- UpvoteDownvoteShare Job
- Suggest Revision
As a direct report to the Chief Information Security Officer (CISO), the Vice President of Threat Management and Response (TMR) will oversee the programs that gather Threat Intel, perform penetration testing, manage vulnerabilities, monitor & respond to events & incidents, and manage insider threat.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead red-blue team and purple team testing, to continue to inform and improve the threat management controls. Vice President, Threat Management & Response. Develop and execute the threat management and response (TMR) strategy aligned with the organization's overall security objectives.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead and mature the insider threat program, working closely with Legal, Compliance, Human Resources and other stakeholders. Inform the organization on the evolving threat landscape from external and internal viewpoint, to continuously improve the security decisions.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee and mature the capabilities to adequately monitor the threat environment and rapidly respond to events and incidents to ensure recovery. Lead management of vulnerabilities based on residual risks and ensure adequate mitigating controls.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Make decisions for the TMR team and EIP strategy based on threat and risk. Experience with mergers & acquisitions, divesture, and integration activities. As a company focused on the health and well-being of the people we serve, Humana starts from within, and is committed to providing progressive benefits that advance the employment experience and vitality of the associate community.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
MITRE ATT&CK framework. The successful candidate will provide thought leadership to Enterprise Information Protection leadership team to mature the cybersecurity operations program at Humana. Humana is a Fortune 50 market leader in integrated healthcare whose dream is to help people achieve lifelong well-being.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of threat assessment and threat management theory and practice and experience in assessment and management of cases involving potential violence; Responsible for leadership related to threat assessment and threat management regarding reports of and/or potential threats of and/or acts of violence by members of the University community or by those not affiliated with the university that could impact the university community.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring threat management, threat modeling, identify threat vectors and develop use cases for security monitoring. Knowledge of Cyber Threat Management and Intelligence methodologies.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DescriptionHumana's Associate Vice President (AVP), Technology and Cybersecurity Risk works closely with all areas of Enterprise Information Protection (EIP), Internal Audit, Enterprise Risk Management, business units, regulator.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DescriptionHumana is a $90 billion (Fortune 40) market leader in integrated healthcare with a clearly defined purpose to help people achieve lifelong well-being. Humana complies with all applicable federal civil rights laws and does not discriminate on the basis of race, color, national origin, age, disability, sex, sexual orientation, gender identity or religion.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop Splunk Content for Cloud / API Security threat use cases (cloud, container, or orchestration misconfiguration, OWASP vulnerabilities, Injection Flaws, insecure network policies, logging & monitoring / runtime threats, CI/CD pipeline & supply chain flaws, cloud IAM roles, Account hijacking, Data exfiltration) Cloud Identity Management, privileged access escalation, Key Management threat scenarios.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Splunk Threat Content Developer – Cloud and API Threat Detection – Remote Splunk Threat Content Developer will develop, implement, and oversee content development for Threat Detection, Threat Analysis, and Threat investigations focused on Cloud Security and API Security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities: Lead Splunk content development focused on Threat (detection, analytics, investigation, and response) for Cloud Security (SaaS / IaaS / PaaS) and API Security (OWASP) threat use cases.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Our teams integrate the disciplines of strategic communications, investment banking, management consulting, corporate governance, risk, and government affairs to solve the most complex business and reputational challenges.
ExpandApply NowActive JobUpdated Yesterday
threat management jobs
FEATURED BLOG POSTS
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.