- UpvoteDownvoteShare Job
- Suggest Revision
Primarily responsible for API application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring threat management, threat modeling, identify threat vectors and develop use cases for security monitoring. Enhance security operations, analytics, threat hunting, and security orchestration and automation capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Technical Tester develops, designs, matures and executes services within the Purple Team. A successful candidate will have verifiable experience in offensive security, threat hunting, attack simulation, programming, and leadership.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cambridge International Systems, Inc. is seeking a full-time Counter Threat Finance Analyst based inDoral, FL. This position is contingent upon contract award, estimated to start August 2024. Assist in the development of strategic documents, DoD Directives and Instructions, and other DoD policy issuances that affect DoD activities to counter-threat finance challenges to U.S. national securityAssist DoD's work with the law enforcement and intelligence communities and other Federal departments and agencies to support law enforcement agencies on CTF/CTOC/CD/CT issues.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Also, m ust be able to pass a Security Threat Assessment as administered by the Transportation Security Administration. We are the premiere boutique Aviation Security company, and leaders in our industry.
$20.34 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You'll leverage your expertise to monitor and analyze security events, investigate incidents, and provide advanced threat detection and response. Perform incident detection, response & remediation, threat hunting, digital forensics, and configure alerting rules.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as an integral member of the Campus Emergency Preparedness Team, including serving as the Public Safety Group Supervisor for the Campus Crisis Management Team, and serving as the Public Safety Representative on the Behavioral Threat Assessment Campus Triage Team.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead all aspects of the strategy, daily operations, and advancement of the Security Operations function and focus on proactive threat detection, prevention, and response, through Threat Intelligence, Threat Hunting, Security Information and Event Management (SIEM) monitoring, investigations and Incident Response.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
A foundational understanding of secure product development objectives and practices, for example: Critical Vulnerability Response & Disclosure, Product Security Testing (pen-testing), Secure Code Review, Supply Chain Risk Mitigation, Vulnerability Management, Secure Development Training, Threat Modeling.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Investigate escalated security alerts and threat hunting leads across a variety of technologies (SIEM, EDR, email security, etc) for both on-prem and cloud environments, collaborating closely with Tier 1 SOC and with Threat Management team.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, vulnerability and cyber threat management, security architecture Experience in identifying gaps in security architecture.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position will be responsible for performing non-research molecular testing to rapidly identify and characterize potential biological threat agents. With employees in 13 states, and a 26-year partner to U.S. government agencies including the National Institutes of Health (NIH), Food and Drug Administration (FDA), Department of Homeland Security (DHS), Department of Justice (DoJ), and the Department of Commerce (DoC.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. You qualify for the GL-7 grade level if you possess one of the following: Experience: One year of specialized work experience that shows you have the skills necessary to make sound judgments and decisions; to analyze information rapidly and make prompt decisions and apply these skills in a law enforcement capacity such as training others, managing finances, code enforcement, doing compliance work, corrections, security, military, emergency responders, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in a related role and experience with concepts and practices such as threat modeling, risk identification, and data protection. Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM/EDR systems, malware detection systems, forensic and vulnerability management tools.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Threat intelligence management lifecycle. The incumbent will also drive continuous improvement through incident analysis, threat hunting, and incident simulation exercises. MINIMUM QUALIFICATIONS: Bachelor's degree in relevant field Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) GIAC Certified GIAC Forensic Analyst CERT Incident Response Process Professional Certificate Security + Certified Ethical Hacker Cloud Security certification Minimum 7 years of relevant experience Security incident management processes and tools.
Full-timeExpandApply NowActive JobUpdated Yesterday
threat job Title: application security Company: Mitek Industries in Miami, FL
FEATURED BLOG POSTS
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: