- UpvoteDownvoteShare Job
- Suggest Revision
Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber risk assessment activities including threat modeling, vulnerability analysis and analysis of mitigation solutions. Bachelors degree from an accredited college in Cyber, Cybersecurity, Information technology, Information Security, or Computer Engineering.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide architecture-level design and implementation support by building, operating, and developing or maintaining a Splunk log management, threat, and vulnerability management infrastructure using Security Information and Event Management (SIEM) tooling and best practices.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
4M Research, Inc. (4M) is a Woman owned small business established in 2007 and headquartered in Huntsville, AL. 4M specializes in Systems and Software Engineering and Analysis, Information Technology, Planning and Analysis, and Field Support Services to a variety of customers including MDA, NASA, and AMCOM. Our continuous and rapid growth is attributable to the caliber of employees 4M strives to hire and retain.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SOCPAC requires flexible services including, but may not be limited to, Contractor Owned, Contractor Operated (COCO) capabilities using air, surface, subsurface, space, and cyber platforms to meet mission needs in an ever-changing threat and technology landscape.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technology/cyber capabilities including threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform the design, planning, QA/QC, implementation, assessment, and management of access control systems, digital video surveillance systems, CCTV (Closed-circuit television), building security, building automation, and physical intrusion detection systems.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintains network device and information security incident, damage, and threat assessment programs. Requires a bachelor s degree in information technology, Computer Science, Mathematics, Statistics, Business Engineering or Physical Science and 10 years of general experience in any of the following areas: complex problem solving, software, systems, business processes, cyber security, network, hardware installation, network management, enterprise communications, information assurance, system administrator or data standardization.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Team (NIRT), a national service provider for the Federal Reserve System (FRS), provides effective and efficient national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for the FRS. NIRT’s mission is to play a leading role in the FRS’ efforts to protect its information systems against unauthorized use.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The demand for NOAA’s products and information continues to grow as global climate change and the threat of natural disasters remain at the forefront of the Nation’s attention. As a Senior System Administrator on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network Security, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of NOAA network.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will be a team member providing activities to support the management and resolution of security threats to Thruway Authority's information involving threat detection, threat intelligence assessment, vulnerability monitoring and response to security events and intrusions affecting information assets.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and respond to real-time security events generated by varying network security technologies to discover potential threats to the enterprise, protection needs assessment and threat assessment.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Company Overview Adapt Forward is a cybersecurity solutions provider for some of the nation’s most valuable information systems. Cyber Security Analyst Ops Watch Incident Response Charleston, SC Minimum of a Secret Clearance Required with ability to obtain TS/SCI Position Description As a CND Incident Response Analyst you will identify, isolate, investigate, inform, and implement measures to detect and protect data across a wide spectrum of sources and locations.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performing threat hunting by actively seeking out anomalies and Indicators of Compromise and/or verifying their presence in the AB’s Information Technology Environment; The Information Security Analyst team operates as part of Infrastructure Risk Management (IRM), a department within Global Technology and Operations that is responsible for an enterprise-wide integrated infrastructure risk management program which employs a holistic approach to manage cybersecurity, information security, data privacy, physical security and business continuity led by the Chief Security Officer.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform threat hunting, researching findings, validating that technical security controls have been implemented properly, audit analysis, vulnerability management, software assessment, monitoring network performance in real-time, incident response/clean up, and developing the POA&Ms for those items.
Full-timeExpandApply NowActive JobUpdated 3 months ago
threat assessment information technology jobs
FEATURED BLOG POSTS
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.