- UpvoteDownvoteShare Job
- Suggest Revision
Must hold a BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 5 years of experience assessing instructional delivery of cyber training to personnel whose duties include cyber network defense, computer forensics and/or cyber threat emulation/detection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to utilize MITRE ATT&CK framework, Cyber Threat Intelligence, and Cyber Security Awareness concepts to influence work. Identify, recommend, and build controls & signatures in response to new or observed cyber threats in support of internal Incident Response/Cyber Threat Intel teams.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A Security Flex Officer acts as a visible deterrent to crime and client rule infractions and detect and report suspicious, unsafe or criminal acts at or near their assigned posts, which may be a threat to the property, clients, guests or employees at the site.
$17 an hourFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor s degree and 3+ years of experience in modeling, cybersecurity, anomaly detection, SOC detection, threat analytics, security incident and event management ( SIEM ) , IT, and operations incident response, or 6+ years of experience in modeling, cybersecurity, anomaly detection, SOC detection, threat analytics, SIEM, IT, and operations incident response in lieu of a degree.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working on a DCSA compliant Insider Threat programs. Peterson Technologies is seeking an experienced Facility Security Officer (FSO/CSSO) who will be responsible for ensuring Peterson and all cleared employees are compliant with the intelligence community's protocols.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies. GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs∯*∯ In this role, you will provide support with incident handling, triage of events, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience in endpoint security, including EDR, threat intelligence, and incident response, with at least 5 years in a leadership role. Strong technical expertise in endpoint security, including proficiency in EDR tools and technologies such as Carbon Black, SentinelOne, or CrowdStrike.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At ManTech International Corporation, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement. Perform instructional delivery assessmentsCollaborate with the government, cyber forensic, cyber counterintelligence and international relations Subject Matter Experts (SMEs), mission stakeholders, external customers, and the curriculum manager in the development of training requirements, iterative assessment requirements of evolving customer needs and communicating quality issues (spelling, grammar, alignment to job sheets, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Huntress stops hidden threats that sneak past preventive security tools by utilizing our award-winning security platform and expert human threat hunters through dynamic products, including Managed EDR, MDR for Microsoft 365, and Managed Security Awareness Training.
$150,000 - $180,000ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with Information Security team and support other stakeholders in threat hunting and other activities. Provide regular status updates and briefings to Information Security management and outside stakeholders.
$62 - $67 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security, Case Management, Enterprise Architecture, Cloud, Agile Development, Data Warehouse, Data Architecture, Personnel Security, Industrial Security, CounterIntelligence, Continuous Vetting, Integrated Risk Management, Insider Threat Defense, and Investigations Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Your primary responsibilities will include reviewing and analyzing alerts and logs from firewalls (FW), endpoint protection tools (e.g., antivirus, DLP), SIEM, and other security threat data sources to gain awareness and report on potentially suspicious and anomalous activity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep domain expertise in at least two of the following: intrusion detection and security monitoring, incident response, threat intelligence and analysis, and enterprise and corporate security.
ExpandApply NowActive JobUpdated Yesterday
threat job Title: application security Company: Mitek Industries in Gwynn Oak, MD
FEATURED BLOG POSTS
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.