- UpvoteDownvoteShare Job
- Suggest Revision
Insider Threat Analyst. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At phia, trust us to solve the complex challenges of our connected world through top-tier cyber intelligence & threat hunting. Proven experience with data integration experience between multiple intelligence source feeds, a Threat Intelligence Platform (TIP) (e.g. Analyst Platform, Anomali, Threat Connect, or similar), and Splunk to conduct data analysis to identify trends and patterns.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Threat Analyst will play a pivotal role in identifying and assessing the capabilities and activities of cybercriminals and foreign intelligence entities for our customer. phia is seeking a motivated Cyber Threat Analyst with a passion for protecting large enterprises from cyber threats and a desire to advance their career in a dynamic and challenging environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capgemini Government Solutions (CGS) is seeking a highly motivated Cyber Security Content Developer/ Cyber Threat Detection Developer (Threat Detection Developer) for User Activity Monitoring (UAM) to join our team to support our government clients.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This Cyber Threat Analyst position supports the Defense Cyber Crime Center (DC3) and participates as a team member performing threat analyses based on knowledge of cybersecurity and concepts supporting intelligence analysis requirements for all-source cyber analysis and reporting.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a cyber threat specialist on our team, you'll help customers solve problems using the latest software like Splunk, Carbon Black, Tenable, and SIEM products. 7+ years of experience in a Cybersecurity role, such as cyber intelligence, cyber threat analysis, incident response, cyber investigations, malware analysis, or network forensics.
$81,800 - $186,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Formulate related threat management strategies in support of DITMAC analytical findings/recommendations provided to DoD Component Insider Threat programs that may have significant national security implications.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Nice to have: Carnegie Mellon University Certified Insider Threat Program Manager (ITPM), CEH, Security+ or related SANS certification. Extensive technical experience in either reverse engineering/malware analysis, insider threat, threat intelligence, incident response, security operations, or related information security field.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting. Knowledge of Structured Analytic TechniquesHost-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Cross-functional experience within a global security team (e.g. threat monitoring, travel security, business continuity and crisis management), particularly in a leadership role. The candidate must have previous exposure to tactical and operational security work in a leadership capacity, having worked their way up through the ranks of a GSOC, SOC or similar physical threat monitoring team (e.g., Operator, to Supervisor, to Lead.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber threat actor motivations, TTPs, cyber kill chain, vulnerability threat intelligence, and MITRE ATT&CK framework. Develop and maintain strategic partnerships with threat intelligence providers and industry organizations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SUMMARY - Cyber Threat Analyst: Under the direct supervision of the Supervisor, IT Infrastructure, the incumbent will participate in professional and on-the-job training to ensure continuing education certifications as needed.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform research using open-source and classified Cyber Threat Intelligence sources to identify and track Advanced Persistent Threats (APT), malware packages, and exploitable vulnerabilities. SUMMARY BGS, a subsidiary of Bering Straits Native Corporation is currently seeking a qualified Cyber Threat Intelligence Analyst for a project in Washington D.C. The ideal candidate for this job will serve as a Cyber Threat Intelligence Analyst within the federal client’s Cyber Division – Cyber Integration Center.
ExpandApply NowActive JobUpdated Today
Title: threat Company: Scout Solutions
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.