing.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop risk analysis, perform deep dive investigations, and drive specific risk initiatives to minimize risk posture and strengthen overall control effectiveness and to reduce residual risksKeeps pace with evolving cyber threat landscape to ensure ongoing relevance of cyber risk mitigation.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilize CUSTOMER enterprise security information and event management (SIEM) and other monitoring tools for security monitoring and proactive threat hunting. Utilize threat intelligence and open-source cybersecurity outlets to enhance SOC operations.
ExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Transportation Security Administration (TSA) Security Clearance: Candidates for employment with the San Francisco Airport Commission are required to undergo a criminal history record check, including FBI fingerprints, and Security Threat Assessment in order to determine eligibility for security clearance and may be required to undergo drug/alcohol screening.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Sr. Information Security Analyst will safeguard LCCU's enterprise networks, systems, and applications against cyber threats. 3-5 years of advanced Cyber Security experience required, including knowledge of security assessment and penetration testing methodology.
Full-timeExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of web and mobile application security assessment techniques, threat modeling, general software development practices. We’re all about delivering delightful, secure customer and employee experiences that accelerate ServiceNow’s journey to become the defining enterprise software company of the 21st century.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our diverse capabilities include precision strike and defense, autonomy, navigation guidance & control, directed energy, signal processing, advanced target recognition, lethality and threat assessment.
ExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
You have experience working in enterprise software and SaaS domains. Threat modeling in an Agile environment. Share experience with authentication and authorization models, modern mobile security methodologies, applied cryptography, and secure-by-design development practices.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
For positions requiring access to technical data subject to export control regulations, including Export Administration Regulations (EAR), ServiceNow may have to obtain export licensing approval from the U.S. Government for certain individuals.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide specialized training or create specialized non-training policies for law enforcement who work in schools and/or with school-age populations such as school resource officers (SROs) and probation officers: Behavioral threat assessment in school settings.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Review vulnerability assessment results and threat intelligence regularly. Excellent knowledge of Microsoft M365 Defender including incident response, threat hunting and vulnerability management.
$100,000 - $120,000 a yearFull-timeExpandUpdated 30 days ago
threat assessment enterprise jobs
FEATURED BLOG POSTS
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts