- UpvoteDownvoteShare Job
- Suggest Revision
Performing Incident Response activities based on automated alerts, malware assessment, IOC discovery and other threat hunting activities; The Information Security Analyst team operates as part of Infrastructure Risk Management (IRM), a department within Global Technology and Operations that is responsible for an enterprise-wide integrated infrastructure risk management program which employs a holistic approach to manage cybersecurity, information security, data privacy, physical security and business continuity led by the Chief Security Officer.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with security frameworks and standards (eg; the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), Cybersecurity & Infrastructure Security Agency (CISA) Risk Assessment Methodologies, OWASP, CIS) and their application in vulnerability management process.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Team (NIRT), a national service provider for the Federal Reserve System (FRS), provides effective and efficient national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for the FRS. NIRT’s mission is to play a leading role in the FRS’ efforts to protect its information systems against unauthorized use.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capability to support the following systems: ArcSight SIEM; Splunk; Novetta Cyber Analytics; FireEye MPS Suite; Snort IDS; Bro IDS; Fidelis XPS; CloudShield Trusted Cyber Solution Orchestrator; Microsoft Advanced Threat Analytics; Counterattack Active Defense.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Information Security Analyst will act as both a senior analyst and a non-managerial leader within the Information Security Analyst team, providing guidance and training to other information security analysts, and collaboration with other corporate business units including but not limited to global enterprise technology, corporate compliance, security assurance, global security operations, and other infrastructure risk business units.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Threat Assessment: Stay informed about the evolving landscape of military and commercial off the shelf hardware and software electronic warfare developmental programs, threat capabilities, including technological advancements and potential risks to PNT dependent systems.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with SIEM and log management/analysis for threat assessment/analysis. Experience with Oracle Cloud Infrastructure (OCI), or related experience from AWS or Microsoft Azure.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Operational Excellence: running a system at scale in production, debugging live-site issues, threat assessment and mitigation. Application & Infrastructure Security: Familiar with risk assessment and safeguarding web applications and cloud infrastructure, with a proactive approach to identifying and mitigating security vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior System Administrator on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network Security, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of NOAA network.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with automation and DevOps practices in preferred- including Infrastructure-as-Code, code testing tools, CI/CD, configuration management/application deployment automation which leverage languages such as: Python, Terraform, Ansible, Java, Salt, Chef, Puppet.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The demand for NOAA’s products and information continues to grow as global climate change and the threat of natural disasters remain at the forefront of the Nation’s attention. Fusion Technology aims to protect the delivery of this critical demand bymodernizing NOAA’s IT security infrastructure, increasing security awareness throughout the department, and coordinating security efforts with the intelligence community and stakeholders.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will work within the NERC CIP Center of Excellence, which is focused on identifying, specifying, and continuously monitoring indicators of NERC Critical Infrastructure Protection (CIP) compliance across all business units.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RVPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions.
ExpandApply NowActive JobUpdated 3 days ago
threat assessment infrastructure jobs
FEATURED BLOG POSTS
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.