- UpvoteDownvoteShare Job
- Suggest Revision
Relevant work experience in Information Technology and Cybersecurity, including roles in SOC, Network/Security Engineering, Threat Intelligence, or similar domains. Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Concepts, principles, practices, and techniques associated with threat assessment/threat management, counterintelligence and law enforcement and knowledge of the organization of the security and counterintelligence communities, including their capabilities and jurisdictions and significant experience with collaboration and information sharing within and across the Federal Government, Intelligence, Counterintelligence, Law Enforcement and Security communities.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in concepts, principles, practices, and techniques associated with threat assessment/threat management, counterintelligence and law enforcement and knowledge of the organization of the security and counterintelligence communities, including their capabilities and jurisdictions and significant experience with collaboration and information sharing within and across the Federal Government, Intelligence, Counterintelligence, Law Enforcement and Security communities.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Required Experience:Bachelor’s degree in Cybersecurity, Information Technology, Criminal Justice, Intelligence, or a related field Minimum of 7 years of experience in insider threat management, investigations, or a related cybersecurity role.
Starting at $79,607.91 - $172,483.8 a month depends on education, experienceFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate and assist in delivering NTER's Quarterly Webinar in threat assessment and targeted violence prevention. - Coordinate engagement with threat assessment and violence prevention programs within the Intelligence Community.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with intelligence analysts to correlate threat assessment data. Must have, or be able to obtain within 3 months, one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist with informing and tuning the development of threat management strategies, as well as assessment instruments used to identify potential risk behaviors indicative of an insider threat.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Finally, this role will be responsible for building and maintaining engagement with agencies, industry associations, and other threat assessment and management security experts to drive innovation and best-in-class threat management programs.
$113,100 - $146,300 a yearFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Solutions Architect - Associate or Professional, or CompTIA Network+ certification.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Capability to support the following systems: ArcSight SIEM; Splunk; Novetta Cyber Analytics; FireEye MPS Suite; Snort IDS; Bro IDS; Fidelis XPS; CloudShield Trusted Cyber Solution Orchestrator; Microsoft Advanced Threat Analytics; Counterattack Active Defense.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated 26 days ago
threat assessment information technology jobs in Washington, DC
FEATURED BLOG POSTS
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.