- UpvoteDownvoteShare Job
- Suggest Revision
Review, refine and mature existing security processes and tools, including but not limited to SIEM, DLP, vulnerability management, email security, end point security, penetration testing, threat hunting, threat analysis, security monitoring, and security incident response.
$128,000 - $184,000ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Palo Alto Networks Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong security foundation knowledge and practices in identity and access management, authentication, authorization, crypto, protocol security, perimeter security, OS hardening, threat intelligence, vulnerability assessment and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At Concentric, "We Manage Risk Everywhere to Keep People Safe." If you are passionate about intelligence, risk analysis, threat management, executive protection, security operations, or business resiliency, Concentric may be the organization you've been searching for.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Respond to incidents of fire, medical emergency, bomb threat, flooding, water discharge, elevator emergency, hazardous materials, or inclement weather with calm urgency. As a Hospital Security Officer, you will serve and safeguard a high profile healthcare customer.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of MITRE ATT&CK framework and associated threat actor techniques. Aurora is working with industry leaders across the transportation ecosystem, including Toyota, FedEx, Volvo Trucks, PACCAR, Uber, Uber Freight, U.S. Xpress, Werner, Covenant, Schneider, and Ryder.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Your responsibilities will include the development and Integration of threat intelligence into Security Operation Centers tools like SIEM, SOAR, and XRD to drive superior security efficacy and reduce time to mitigation.
$159,800 - $314,200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Apply structured analytic techniques, data science, and intelligence tradecraft to perform social network analysis of large attribute, ideational, and relational data sets to identify threat actor networks, critical nodes, and kill-chains.
$147,200 - $269,800 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of various security disciplines (endpoint, cloud, network, IAM, DevSecOps, incident response, threat intelligence, etc. Build automation playbooks, develop threat detection queries and analytics, and continuously improve our security posture.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Rust or other languages- Have in-depth knowledge with real-time embedded software philosophies and practices - Have expertise with Linux and RTOS- Review schematics, logic analyzer, and embedded software (bare-metal) trouble-shooting techniques- Familiarity with cryptography, threat modeling, and secure SDLC, TrustZone, bootloader.
$134,500Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Optional directions include but are not limited to web security, network security, host and terminal security, data security, threat intelligence, SoC/SIEM/SOAR, Client Security, DevSecOps, etc., respecting personal interests and development intentions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify and digest threat data from various open and closed sources, correlating it against environmental context and ATT&CK matrix to produce threat intelligence. Keep a finger on the pulse of threat and actor trends; advise IT and business stakeholders when immediate action is justified; and adjust detection engineering priorities based on the current threat landscape.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will focus on monitoring Insider Threat solutions and perform analysis/investigations as appropriate in accordance with established incident response processes. + Monitor, detect, analyze, respond to Insider Threat alerts, and perform investigations as appropriate in accordance with incident response processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical Proficiency: Automation experience with Java/Python, SASE/SSE expertise: SWG, CASB, DLP, FWaaS protocols, Threat Protection, Virtualization, Cloud Infrastructure knowledge: GCP, AWS, Azure.
Full-timeExpandApply NowActive JobUpdated Today
threat job Title: intelligence Company: Cyber Crime in Santa Clara, CA
FEATURED BLOG POSTS
10 Best Tips to Find a Job When Relocating
Are you planning to move? That’s great news, but now you might wonder what that means for your job. Some people are lucky – they can relocate and keep working the same position as always, just remotely. For others, however, this isn’t an option. They must search for and land a job in their soon-to-be new city. This can be intimidating, given that getting a new job even under normal circumstances can be challenging. Now you’ll have to overcome additional hurdles. This article provides valuable tips on how to find a job in another state. Because it can be done! Read on to learn how.
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being
Decline a Job Offer Professionally: When to Rescind
Your job search has finally paid off! After countless job applications, numerous emails, and several interviews, the hiring manager and other stakeholders have decided that you’re the right person for the job! All you have to do now is accept the offer and walk into the sunset, right?
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: