- UpvoteDownvoteShare Job
- Suggest Revision
Develop regular threat intelligence briefs based on general threat actor concerns across the agency, business units, and those specific to our client and deliver briefs to senior executives.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead the CTI analyst on the team in the development of regular threat intelligence briefs based on general threat actor concerns across the company, business units, and those specific to our client and deliver briefs to senior executive.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Threat Intelligence Analyst to join our team in the DMV area.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support other client programs including insider threat, business continuity, health and safety, travel security, executive security, and physical security threat analysis. The Analyst performs tactical level threat intelligence functions to include collection of intelligence information and tracking physical threat activities which directly or indirectly affect employees, facilities and interests globally.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The business segment, led by former New York City Police Commissioner William Bratton, is comprised of a world-class team of practitioners, investigators, analysts, technical advisors, and strategic partners with a broad array of operational and advisory backgrounds from the world's most respected corporate, military, intelligence, consulting, technology, public health, and public-safety organizations.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a threat intelligence analyst who is passionate about securing the desktop computing environment, loves macOS, and is committed to driving security investigations and improvements in macOS.At Apple, our mission involves securing and protecting over a billion endpoints; operationalizing threat intelligence into security engineering decisions affecting every layer of the stack; and touching the lives of everyone who interacts with our products.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leading projects for intelligence development or emerging cyber threat related that requires coordination with multiple groups of civilian, military, and contract personnel. As an IT Specialist (Security) within ITSO, the incumbent is a recognized IT security and strategic intelligence expert within the federal government with a strong background in cyber threat intelligence, strategic intelligence, and the intelligence planning process.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Supervises and mentors subordinate project and staff and collaborates and works with other Threat Intelligence Analysts. Performs cyber intelligence analysis and develop raw intelligence products derived from intelligence reporting, open-source data, and information housed in a custom, classified system based on a proprietary configuration to support investigations, operations, and intelligence production.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Aids and guides Cyber Analysts in threat hunting as well as counterintelligence operations. Understand advanced cyber threats, threat vectors, and attack methodologies and how they tie into the Cyber Kill Chain or ATT&CK Framework and Diamond Model.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide Insider Threat analyses to ensure situational awareness of threats and cyber threat intelligence information. This opportunity resides with Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) , a business group within HII’s Mission Technologies division.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform active hunt activities based on current cyber threat intelligence and the MITRE ATT&CK Framework. The Senior Threat Hunt Analyst is responsible for analyzing detailed information and intelligence on known and emerging Advanced Persistent Threat (APT) and cybercriminal actors to develop attack hypotheses; working collaboratively and leveraging cyber threat intelligence, penetration testing, and other valuable analysis, sensing, and warning information.
$150Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the customer with reports (both a classified and unclassified version, if necessary, and determined by the relevant classification guides) synthesizing the cyber threat intelligence derived from OSINT and closed-source reporting, as well as a listing of adversaries of interest, and a listing of their known TTPs.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience in linguistics, with Russian language, security attach & penetration, cyber intelligence/investigations and threat intelligence/investigations. Analysts will apply their language capabilities to inform and deepen overall understanding of cyber intelligence and threat analysis duties.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience managing SIEM, UEBA, IAM, vulnerability management, data loss prevention (DLP), threat intelligence, MITRE ATT&CK framework mapping, security orchestration automation and response (SOAR), and other network and system monitoring tools.
Full-timeExpandApply NowActive JobUpdated 1 month ago
business intelligence threat jobs Company: Remoteworker Us in Washington, DC
FEATURED BLOG POSTS
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.