- UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Threat Intelligence Analyst to join our team in the DMV area.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Open-Source Intelligence (C-OSINT) AND Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients. Develop regular threat intelligence briefs based on general threat actor concerns across the agency, business units, and those specific to our client and deliver briefs to senior executives.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Integrate agile principles into cybersecurity, network, application monitoring, cyber threat intelligence, threat hunting, penetration testing, and forensics. 5 years of experience integrating and managing agile principles into cybersecurity, network, application monitoring, cyber threat intelligence, threat hunting, penetration testing and forensics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience collecting, analyzing, and disseminating cyber threat intelligence gathered through open, proprietary, and collateral sources to provide assessments and briefings for its customers.
$86,000 - $138,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This assignment is within U.S. Customs and Border Protection, Office of Intelligence, Insider Threat and Counterintelligence Services Division. This position is with the Department of Homeland Security, within U.S. Customs and Border Protection, Office of Intelligence, Insider Threat and Counterintelligence Services Division located in Washington, DC. This position will be used to staff key positions within the Insider Threat Branch.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide Insider Threat analyses to ensure situational awareness of threats and cyber threat intelligence information. HII - Mission Technologies is seeking a full-time DMATS Insider Threat Analyst for the Division of Strategic Information (DSI) in the Center for Medicare and Medicaid Services (CMS) effort.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a threat intelligence analyst who is passionate about securing the desktop computing environment, loves macOS, and is committed to driving security investigations and improvements in macOS.At Apple, our mission involves securing and protecting over a billion endpoints; operationalizing threat intelligence into security engineering decisions affecting every layer of the stack; and touching the lives of everyone who interacts with our products.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the CTI analyst on the team in the development of regular threat intelligence briefs based on general threat actor concerns across the company, business units, and those specific to our client and deliver briefs to senior executive.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Leading projects for intelligence development or emerging cyber threat related that requires coordination with multiple groups of civilian, military, and contract personnel. As an IT Specialist (Security) within ITSO, the incumbent is a recognized IT security and strategic intelligence expert within the federal government with a strong background in cyber threat intelligence, strategic intelligence, and the intelligence planning process.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide the customer with reports (both a classified and unclassified version, if necessary, and determined by the relevant classification guides) synthesizing the cyber threat intelligence derived from OSINT and closed-source reporting, as well as a listing of adversaries of interest, and a listing of their known TTPs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Supervises and mentors subordinate project and staff and collaborates and works with other Threat Intelligence Analysts. Performs cyber intelligence analysis and develop raw intelligence products derived from intelligence reporting, open-source data, and information housed in a custom, classified system based on a proprietary configuration to support investigations, operations, and intelligence production.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Analyst performs tactical level threat intelligence functions to include collection of intelligence information and tracking physical threat activities which directly or indirectly affect employees, facilities and interests globally.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Aids and guides Cyber Analysts in threat hunting as well as counterintelligence operations. Understand advanced cyber threats, threat vectors, and attack methodologies and how they tie into the Cyber Kill Chain or ATT&CK Framework and Diamond Model.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This Cyber Threat Analyst position supports the Defense Cyber Crime Center (DC3) and participates as a team member performing threat analyses based on knowledge of cybersecurity and concepts supporting intelligence analysis requirements for all-source cyber analysis and reporting.
ExpandApply NowActive JobUpdated 2 days ago
intelligence threat jobs Company: Remoteworker Us in Washington, DC
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: