- UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
$130,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with ML/AI as it relates to security analysis, vulnerability assessment and detection, threat modeling, malware detection, binary analysis, network analytics or other security-related research.
$160,000 - $253,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead the threat intelligence efforts to aggregate security information, assess impact, and formulate threat assessment reports. Knowledge of technical infrastructure, networks, databases, and systems in relation to IT security and risk assessment.
$120,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Program support includes developing methodology and framework in support of cyber risk assessment life cycle. Program scope includes identifying cyber key terrain by analyzing operational requirements, conducting cyber analyses and assessments, and developing and performing modeling and simulation in support of different cyber threat scenarios.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Threat assessment, Filtering & AV Solutions. High Performance Computing and Artificial Intelligence. Cambridge Computer is NVIDIA's Higher Education Partner of the Year and we are looking to grow our HPC/AI/ML practice and add a Technical Specialist for Storage, Infrastructure and HPC to our elite team.
$150 - $200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
RESPONSIBILITIESProvide process methodology and analysis with a focus on intelligence integration to include operational risk assessment and strategic planning in support of Theater Campaign Plan objectives.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Team (NIRT), a national service provider for the Federal Reserve System (FRS), provides effective and efficient national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for the FRS. NIRT’s mission is to play a leading role in the FRS’ efforts to protect its information systems against unauthorized use.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3-years IC (SCI) RMF Assessment and Authorization (A&A) experience and the ability to describe the differences between collateral and SCI authorization requirements as they apply to DoD and IC instructions and guidelines.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KMI is a Minority Business Enterprise (MBE) and Small Disadvantage Business (SDB) that specializes in Logistics, Warehouse Services, Distance Learning/Training, Enterprise Solutions, Financial Management Support, Program Management, Intelligence Analysis & Threat Assessment, and Data Analytics/Operations Research.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with intelligence analysts to correlate threat assessment data. Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes working with DOJ-DCI WI Statewide Intelligence Center’s (WSIC) Threat Analysis Unit (TAU) staff members to design, manage, and implement projects relevant to the identification, assessment, and mitigation of threat subjects.
$35 - $43.46 an hourFull-timeExpandUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification in Insider Threat Program, Counterintelligence and/or Intelligence, or Information Security. Intakes, evaluates, and refers incoming threat assessment matters for assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient with the Risk Management Framework (RMF), NIST standards, and cybersecurity assessment tools such as ACAS and DISA STIGs∯*∯ RS21 is a rapidly growing data science company that uses artificial intelligence, design, data engineering, and modern software development methods to empower organizations to make data-driven decisions that positively impact the world.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They must independently produce high-quality client solutions, such as threat, risk, and vulnerability assessments (TVRA), threat and protective intelligence briefings, corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated 7 days ago
threat assessment intelligence jobs
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.