- UpvoteDownvoteShare Job
- Suggest Revision
Program support includes developing methodology and framework in support of cyber risk assessment life cycle. Program scope includes identifying cyber key terrain by analyzing operational requirements, conducting cyber analyses and assessments, and developing and performing modeling and simulation in support of different cyber threat scenarios.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Sets strategy, provide technical direction to the Application Offensive Security team to run capabilities like AppSec Red team assessment/offensive security testing, Application Threat modeling, Manual secure code review, Advance Threat hunting techniques and Container security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct red team assessments that require expertise in social engineering, application security (web and mobile), physical intrusion methods, lateral movement, threat analysis, and all other red team capabilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of experience in vulnerability management, security assessment, security awareness, and identity access management systems. Familiarity with Threat Intelligence engagement and reporting.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The PSS manages assigned Prevention of Workplace Violence (PWV) programs to include providing Threat Assessment and Management (TAM) support to the service area or site Threat Management Team (TMT.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security assessment tools and techniques, such as vulnerability scanning, penetration testing and threat modeling. Experience with security assessment tools and techniques, such as vulnerability scanning, penetration testing and threat modeling.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
IT Security Analyst - Cyber Security Threat Risk Assessment will conduct threat risk assessments on technology assets, specifically applications. IT Security Analyst - Cyber Security Threat Risk Assessment.
$60 - $65 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Serves on the Threat Assessment Team. Monitors standards of clinical service excellence to ensure increased access and supports for marginalized/under-served student population. Utilizes assessment in the evaluation of services and shares outcome data with the Division of Student Affairs and campus community.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
A strong understanding of international and domestic threat actors, including terrorist and extremist groups, cyber threat actors, and the geopolitical threat landscape is preferred.
$130,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess a strong understanding of security operations concepts such as perimeter defense, BYOD management, data loss protection, insider threat, kill-chain analysis, risk assessment and security metrics.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We’re seeking a creative, customer-centric, and collaborative Senior Product Marketing Manager to lead efforts to market our Coalition Security product and service offerings, which include SaaS cyber risk management solutions featuring attack surface monitoring, supply chain risk monitoring, threat remediation, and more, as well as managed cybersecurity services, which include MDR, EDR, and engagement-based professional services.
RemoteExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Deputy CISO will: ●Oversee and mature Cybersecurity Centers of Excellence: Network Protection, Data Protection, Endpoint Protection, SOC Monitoring, Incident Response, Threat and Vulnerability Management, Secure System Development Lifecycle, Security Engineering, Information Security Architecture, Insider Threat Management, and Security Awareness.
$255,000 - $265,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in a US Investment Bank and knowing Regulatory Cybersecurity requirements for financial services Recent experience working directly on Threat and Risk Assessments (TRA) An understanding and experience with security controls/mechanisms and threat/risk assessment techniques pertaining to complex data, application and networking environments (asset), proven through recent experience in the last + project(s.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct threat assessment and modeling as required. This incumbent will provide support to Security Architecture, Security Engineering, Security Operations, Identity & Access Management, Threat Management, Vulnerability Management and Penetration Testing functions.
ExpandApply NowActive JobUpdated 2 days ago
threat assessment jobs in New York, NY
FEATURED BLOG POSTS
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,