- UpvoteDownvoteShare Job
- Suggest Revision
All employees with jobs that require access to the Warehouse must be able to pass the Transportation Security Administration (TSA) Security Threat Assessment (STA). Operates production equipment for cell culture or purification that may include culture growth, process monitoring, sampling, harvesting, purification, formulation, freeze thaw, and transfer.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cyber security risk management, disa ster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Planning and executing Tier 2 and Tier 3 risk assessment by using threat modelling techniques and recommend mitigating activities using industry leading security controls and tool sets. Initiating the lead for crown jewel assessments to identify critical business processes and applicationPerforming controls monitoring activities for critical controls identified during Tier 2 (Enterprise wide) and Tier 3 (application specific) risk assessmentsCollaborating with business units, application development teams, and third-party vendors to achieve program requirements while enabling the business.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitoring the cyber threat landscape in order to rapidly identify potential threats and risk assessment; Cyber Security Engineer. Familiarity with Cryptography Algorithms, Security Software Libraries.
ExpandUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Tools Management: Manage and maintain security tools and technologies used within the SOC, such as SIEM, IDS/IPS, endpoint detection and response (EDR) systems, and threat intelligence platforms.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitors the day-to-day operations of the enterprise architecture including threat assessment, software and hardware alerts, network efficiency and stability. The Infrastructure Operations Engineer is responsible for monitoring, maintaining, and delivering the company’s IT operations infrastructure.
$81,568 - $113,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The analyst maintains the computer and information security incident, damage, and threat assessment programs and leads efforts that identifies and resolves potential security breaches and vulnerabilities and leads cross divisional project teams to implement organization wide cyber security enhancements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with utilizing compliance tools to track assessment and authorization activities (e.g. Xacta 360, Risk Vision, RSA Archer). CLOUDworks Security manages security assessments, security compliance, change management, and continuous monitoring responsibilities across 5 cloud service providers (Amazon Web Services, Google Cloud, Oracle Cloud, Microsoft Azure, and IBM Cloud) The position requires a healthy mix of technical and policy knowledge.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requirements 2+ years of experience with supply chain risk management, including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
ExpandUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, threat intelligence and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience with a variety of vulnerability scanners, monitoring, intrusion detection systems, endpoint protection software, and forensic or incident response actions. Behavioral analysis of malware to provide indicators for monitoring.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides operational risk management support which involves participating in risk assessments, managing system weaknesses, and providing ongoing risk monitoring, threat management and mitigation support.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our CREST accredited Security Operations Center (SOC) combines advanced monitoring services and threat detection capabilities with best-in-class business risk assessment to provide the optimal incident response approach for every client.
ExpandUpdated 15 days ago
threat assessment monitoring jobs
FEATURED BLOG POSTS
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.
Operations Job Titles for Entry, Mid, and Senior-Level Positions
An operations team can take on many functions within a business. With wide-ranging responsibilities come wide-ranging job titles. This means that you have to be more vigilant in your job search. On one hand, the perfect job might be hidden under a title you might not expect. Meanwhile, operations titles that you’re used to looking at may mean something different at a given organization depending on their structure.