- UpvoteDownvoteShare Job
- Suggest Revision
This position collaborates with personnel and stakeholders across multiple operations teams such as – Threat Analysis, Incident Response, Cyber Threat Intelligence, Security Infrastructure, Insider Threat, Red Team, Security Architecture, Dev-Ops, Detection Engineering, Identity Mgt, and more.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with Threat Intelligence and Threat detection team to continuously improve cybersecurity capabilities in identification, management, and response to threats in the most efficient and effective manner.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This individual will be responsible for executing on the operational security program, overseeing Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, and the Cyber Threat Intelligence program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We provide innovative and comprehensive services and solutions that span cloud; systems integration and application management; security; intelligent platform services; infrastructure services; software engineering services; data and artificial intelligence; and global delivery through our Advanced Technology Centers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Subject matter expert for analytical tools and techniques, primarily in business intelligence platform management (Tableau, Looker, PowerBI, Domo) and supporting tools (dbt, git) As a key member of the Data Intelligence team, this includes preparing and executing analytic strategies, measurement and reporting for CRM digital and non-digital marketing campaigns and making proactive recommendations that drive the key performance goals of our clients.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes developing contract negotiation strategy, gathering competitive intelligence, coordinating financial team analysis, gaining Monomers business approval, writing contract briefs to support the business case to senior management, and consulting with MCG corporate legal counsel.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ensure robust endpoint protection, network security, and threat intelligence capabilities. This role requires a dynamic leader with a strong background in security management, incident response, risk assessment, and regulatory compliance.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications Additional Preferred Qualifications Advanced certification in one or more GTSC competency areas, such as Society for Human Resources Management Certified Professional (SHRM-CP), Project Management Professional (PMP), Lean Six Sigma Green or Black Belt, Change Management (Prosci), or Certified Professional Facilitator (CPF.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
REiLI , Fujifilm's artificial intelligence initiative, combines Fujifilm's rich image -processing heritage with cutting-edge AI innovations to inspire a new tier of clinical confidence. Ensure compliance with all applicable requirements of the company's quality management system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience analyzing various sources of Cyber Threat Intelligence (CTI) for TTP's, IOCs, and threat actor behavior to guide hunt operations. Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, and threat and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with the Regional Director of Revenue Management in implementing Revenue Management programs and new initiatives at the hotel. Ability to use PMS, reservation and revenue management systems to forecast and implement optimal strategies.
ExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience in administration, configuration and troubleshooting on CyberArk modules: Enterprise Password Vault (EPV), Password Vault Web Access (PVWA), Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Session Management Proxy (PSMP), Privileged Threat Analytics (PTA.
$97,613 - $188,375 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and enforce cloud security best practices, access management, data encryption, and threat detection. As a Cloud Security Engineer, you will play a key role in the on-going configuration and management of our Microsoft Azure Cloud security suite specifically Microsoft Defender for Cloud Apps, Azure Sentinel SIEM, Defender for Endpoint, and Defender Vulnerability Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The People Analytics team is globally respected as a leader in its field and is dedicated to staying on the cutting edge of business intelligence and data science methodology and technology. As such, we've built a world class People Analytics and Measurement team to optimize people management and facilitate data-driven decision making.
ExpandApply NowActive JobUpdated Today
management threat intelligence jobs Company: Ncr Corporation in Atlanta, MI, France
FEATURED BLOG POSTS
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.