- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job SummaryIn this role you will focus on researching vulnerabilities from a Threat Intelligence perspective and you will use these skills, intelligence sources, and tools, to score, assess, prioritize, and ensure timely remediation of the highest risk rated vulnerabilities to the financial sector and our firm.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct directed threat analysis research and fusion of all-source data and information that supports analysis to enhance the ability of SOCOM as the Coordinating Authority (CA) for GCP-V to develop multi-disciplined products.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct directed threat analysis research and fuse all-source data and information to support analytical efforts, enhancing the ability of Special Operations Command (SOCOM) as the Coordinating Authority (CA) for GCP-V in developing comprehensive multi-disciplined products.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct red team assessments that require expertise in social engineering, application security (web and mobile), physical intrusion methods, lateral movement, threat analysis, and all other red team capabilities.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reviews continuous audit and vulnerability assessment data and collaborates with the threat intelligence section to prioritize and manage patch updates based on the risk and impact within the environment.
RemoteExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment: Conduct regular vulnerability assessments and penetration testing to identify potential weaknesses and implement necessary security measures. Threat Intelligence: Stay abreast of the latest cybersecurity threats and trends, ensuring the organization's security strategies and practices are up-to-date and effective.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, this position will offer and provide training within the Office of Safe Schools that include SESIR Incidents, Florida Safe School Assessment Tool, compliance matters, threat management, bullying, and other areas related to school safety as needed.
Part-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with Cyber Intelligence teams to correlate threat assessment information. They are accountable for maintaining DTCC's corporate security policies and control standards and acting as an operational arm for monitoring threat intelligence.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform real time cyber-incident handling (e.g., host and network based forensic collection, intrusion correlation and tracking, and cyber-threat analysis) At least one of the following certifications: GCIH, GCFA, CEH, GSEC or comparable Familiar with NIST, ISO, and other industry standard incident response frameworks.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Completed the following training courses: Target Coordinate Mensuration (TCM), Modernized Integrated Database (MIDB) for Targeteers, Google Earth for Target Developers, Weaponeering, Collateral Damage Estimation (CDE), Joint Targeting School (JTS) Applications Course, Defense Threat Reduction Agency (DTRA) Underground Facilities (UGF), Joint Intermediate Target Development (JITD) Course, Battle Damage Assessment (BDA.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience on the following systems: NGA validated point mensuration systems (SOCET-GXP with CGS), Joint Targeting Toolbox (JTT), Modernized Integrated Database (MIDB), Digital Precision Strike Suite (DPSS) Collateral Damage Estimation (DCiDE), Joint Munitions Effects Manual (JMEM) Weaponeering System (JWS), Cross domain security guard applications or solutions (ISSE-GUARD), radiant mercury imagery guard (RMIG.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct research into real-world threat actor tactics and reverse engineer proof-of-concept (POC) exploit code to help validate environmental applicability. Participate in tactical assessments that require expertise in social engineering, application security (web and mobile), physical methods, lateral movement, threat analysis, internal and external network architecture, and a wide array of products.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with cyber intelligence and global security teams to align threat assessment data, facilitating effective coordination and response efforts. Support the Threat and Vulnerability Assessment process to prioritize and address remediation efforts effectively.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response and identity and access managementKnowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts.
ExpandUpdated 7 days ago
threat assessment jobs in Tampa, FL
FEATURED BLOG POSTS
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.