- UpvoteDownvoteShare Job
- Suggest Revision
This position collaborates with personnel and stakeholders across multiple operations teams such as – Threat Analysis, Incident Response, Cyber Threat Intelligence, Security Infrastructure, Insider Threat, Red Team, Security Architecture, Dev-Ops, Detection Engineering, Identity Mgt, and more.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This individual will be responsible for executing on the operational security program, overseeing Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, and the Cyber Threat Intelligence program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize multiple security/threat intelligence tools and resources to understand threats. Experience analyzing various sources of Cyber Threat Intelligence (CTI) for TTP's, IOCs, and threat actor behavior to guide hunt operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, threat intelligence and vulnerability management.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and enforce cloud security best practices, access management, data encryption, and threat detection. As a Cloud Security Engineer, you will play a key role in the on-going configuration and management of our Microsoft Azure Cloud security suite specifically Microsoft Defender for Cloud Apps, Azure Sentinel SIEM, Defender for Endpoint, and Defender Vulnerability Management.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Processes intelligence information using a variety of analytical tools and integrates data to produce studies, special reports, correspondence, briefings, papers, threat assessments, threat warnings, link analysis, and forecasts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a direct report to the Chief Information Security Officer (CISO), the Vice President of Threat Management and Response (TMR) will oversee the programs that gather Threat Intel, perform penetration testing, manage vulnerabilities, monitor & respond to events & incidents, and manage insider threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The People Analytics team is globally respected as a leader in its field and is dedicated to staying on the cutting edge of business intelligence and data science methodology and technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience must be as an Information Security Analyst, Security focused Network Admin/Engineer or Systems Admin/Engineer. Global Payments Inc. is an equal opportunity employer.
$150ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
THE OPPORTUNITY: As a Senior Software Engineer, you will develop custom business solutions for our internal intranet platform using primarily Microsoft technologies. Seyfarth Shaw is committed to equal employment opportunity and providing reasonable accommodations to applicants with physical and/or mental disabilities.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure robust endpoint protection, network security, and threat intelligence capabilities. Develop and implement a strategic security program to protect the organization's data, infrastructure, and assets.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will have indepth knowledge and experience in; cloud data lake house; Databricks (preferred) or Snowflake; cloud-native solutions knowledge; SQL or Python; modern DevOps approach; have written data code AND also the CI/CD pipelines.
$140,000 - $165,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Architecture & Engineering Director is responsible for planning, directing and managing Ameris Bank's Information Security Architecture & Cyber Security Engineering to ensure the security of the Bank's operations, assets, and data.
$150ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We’re working to build a more inclusive economy where our customers have equal access to opportunity, and we strive to live by these same values in building our workplace. Block is a proud equal opportunity employer.
Full-timeExpandApply NowActive JobUpdated Today
security data engineer threat clearance intelligence equal opportunity jobs Title: security Company: Clearancejobs in Atlanta, GA
FEATURED BLOG POSTS
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!