- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$165,000 - $221,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A Security Flex Officer acts as a visible deterrent to crime and client rule infractions and detect and report suspicious, unsafe or criminal acts at or near their assigned posts, which may be a threat to the property, clients, guests or employees at the site.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Operations is a globally distributed team of engineers split across 3 core regions; AMER, APAC and EMEA, and is at the forefront of security events that impact both GitLab.com and GitLab. We are both reactive and proactive, leading security investigations, incident response support and response resolution, through to cyber threat analysis and detection and response engineering.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In addition to the responsibilities listed below, this position is also responsible for serving as a senior investigator for the Corporate Security Investigations department in Kaiser Permanente, managing criminal, civil, and administrative investigations to support a variety of departments (e.g., Security Operations, Workplace Violence, Threat Management, Human Resources, Legal.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience with Network Protection technologies, including Firewalls, CSWG, ZTNA, IDS, NDR, NAC, Threat Detection and Response. Aid in critical decision-making for in-house security services (e.g. technology/service ever-greening, directional shifts in technology, technology/service sunsetting.
$140,700 - $263,200 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In your role as Senior Software Engineer-Backend for the Threat Intelligence Management team you'll lead, design, develop and deliver software that directly supports security analysts all across the world.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Review, audit, and monitor security compliance programs against security policies, standards, and frameworks such as PCI-DSS, NIST CSF-171, SOC1 II, etc. Lead evidence collection for external audits related to SOC1, PCI-DSS, etc.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deeply curious to discover elegant solutions for cyber defense capabilities including threat and vulnerability management, event monitoring, and incident response. We are partners in protecting Disney’s highly respected portfolio including Marvel Studios, Pixar Animation Studios, Lucasfilm, Disney Live Action Films, Walt Disney Animation Studios, Searchlight Pictures, and 20th Century Studios.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a Product Marketing Manager with a thorough understanding of cloud -based data protection products (e.g. CASB, DLP, SSPM/DSPM), compliance frameworks (e.g. GDPR, HIPAA, PCI), and security paradigms & platforms (e.g. Zero Trust, SSE/SASE.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of MITRE ATT&CK Framework and associated threat actor techniquesAble to perform all duties with a high level of ethics and core valuesWorking Environment / Physical Environment.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement and lead all aspects of comprehensive threat prevention solutions, including Data Loss Prevention (DLP), Intrusion Detection Systems (IDS/IPS), and sophisticated Endpoint Security. Implement, manage, and optimize Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) solutions to improve threat transparency and incident response capabilities.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of SOC workflows, threat detection & incident response use cases, MITRE ATT&CK framework. Fueled by an accelerating revenue stream, and investments from top-tier venture capital organizations such as Crowdstrike, Accel and Insight - we are rapidly expanding our team.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We propose, design, plan and implement strategic and tactical security improvements — from developing and deploying new Security tooling to performing architecture reviews and threat modeling. We are trusted to stay one step ahead of malicious actors in a rapidly-changing threat landscape.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum ten years of recent experience with at least three of the following: Security Architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity.
ExpandApply NowActive JobUpdated 5 days ago
threat job in Oakland, CA
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.