- UpvoteDownvoteShare Job
- Suggest Revision
This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The role involves protecting cybersecurity assets and delivering cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessment services.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., Open Worldwide Application Security Project (OWASP) Top Ten, National Institute of Standards and Technology (NIST) Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with secure coding, AppSec, threat modeling, code testing, third party cybersecurity controls/testing, threat/risk assessment, vulnerabilities/weaknesses, and penetration testing (for Security Engineers.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure as Code (Terraform, Pulumi, Ansible, etc), Software Defined Networks & Network Security domain knowledge including VNFs, CNFs, CNIs (Cilium, OVH, Calico, etc), SASE, Micro and Macro Segmentation/Zero Trust; and other infrastructure technologies (e.g., hardware, databases, storage, identity, cloud infrastructure.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of the insider threat landscape, investigation and risk assessment methodologies, chain of custody requirements, and data protection regulations. Risk Assessment: Conduct thorough assessments of potential insider threats, including monitoring employee behavior, access patterns, and data handling.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of key cybersecurity principles and control implementations that mitigate common threat actor techniques (Email, Network, Endpoint, Resiliency & Recovery (incl. Engage with peers and industry groups that share threat intelligence analytics.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Focuses on container security assessments, threat analysis, policy development, and incident response within application security. Experience with security assessment tools and techniques for containers, such as AWS Inspector, SysDig, Clair, Trivy, or Aqua Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Allied Universal® Risk Advisory and Consulting Services, North America’s leading specialized risk and threat assessment, prevention, intelligence, and investigative practices provides rewarding careers that give you a sense of purpose.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of Reliability Engineering, testing automation, one or more programming languages (e.g., Python, Java, etc.) Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
ExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in threat modeling and risk assessment and mitigation of generative AI, particularly Google Vertex AI. Knowledge and understanding of AI/Client threat landscape. Security and cloud certifications, such as CISSP, CCSP and Azure, AWS, GCP cloud certifications.
Full-timeExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure as Code (Terraform, Pulumi, Ansible, etc), Software Defined Networks & Network Security domain knowledge including VNFs, CNFs, CNIs (Cilium, OVH, Calico, etc), SASE, Micro and Macro Segmentation/Zero Trust; and other infrastructure technologies (e.g., hardware, databases, storage.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of risk management, threat assessment and risk treatment actions is critical. This includes providing direction and procedures to work groups to ensure that all departments can be certified in various Information Security, Cyber Security, and Data Privacy compliance certifications.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with CONOPS, Campaign Modeling, Battle Space Command & Control, Threat Assessment & Modeling. You will be responsible for leading a team of 8-15 Engineers focused on the development and integration of variable-fidelity computer models and simulations that effectively capture system and system of systems effects in complex threat environments.
ExpandUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience with CI/CD processes & technologies Demonstrated performance of threat modeling, risk assessment techniques, and code reviews Experience working with DB solutions such as DynamoDB, MongoDB, Document DB, etc.
ExpandUpdated 8 days ago
threat assessment jobs in Plano, TX
FEATURED BLOG POSTS
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: