- UpvoteDownvoteShare Job
- Suggest Revision
Establish policies and develop procedures for all aspects of security operations, focusing on threat modeling, threat hunting, digital forensics and incident response. Responsibilities:Manage day-to-day operations of the SOC.Lead a team of security professionals and MSP ensuring efficient incident response and threat detection.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Formulate related threat management strategies in support of DITMAC analytical findings/recommendations provided to DoD Component Insider Threat programs that may have significant national security implications.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience with incident response, security operations, malware analysis, or threat hunting. Our analysts spend each day hunting for evidence of threat actor activity and working with engineering and security teams to improve our detection capabilities and security controls.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise. SANS GCTI (GIAC Cyber Threat Intelligence) Utilize Threat Intelligence and Threat Models to create threat hypotheses.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As part of Threat and Incident Management team, you will support TikTok's inside threat operation. The Global Security Organization provides industry-leading cybersecurity and business protection services to TikTok globally.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. + Minimum of 3 years experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment. Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
And we are looking to add an experienced Security Automation Engineer to an already outstanding team. Experience with and advanced knowledge of cybersecurity technology domains including, SIEM, Network Security, Endpoint Security, Application Security, and Security Operations.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Director of Security with a dotted line reporting relationship to the Associate Directors, provides leadership and direct management oversight of Security’s internal programs, including but not limited to department response protocols, standard operating procedures and practices along with Museum-wide safety and security programs (crisis management, risk identification, threat mitigation and response, life safety, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role you will: Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. Here’s What you Need Minimum of 3 years’ experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated 6 days ago
threat job Title: security engineer Company: Talent Software Services
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.