- UpvoteDownvoteShare Job
- Suggest Revision
Supports and coordinates production of critical intelligence products, including: Foreign Intelligence Threat Assessments (FITA), Foreign visitor vetting reports, CI Threat Vulnerability Assessments, HUMINT collection/source-directed requirements, CI/HUMINT Requests for Information (RFIs), All-source intelligence analytic products for identifying foreign intelligence threats and CI/HUMINT targeting lead generation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience using SIEM, SOAR, and EDR tools, to include building detections, alerts, reports, dashboards, tools, and automations, as well as tuning existing features and implementing threat intelligence into platform threat intel management features.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a threat intelligence analyst who is passionate about securing the desktop computing environment, loves macOS, and is committed to driving security investigations and improvements in macOS.At Apple, our mission involves securing and protecting over a billion endpoints; operationalizing threat intelligence into security engineering decisions affecting every layer of the stack; and touching the lives of everyone who interacts with our products.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Insider Threat Analyst performs proactive inquiries and collaborate with NGA investigative entities, IC organizations, and Law Enforcement agencies/entities. Insider Threat Analysts conduct threat analysis, provide assessments of threats and vulnerabilities, produce investigative leads, uncover policy violations, assess risk posed by trusted insiders, oversee the data collection effort on NGA s networks using UAM tools, and manage & develop approved data analytics tools like Risk 360.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our mission-oriented team is responsible for the design, testing, deployment, maintenance, operation, and evolution of the systems directly supporting the insider threat detection program of a large government customer in the United States Intelligence Community (USIC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience as a Threat Intelligence or SOC analyst is valued. Analyze threat intelligence and incident reports to identify threat actor's tactics, techniques and procedures and targeted technologies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cybersecurity CTI Analyst is responsible for ensuring that key cybersecurity threat intelligence activities are completed, producing artifacts directed towards various strategic and tactical stakeholders for the program.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bluehawk is seeking a seasoned Senior All Source Analyst to support the Defense Counterintelligence and Security Agency's (DCSA) Insider Threat Management and Analysis Center (DITMAC), focusing on Secured Internet Protocol Router Network (SIPR) User Activity Monitoring (UAM) Analyst services based in Springfield, VA. This essential position involves conducting insider threat analysis for SIPR UAM initiatives, catering to both DCSA and various other Department of Defense (DoD) agencies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Cogility’s Continuous Insider Threat Intelligence solution allows government agencies to efficiently take a holistic-person approach to detect and respond to unwanted insider threat behavior based on technical and social indicators of risk in a single pane of glass.
$115,000 - $160,000 a yearExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
They must independently produce high-quality client solutions, such as threat, risk, and vulnerability assessments (TVRA), threat and protective intelligence briefings, corporate standards, policies, and procedures.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Positioned within the Cyber Threat Intelligence (CTI) team within the Cyber Threat Management Center (CTMC) of ECR at ELC, the Lead Intelligence Analyst role is pivotal in analyzing and comprehending adversarial capabilities, infrastructure, and Tactics, Techniques, and Procedures (TTPs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton is currently looking for a Cloud Engineer to support Threat Hunting's Threat Intelligence Data Strategy and CSD Operational Visibility Strategy. The basic tenants of the strategy include - secure, use, and manage threat intelligence data to improve CISA and stakeholder timely incident reporting and situational awareness.
$146,000 - $234,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The VP, Threat Intelligence Operations and Automation Leader is respons ible for leadin g the strategy and operations of Cyber Intelligence, Threat Informed Defense, and Security Automation programs supporting Cyber Operations and Information Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Liaise with local, state and federal law enforcement and intelligence agencies relative to intelligence or insider threat concerns impacting the Sentinel program. The candidate selected for this position will have the requisite skills and experience in Intelligence Analysis, Counterintelligence, Insider Threat, and Investigation Management.
Full-timeExpandApply NowActive JobUpdated 1 month ago
threat intelligence jobs Title: intelligence Company: Cyber Crime
FEATURED BLOG POSTS
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.