- UpvoteDownvoteShare Job
- Suggest Revision
Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This individual will collaborate with the cyber security team to maintain computer and information security incident, damage and threat assessment programs. The candidate will investigate computer and information security incidents to determine extent of compromise to information and automated information systems, network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintains network device and information security incident, damage and threat assessment programs. Company Overview: At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers.
$94,400 - $198,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber risk assessment activities including threat modeling, vulnerability analysis and analysis of mitigation solutions. Bachelors degree from an accredited college in Cyber, Cybersecurity, Information technology, Information Security, or Computer Engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide architecture-level design and implementation support by building, operating, and developing or maintaining a Splunk log management, threat, and vulnerability management infrastructure using Security Information and Event Management (SIEM) tooling and best practices.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the threat intelligence efforts to aggregate security information, assess impact, and formulate threat assessment reports. Knowledge of technical infrastructure, networks, databases, and systems in relation to IT security and risk assessment.
$120,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Integrate and configure security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and vulnerability scanners, for continuous monitoring and threat detection.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
In addition, duties may include designing, recommending integrated system solutions ensuring proprietary/confidential data and systems are protected, participating with the client in the strategic design process to translate security and business requirements into technical designs, and configuring and validating secure systems, testing security products/systems to detect computer and information security weakness.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operationalize the Cyber Security function by identification of critical information, threat analysis, vulnerability management, risk assessment and application of countermeasures.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a self-starter who can immediately contribute to the threat risk assessment process, security advisory services including support for regulatory requirements and projects.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Deputy CISO will: ●Oversee and mature Cybersecurity Centers of Excellence: Network Protection, Data Protection, Endpoint Protection, SOC Monitoring, Incident Response, Threat and Vulnerability Management, Secure System Development Lifecycle, Security Engineering, Information Security Architecture, Insider Threat Management, and Security Awareness.
$255,000 - $265,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide IA services to the Government for classified activities, establish and maintain accreditation for all information systems or equipment operating within a classified environment, and develop and maintain System Security Plans outlining security operating procedures.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
RemoteExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Current information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants must pass a Criminal History Record Check (CHRC) and Security Threat Assessment (STA) prior to receiving a security badge. Experience utilizing and supporting Geographic Information Systems with ESRI products, with knowledge of ESRI's Enterprise and Online server capabilities, ArcPy and Geoprocessing tools and functions.
$80,995.2 - $98,425.6 a yearExpandApply NowActive JobUpdated 6 days ago
threat assessment information security jobs
FEATURED BLOG POSTS
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.