- UpvoteDownvoteShare Job
- Suggest Revision
Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.
$100 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop, maintain, and support an IT Risk management program to include risk identification, measurement/prioritization, mitigation, and reporting (in partnership with the Governance Manager). What you need to succeed (minimum qualifications) Develop, maintain, and support an IT Risk management program to include risk identification, measurement/prioritization, mitigation, and reporting (in partnership with the Governance Manager.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and implement security controls for cloud environments, including identity and access management, data encryption, data loss prevention (DLP), vulnerability management, and threat detection.
$185,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Domain knowledge for the following cybersecurity capability areas: Application Security, Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, Identity and Access Management, Cyber Threat Operations, Cybersecurity Testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Execute response activities which may include incident response, incident management, driving remediation or threat mitigation, threat hunting and forensic analysis; carry out other security operations activities which may include identification of weakness (such as vulnerabilities / insecure configurations), reviewing/assessing security configuration change requests and driving the coverage of the security monitoring services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Retrieve and review FBI Criminal History Records Checks (CHRC) and TSA Security Threat Assessment (STA) results for applicants. Ability to establish and maintain effective working relationships with airline management, federal partners, co-workers and the public, and represent the airport in a positive and professional manner.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Policy and Device Management solution like MEM, Intune, Azure Arc, GPO. Experience in Deploying and managing SIEM, SOAR and Threat Intelligence platforms. Experience in analyzing and creating remediation strategies for vulnerability management programs, security architecture reviews, cloud security reviews in a Managed Security Services Model.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience in administration, configuration and troubleshooting on CyberArk modules: Enterprise Password Vault (EPV), Password Vault Web Access (PVWA), Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Session Management Proxy (PSMP), Privileged Threat Analytics (PTA.
$188,375 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication.
$170,810 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of relevant work experience in fields such as technical marketing, technical pre-sales, or product marketing/management with a track record in crafting messaging and positioning. You will also help drive the success of AWS security initiatives like educating customers on how AWS threat intelligence is utilized to defend against the latest security risks.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management and threat detection platforms. Familiarity with DevSecOps principles such as CI/CD or Infrastructure as Code (IaC) is advantageous. Develop, implement, and manage DevSecOps-focused incident response plans, playbooks, standard operating procedures, and security tools and technologies.
$195,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BA products and services include advanced software applications for building control and optimization; sensors, switches, control systems, and instruments for energy management; access control; video surveillance; fire products; and installation, maintenance, and upgrades of systems.
$139,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Technical proficiency with security-related systems and applications, especially Cisco FTD/ASA, Meraki MX, Microsoft security products, and Microsoft O/Azure.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in IT, Vulnerability Management, Incident Response, Threat Intelligence, DevOps, Application Security or Security AutomationExpertise in one or more cloud environments. Expertise in IT, Vulnerability Management, Incident Response, Threat Intelligence, DevOps, Application Security or Security AutomationExpertise in one or more cloud environments.
Full-timeExpandApply NowActive JobUpdated Today
management threat jobs in Atlanta, MI, France
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.