- UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of security principles, including threat assessment, risk management, and security standards. Understanding of the threat vulnerability risk assessment (TVRA) process.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of experience in Product Management, Technical Program Management or Engineering role with experience on security related Hardware/Firmware programs e.g. Root-of-Trust, Cryptography, Attestation, Threat Modelling, Security Assessment, Vulnerability Management.
$133,600 - $256,800 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The position provides analysis of the national security risks posed by transactions before the Committee on Foreign Investment in the United States (CFIUS) and the Committee for the Assessment of Foreign Participation in the U.S. Telecommunications Services Sector (informally, Team Telecom), particularly as they relate to U.S. Critical Infrastructure, as well as supply chain risk analysis for information and communications technology and services (ICTS) transactions under Executive Order 13873.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will be responsible for supporting all facets of the case review process including: Intra-agency and interagency coordination Threat, vulnerability, consequence, and risk analysis Risk mitigation strategy development and implementation Compliance monitoring and enforcement Candidates must be well-organized, detail-oriented, and team-focused, with demonstrably strong interpersonal, research, and critical thinking skills.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Application threat modeling and risk assessment experience. Job Description: Fidelity Investments is looking for an experienced application architect to join the Enterprise Cybersecurity organization (ECS), focusing on delivering innovative solutions in application security for cloud and hybrid deployment, and support static and dynamic application security, and red team assessment.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Produces intelligence supporting the production of the National Security Threat Capabilities Assessment, and threat assessments / global baseline assessments for the Defense Critical Infrastructure Program (DCIP.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Levels of the firm Identify points of architectural risk in new projects using architectural threat risk assessment and threat modelling techniques. levels of the firm Identify points of architectural risk in new projects using architectural threat risk assessment and threat modelling techniques.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Intrusion Response in the form of day-to-day network traffic analysis and threat assessment/impact analysis. ¡ Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The command enables Joint Force operations and is the combatant command responsible for Strategic Deterrence, Nuclear Operations, Nuclear Command, Control, and Communications (NC3) Enterprise Operations, Joint Electromagnetic Spectrum Operations, Global Strike, Analysis and Targeting, and Missile Threat Assessment.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Monitoring the cyber threat landscape in order to rapidly identify potential threats and risk assessment; Infrastructure Cyber Security Engineer. Infrastructure Cyber Security Engineer.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SCHIE delivers the core infrastructure and foundational technologies for Microsoft's over 200 online businesses including Bing, MSN, Office 365, Xbox Live, Skype, OneDrive and the Microsoft Azure platform globally with our server and data center infrastructure, security and compliance, operations, globalization, and manageability solutions.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior System Administrator on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network Security, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of NOAA network.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Integrate threat intelligence feeds and sources with firmâs security monitoring infrastructure. Lead assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development, application security, data protection, cryptography, key management, identity and access management, network security) within SaaS, IaaS, PaaS in cloud environments.
ExpandApply NowActive JobUpdated 3 days ago
threat assessment infrastructure jobs
FEATURED BLOG POSTS
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, youâre on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If youâre financially frustrated, creatively stuck, or just plain over it, itâs time to find a healthier workplace where you can flourish. Â
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss youâve ever hadâdoes someone come to mind? We hope so! Okay, now think back to the worst boss youâve ever had. Iâm sure you can conjure up a few faces.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether youâre just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.