- UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SANS GCTI (GIAC Cyber Threat Intelligence) Utilize Threat Intelligence and Threat Models to create threat hypotheses. SANS GOSI (GIAC Open Source Intelligence.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Open Source Intelligence Analyst will conduct research and provide intelligence to the threat management team in a timely manner to support the investigation and mitigation of threatening incidents or behaviors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3 years experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. C ollaborate within an Agile development team to ensure that incremental capabilities are delivered each sprint and develop Incident Response (IR) automation scripts and reusable integrations for InfoSec technologies (e.g., Phantom, Demisto/XSOAR, Splunk, CrowdStrike, Office 365, Jira, MySQL, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a direct report to the Chief Information Security Officer (CISO), the Vice President of Threat Management and Response (TMR) will oversee the programs that gather Threat Intel, perform penetration testing, manage vulnerabilities, monitor & respond to events & incidents, and manage insider threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of Endpoint Detection and Response tools (e.g., Carbon Black, CrowdStrike) Experience with and advanced knowledge of cybersecurity technology domains including, SIEM, Network Security, Endpoint Security, Application Security, and Security Operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Phia, LLC At phia, trust us to solve the complex challenges of our connected world through top-tier cyber intelligence & threat hunting. Who We Arephia, LLC is a Northern Virginia-based, 8a certified small business established in 2011 with a focus in Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response , Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Competent with a proven work history of working with Threat Intelligence, cyber security incidents, working with and building security tools (SIEM, vulnerability scanners, firewalls, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop Splunk Content for Cloud / API Security threat use cases (cloud, container, or orchestration misconfiguration, OWASP vulnerabilities, Injection Flaws, insecure network policies, logging & monitoring / runtime threats, CI/CD pipeline & supply chain flaws, cloud IAM roles, Account hijacking, Data exfiltration) Cloud Identity Management, privileged access escalation, Key Management threat scenarios.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In place of the intelligence community or federal law enforcement leadership experience, at least five years’ experience in a leadership role for a corporate risk intelligence, threat management, enterprise security, or similar function is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Broad knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems such as Securonix Next Gen, intrusion detection/prevention systems (IDS/IPS) such as Securonix Cloud Ingestor, public key infrastructure (PKI), antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience proactively threat hunting using threat intelligence to identify potential risks and weaknesses in telemetry. Participate in threat hunting initiatives, collaborating with various engineering and product teams to emit signals to incorporate into detections, new telemetry ingestion, and/or security controls.
ExpandApply NowActive JobUpdated Today
threat intelligence jobs Title: vulnerability management Company: Dell
FEATURED BLOG POSTS
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are