- UpvoteDownvoteShare Job
- Suggest Revision
Measured Analytics and Insurance is a U.S.-based cyber insurance provider that utilizes proprietary, AI-rich data analytics and national security grade threat intelligence to deliver smarter cyber insurance products.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Broad knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
GIAC Cyber Threat Intelligence Certification. This individual will also analyze this collected data to detect an Insider Threat. GIAC Cyber Threat Intelligence Certification. This individual will also analyze this collected data to detect an Insider Threat.
Part-timeExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open source vulnerability information to ensure prioritized plans are developed. Proficiency with datasets, tools and protocols that support analysis ( e.g. passive DNS, Virus Total, Recorded Future, TCP/IP, OSI, WHOIS, enumeration, threat.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs∯*∯ In this role, you will provide support with incident handling, triage of events, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
$101,400 - $183,300 a yearFull-timeRemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
RemoteExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The individual will work in concert with the operational risk management team, including the vendor risk management and business continuity management teams, to ensure close coordination, integration, transparency and awareness of information risks across all risk management programs.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
VP- Technology Information Risk Management. Information Technology Processes: asset management, change management, incident/problem management, patch management, Software Development Lifecycle (SDLC), release management, capacity/performance management, data/records management and destruction, backup and recovery, etc.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must actively hold one or more recognized industry certifications (CISA, CISM, CRISC, etc.) Perform independent risk assessments of information risk management related disciplines, including information technology, information security, business continuity management and disaster recovery and records management.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of IT risk, security architecture design, network security, cloud/mobile security, data security and internal/external threat intelligence/analysis. Solid work ethic, a high degree of practical intelligence, a flexible style and proven initiative.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A successful candidate will have a current TS/SCI with Polygraph and a strong understanding of Foreign Threat Systems; Scientific and Technical Intelligence; Foreign Material Exploitation; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology and Operations; Non Kinetic Defeat; DoD and IC Space; Electronic Warfare; and System Resiliency.
ExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Textron Systems businesses are industry leading developers and integrators of unmanned systems, advanced marine craft, armored vehicles, intelligent battlefield and surveillance systems, geospatial management and analysis systems, intelligence software solutions, precision weapons, piston engines, test and training systems, and total lifecycle sustainment and operational services.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
You will contribute to key pieces of Security Intelligence, including but not limitedto crisp network flow visualization, policy recommendation, network threat detection as per MITRE framework, metrics, and health analytics.
$126,000 - $210,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Supports USAID’s Insider Threat Program response activities as required and participates in Insider Threat Working Groups. The CI Analyst independently plans, prepares and conducts counterintelligence threat briefings for USAID employees conducting official and unofficial travel, or participating in foreign visits to USAID bureaus and offices.
Full-timeExpandApply NowActive JobUpdated 2 days ago
threat intelligence jobs
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.