- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3 Required Employ threat modeling methodologies such as STRIDE, TRIKE, MITRE ATT&CK, and PASTA, to identify potential vulnerabilities, attack vectors, and threat actors specifically targeting HHSC networks, data, and users.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor cybersecurity platforms for threat intelligence and incident response. expertise with tools and concepts that include DNS security, email security, Vulnerability Scanning and Management, EDR (Endpoint Detection and Response), and IDS (Intrusion Detection.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Transportation Security Administration (TSdivision of the USA Dept. of Homeland Security) requires all employees of the Austin-Bergstrom International Airport to pass a minimum 10-year criminal background investigation and security threat assessment.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Collaborate with knowledge management teams to maintain up-to-date incident response playbooks.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with a wide range of cybersecurity solutions, including but not limited to network security, endpoint security, threat intelligence, and cloud security. Position Summary: As a Virtual Cyber Security Sales Engineer at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in Engineering, Computer Science, Mathematics or a related field with 6 years of experience in business intelligence development. We’re a recognized Elite Agency award winner and a leading property and casualty broker, benefits consultant, wealth manager, and retirement plan advisor.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage the MITRE ATT&CK framework, monitor the threat landscape and evaluate existing data sources to identify opportunities for new EDR/SIEM content development. Implement and maintain detection capabilities across SIEM and EDR/XDR platforms (for example Splunk, Sumo Logic, QRadar, LogRhythm, Carbon Black, CrowdStrike, Tanium, etc.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with CI/CD: pipeline management with GitHub, Ansible. Experience with GitOps/Terraform/Cloud Formations/GCP Deployment Manager. Extensive working knowledge of Splunk architecture and various components (indexer, forwarder, search head, deployment server), as Splunk system administrator.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AT&T is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC), including Tier 2 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Work involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
$60.05 - $70.05 an hourExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We engineer business outcomes for Fortune 500 companies and digital natives in the technology, healthcare, insurance, travel, telecom, and retail & CPG industries using technologies such as cloud, microservices, automation, IoT, and artificial intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You are passionate about emerging technologies such as artificial intelligence, blockchain, and robotics. Coworking membership at Capital Factory with garage parking space, metro pass, or rideshare credits and access to the onsite gym.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Emerging Technologies Group: Covers a wide range of work including Internet of Things (IoT) penetration testing, intelligent automation, artificial intelligence/machine learning and quantum computing.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proven track record of driving sales performance improvement and operational excellence through effective sales operations management and business intelligence initiatives. Cross-Functional Collaboration: Collaborate with cross-functional teams, including marketing, finance, and product management, to align business intelligence efforts with overall business strategies and drive cross-functional initiatives.
Full-timeExpandApply NowActive JobUpdated 16 days ago
threat intelligence jobs Title: vulnerability management Company: Dell in Austin, TX
FEATURED BLOG POSTS
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?