- UpvoteDownvoteShare Job
- Suggest Revision
Produce analytical information reports from reviews of Law Enforcement database searches in support of ongoing national security investigations, FIE and insider threat reports. Produce analytical information reports from reviews of investigative and IC database searches in support of ongoing national security investigations and insider threat reports.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Transportation Security Administration (TSA) Security Clearance: Candidates for employment with the San Francisco Airport Commission are required to undergo a criminal history record check, including FBI fingerprints, and Security Threat Assessment in order to determine eligibility for security clearance and may be required to undergo drug/alcohol screening.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber threat landscape, vulnerability management, and NIST CSF. Ensure a world-class cyber defense program by working closely with other technical, incident management, legal, compliance, and cyber personnel to develop a deeper understanding of the intent, objectives, and activity of cyber threat actors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of troubleshooting Network Security devices and tools, including Adaptive Security Appliances (ASA) and Firepower Threat Devices (FTD). 5-7 years of hands-on experience as Sr Network Security Engineer, administering and configuring enterprise-wide LANs, WANs, WLANs, VPNs, and Controller-based Lightweight APs, with a focus on Cisco Network & Security implementation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will be focused on leading and performing advanced triage and detail analysis of security events of technology environments and integrating risk-based threat intelligence into the operational environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Threat Management Associate will perform detection and analysis activities through the monitoring of security appliances, such as, SIEM, IDS/IPS, EDR, and other Threat Detection platforms.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This will include threat identification, emerging technology analysis, market research, and competitive intelligence initiatives of a highly technical nature. Ownership and process design for creation, review, dissemination, and all other relevant business processes related to forecasting, business plans, threat analysis, and other reports.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leading security practitionersincluding physical and corporate security, cyber threat intelligence (CTI), vulnerability management, and vendor risk management teamsrely on the Flashpoint Intelligence Platform, comprising open source (OSINT) and closed intelligence, to proactively identify and mitigate risk and stay ahead of the evolving threat landscape.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification(s) such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Authorization Professional (CAP), or Cyber Threat Intelligence certifications would be advantageous.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in Security Engineering, Threat Response, Security Operations, IT Operations, IT Compliance and/or IT Governance. Multi-Domain Proficiency: Demonstrate expertise in multiple information security domains, including but not limited to network security, application security, cloud security, and data protection.
$94,900 - $151,600 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in implementing security best practices on GCP, including identity and access management (IAM), encryption, and threat detection. Certified Google Cloud Engineer, Google Cloud Processional Security Engineer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today
threat job Title: application security Company: Mitek Industries
FEATURED BLOG POSTS
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being
Decline a Job Offer Professionally: When to Rescind
Your job search has finally paid off! After countless job applications, numerous emails, and several interviews, the hiring manager and other stakeholders have decided that you’re the right person for the job! All you have to do now is accept the offer and walk into the sunset, right?
Resume Job Description Samples - 8 Tips to Follow
When looking for a job, your resume becomes a crucial element. From making a great first impression to showcasing all your achievements and potential, your resume has to portray your professional story in minutes.
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?