- UpvoteDownvoteShare Job
- Suggest Revision
You have passion and expertise in one or more of the following areas: risk analytics, data analytics, machine learning, SQL, Python, cloud security, network security, vulnerability management, data protection, threat intelligence & investigations, and identity & access management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a direct report to the Chief Information Security Officer (CISO), the Vice President of Threat Management and Response (TMR) will oversee the programs that gather Threat Intel, perform penetration testing, manage vulnerabilities, monitor & respond to events & incidents, and manage insider threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
Starting at $250ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Insider Threat Analyst. Review the alerts and supporting information escalated by the Tier 2 analysts, complete the Insider Threat analysis, and provide a final Insider Threat recommendation to the Site Project Lead for further action.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience using SIEM, SOAR, and EDR tools, to include building detections, alerts, reports, dashboards, tools, and automations, as well as tuning existing features and implementing threat intelligence into platform threat intel management features.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Title: Senior Insider Threat Analyst. Experience with Cyber, Insider Threat and Policy Violation, and eDiscovery investigations. The Senior Insider Threat Specialist will conduct advanced security event analytics, insider threat monitoring, log analysis, host-based forensics, incident response, and case management.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
FIVE (5) or more years' experience in either Cyber Security, Law Enforcement, Intelligence, Insider Threat. Develop and improve insider threat modeling that leverages Security Information and Event Management (SIEM), User Behavior Analytics (UBA), Data Loss Prevention (DLP), User Activity Monitoring (UAM), and automated solutions in place.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and CSOC. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
$165,100 a yearExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead red-blue team and purple team testing, to continue to inform and improve the threat management controls. Lead and mature the insider threat program, working closely with Legal, Compliance, Human Resources and other stakeholders.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Open Source Intelligence (C-OSINT) and Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients. Lead the CTI analyst on the team in the development of regular threat intelligence briefs based on general threat actor concerns across the company, business units, and those specific to our client and deliver briefs to senior executive.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience managing SIEM, UEBA, IAM, vulnerability management, data loss prevention (DLP), threat intelligence, MITRE ATT&CK framework mapping, security orchestration automation and response (SOAR), and other network and system monitoring tools.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of global regulatory standards including GDPR, CCPA and understanding of PCI DSS. Choose from Luxury Hotels, Resorts, Extended Stay Hotels, Pet-Friendly Hotels & More. Good understanding of PCI DSS.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support Threat Finance Intelligence (TFI) analysis and facilitate Intel Agencies other DoD CTF activities throughout the Customer AOR. Support law enforcement agencies in ways that also support the Intel Customer and DoD priorities.
Full-timeExpandApply NowActive JobUpdated 10 days ago
threat job Title: intelligence Company: Cyber Crime in Cabin John, MD
FEATURED BLOG POSTS
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.