- UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of experience with Insider Threat or Data Loss Prevention programs, incident management, or investigative programs and the ability to identify anomalous activities and associated risks.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong hands-on experience on various cloud services like Lambda, S3, Security, Monitoring, Governance & Compliance. Leading team in the definition of best practices & repeatable methodologies in Cloud Data Engineering, including Data Storage, ETL, Data Integration & Migration, Data Warehousing and Data Governance.
$100,000 - $120,000 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Splunk Threat Content Developer will develop, implement, and oversee content development for Threat Detection, Threat Analysis, and Threat investigations focused on Cloud Security and API Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have four (4) years of experience with: Cloud data engineering experience in at least one cloud (Azure, AWS, GCP); Integration of multi-cloud services with on-premises technologies; Version control systems like Github and deployment of CI tools; At least one MPP database technology such as Redshift or Synapse or SnowFlake.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Platforms: Knowledge of cloud infrastructure and services, preferably Azure, as it relates to Snowflake and Databricks integration. Implement and maintain data synchronization between on-premises Oracle databases and Snowflake using Kafka and CDC tools.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking a product owner to help deliver game-changing cybersecurity solutions based on threat, data, and design thinking. 2 or more professional certifications (SAFe PM/PO, CISSP, GIAC, CISM, CCSP, AWS Cloud Practitioner, AWS Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will possess extensive knowledge and hands-on experience with Palantir Foundry including its data integration, analytics and operational decision-making capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience using IaC software tools (CloudFormation, Terraform, Azure Resource Manager, GCP Cloud Deployment Manager etc) and CI/CD tools (IDEs, GitLab, GitHuB, Jenkins, CircleCI, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GEICO'S - Data Movement team of Data, Security & Infrastructure (DSI) department is seeking a highly motivated Senior Software Engineer to start or continue an IT career at GEICO on the GEICO Data Hub Telematics Project.
$76,000 - $236,500 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Overall 15+ years in data analytics consulting and at least 10+ Senior Architect role within a consulting firm with a focus on data analytics, advanced analytics, Cloud and Artificial Intelligence.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage the Company System Security Plan (SSP), Facility Clearance (FCL), and Insider Threat Program in compliance with the NISPOM. Initiate and manage personnel security clearances (PCL) Key Management Personnel and other employees requiring access to classified information.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hybrid, - days/week in officeDescription:We are looking for a Microsoft Azure cloud security engineer to join our team and help us protect our data in our cloud environment from cyber threat actors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advance security operations technologies and processes through automation and integration of threat detection, protection solutions, and IAM processes. Our technology Stack includes hybrid cloud / on-premises environments and diverse technology and security technology baselines.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Summary: The Insider Threat Program Specialist will be supporting a Department of Homeland Security, Insider Threat Program (ITP) project within the National Capital Region (NCR.
ExpandApply NowActive JobUpdated Today
hands on cloud security insider threat data integration jobs in WA, Ohio
FEATURED BLOG POSTS
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?