- UpvoteDownvoteShare Job
- Suggest Revision
Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor cyber threat activity, intelligence feeds, and open-source intelligence continuously. Apply cybersecurity best practices and frameworks (NIST, MITRE ATT&CK, ODNI Cyber Threat Framework, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop consultative OT security solutions which include services such as attack emulation, penetration testing, threat hunting, and deception operations. You will design cybersecurity offerings to be consistent with NIST, NERC CIP and other contemporary cybersecurity standards in ICS environments.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SANS GIAC Cyber Threat Intelligence (GCTI) Perform hands-on activities including network, disk and memory forensics, log analysis, malware analysis and threat hunting. The team will be able to, collectively cover, the breadth and depth of: monitoring for Indicators of Compromise, being up to date with the latest third-party Threat Intelligence, responding to identified incidents including attack remediation, evidence collection and forensics.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As the domain expert for cybersecurity, you will provide leadership oversight and guide the team throughout new product's development phases, review of product security requirements and recommendations of security design solutions, complete quality documentation, threat modelling, penetration testing, software architecture review and design recommendations, code analysis and other security testing work as needed.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience in a technical role in the areas of Security Operations, Detection Engineering, Threat Intelligence, Penetration Testing, Red Teaming, Purple Teaming, Threat Hunting or Incident Response.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Specific responsibilities include supporting R&D throughout a new products development phases, review product security requirements and recommend security design solutions, help complete Quality documentation, threat modelling, penetration testing, software architecture review and design recommendations, code analysis and other security testing or work as needed.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Data Protection Reporting & Analytics; Insider Threat Integration: Skills in generating reports and analytics on data protection activities are valued. The consultant should ideally be able to integrate these insights into an organization's broader security measures, such as monitoring for insider threats.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role works closely with EIP's Threat Management and Response teams as well as other enterprise information security teams. Strong understanding of the threat landscape in terms of the tools, tactics and techniques of threats and a strong understanding of how complex, multi-stage malware functions.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of system and network security technologies and related concepts, e.g. boundary protection, network segmentation, endpoint security, threat hunting. Understanding in application security, identity and access management (e.g. SSO, OAuth, SAML, MFA), cryptography.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidates should have strong IT/OT skills with a deep understanding of networking, systems, and cyber hacker methodology to assure threat-informed security mitigations. Minimum of 5 years of working knowledge in a regulatory environment for utility companies including North America Electric Reliability Corporation - Critical Infrastructure Protection (NERC-CIP) preferred.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidates are expected to analyze and monitor internal tools, hunt for insider threats against company data and infrastructure, and and have the ability to carry out complex internal investigations from collection to reporting.
ExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identifies and develops Security services portfolio product sales opportunities (SASE, DDoS Mitigation, Threat Intelligence, Professional Services, and other Security services as developed), provides product solutions, ensures customer satisfaction, and maintains positive ongoing relationships to maximize sales for the company.
ExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage the MITRE ATT&CK framework, monitor the threat landscape and evaluate existing data sources to identify opportunities for new EDR/SIEM content development. Implement and maintain detection capabilities across SIEM and EDR/XDR platforms (for example Splunk, Sumo Logic, QRadar, LogRhythm, Carbon Black, CrowdStrike, Tanium, etc.
RemoteExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AVANGRID’s employment practices and policies are geared to hiring a diverse workforce and sustaining an inclusive culture. At AVANGRID we provide fair and equal employment and advancement opportunities for all employees and candidates regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status, disability, protected veteran status or any other status protected by federal, state, or local law.
ExpandApply NowActive JobUpdated 15 days ago
insider threat jobs in Augusta, ME
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.