- UpvoteDownvoteShare Job
- Suggest Revision
Conduct analysis using serialized threat reporting, intelligence sharing, OSINT, and open-source vulnerability information to develop prioritized plans. Proficiency with analysis tools and protocols (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Arcsight, etc.
$160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS Senior SI/Cyber Analyst, you will serve as a key member of a threat analyses and strategic planning team embedded with the 389th Military Intelligence Battalion and in direct support of US Army Special Operations Command (USASOC), the Theater Special Operations Commands and other Strategic Partners across the Special Operations Forces Emerging Threat, Operations and Planning Support (SOFETOPS) enterprise.
$180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer's networks.
$97,750 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct open-source intelligence research in support of threat discovery or research. Enhance Situational Awareness (SA), Situational Understanding (SU), and identify possible relationships, trends, and adversary TTPs based on threat intelligence information.
$141,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role you will:Conduct applied research and development in one or more of the following technical cyber areas: cybersecurity, threat informed cybersecurity, weapons and space systems cybersecurity reverse engineering, software development & dev sec ops, analytic development, systems engineering, vulnerability analysis, mitigation development, system assessments, cyber threat intelligence, offensive and defensive cyber operations, AI/ML, and post-quantum implementations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience in endpoint security, including EDR, threat intelligence, and incident response, with at least 5 years in a leadership role. Strong technical expertise in endpoint security, including proficiency in EDR tools and technologies such as Carbon Black, SentinelOne, or CrowdStrike.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Senior Threat Intelligence Analyst to join our team in the DMV area.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leads security monitoring of all environments and incident response to cyber-attacks by designing comprehensive plans, managing routine exercises, partnering with threat experts and law enforcement, maintaining an effective security operations center, working with external vendors, as well as building and leveraging threat intelligence, the kill chain and analytics programs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following areas: analytic reporting, investigative analysis, threat analysis, risk analysis, intelligence, or traffic analysis. Research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Risk/Threats Integrate threat intelligence feeds into the compliance monitoring processes to anticipate and defend against emerging threats. Adjust security baselines and hardening strategies based on current threat landscapes and intelligence reports.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networksContinuously improve processes for use across multiple detection sets for more efficient operationsUtilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ZeroFox offers the only unified cybersecurity platform combining advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to protect customers from growing threats across the external attack surface.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Uses intelligence production tools and databases, to include Tripwire Analytic Capability, Intellipedia, Palantir, MIDB, Cyber Common Operating Picture (CyberCOP), Target Knowledge Base, Cyber Threat Matrix, Automated Message Handling System, WISE Information Management System, Network Knowledge Base, FoxTrail, CENTAUR, ispace, Pathfinder, and Microsoft OneNote.
Full-timeExpandApply NowActive JobUpdated Today
threat intelligence jobs in Linthicum Heights, MD
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.