- UpvoteDownvoteShare Job
- Suggest Revision
Have you learned about or worked with OT/Control Systems and have an interest in Threat Intelligence? Department Summary:Do you have a Threat Intelligence background and an interest in Operational Technology (OT) or Control Systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of various security methodologies and processes, and technical security solutions (firewall, intrusion detection systems, and Security Information and Event Management (SIEM) platforms, Threat Intelligence Platforms, Vulnerability Scanning, Security Orchestration and Response etc.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience with various cybersecurity techniques and principles, such as Security Operations Center and SIEM, forensics, threat hunting, penetration testing, and threat intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Stay current with the latest cyber threat intelligence, trends, and technologies. Proficiency with threat hunting tools and platforms (e.g., Splunk, ELK Stack, CrowdStrike, Carbon Black.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics. Experience with threat modeling or other risk identification techniques, and risk management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS Senior SI/Cyber Analyst, you will serve as a key member of a threat analyses and strategic planning team embedded with the 389th Military Intelligence Battalion and in direct support of US Army Special Operations Command (USASOC), the Theater Special Operations Commands and other Strategic Partners across the Special Operations Forces Emerging Threat, Operations and Planning Support (SOFETOPS) enterprise.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Investigate Open Source Threat Intelligence for the agency. Knowledge of potential security threat reporting and tracking by means of at least one large-scale ticketing system (CAPRS, ServiceNow or other similar system.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with various cybersecurity techniques and principles, such as forensics, threat hunting, penetration testing, threat intelligence, identity management, cryptography, cloud security, endpoint security and/or data loss prevention.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage internal (Mindshare) and external client relationships to guide the Business Intelligence engagements. Data Visualization – DOMO, Tableau Web Analytics – Google Analytics, Adobe Analytics AdServers – Sizmek Syndicated Measurement: Nielsen, comScore Ad Effectiveness Research: Kantar Millward Brown, Upwave, Lucid, Dynata.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with Security Information Event Management (SIEM), Email Security Gateway, Continuous Monitoring, Intrusion Detection/Prevention Systems (IDS/IPS), Network Traffic Analysis, Incident Response, Endpoint Security Systems, Digital Forensics, WLAN Monitoring, Threat Hunting, Threat Modeling and Offensive Security.
$88,300 - $139,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our solution offers a next-generation approach to managing cyber risk by combining insurance, threat intelligence, security expertise, and AI-driven predictive modeling tools. Founded in 2016 by experts from across the highest tiers of the US military and intelligence communities – and built by prominent leaders and innovators from the insurance, technology, and cybersecurity industries – Resilience is rewriting the rules of how cyber risk is assessed, measured, and managed.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, cyber threat intel, vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, the SOC Analyst assists in identifying, analyzing and influencing the management of security risks across the organization based on observed events, logs and collected threat intelligence.
ExpandApply NowActive JobUpdated Today
threat intelligence jobs Title: intelligence Company: Cyber Crime in Sanford, Maine
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.