- UpvoteDownvoteShare Job
- Suggest Revision
Mature the existing Splunk instances to support robust incident detection and insider threat programs. Implementation of technology that supports network defense, vulnerability management, and incident response based on our client's unique mission needs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Senior Manager of GSOC & Crisis Management, you’ll supervise a security operations center team that leverages specialized training in GEICO asset protection systems and threat/intelligence monitoring tools to mitigate against threats to the firm and inform internal stakeholders.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Threat Hunter will serve as a hands-on-keyboard team member of the Incident Response/Hunt team that will perform Incident Response and Threat Hunting activities on the TikTok enterprise network to include emergency response to cyber incidents as well as continuous and targeted threat hunting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients' crisis management, threat assessment, and physical security requirements. Our core offerings are Risk Intelligence, Resilience Advisory, Crisis Preparedness and Response, and Cyber Security Risk Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
MELE's services include national security, intelligence, law enforcement and emergency response training, IT/cybersecurity, facility management and engineering, CBRNE defense and nuclear security, and mission and program support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Integrate threat intelligence into daily hunting activities for early identification of emerging threats and into incident response processes to enhance detection and response capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes analytics, intelligence platforms such as our security information and event management (SIEM), security orchestration, automation, and response (SOAR), threat intelligence platform (TIP), and operational support of deployed cybersecurity products and services.
$128,900 - $195,400 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our teams integrate the disciplines of strategic communications, investment banking, management consulting, corporate governance, risk, and government affairs to solve the most complex business and reputational challenges.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Apply traditional incident response and threat hunting tradecraft to industrial control system/critical infrastructure environments-with a deep understanding of the nuance and constraints of industrial environments.
$66,000 - $106,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GIAC Certified Incident Handler (GCIH), GIAC Enterprise Incident Response (GEIR), or MITRE Threat Hunting Certifications. As a seasoned Cybersecurity and Risk Management Practitioner and Leader, you will collaborate with respected experts across our Cyber Strategy, Cyber Technology, and Incident Response Solution Groups to lead engagement teams to deliver tailored solutions to our clients.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, the candidate will be responsible for ISN/CTR’s civil nuclear security programming efforts, which focus currently on the Asia/Pacific region, Africa, Eastern Europe, Central Asia, Latin America, and the Middle East. CTR’s programmatic efforts evolve in response to the international security environment and seek to reinforce U.S. national security objectives in a dynamic environment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relay cyber threat information to the Security Operations Center and Vulnerability Management Team to help prevent the exploitation of threats in the future. Conduct Cyber Open-Source Intelligence (C-OSINT) AND Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the general supervision of the Chief Information Security Officer, this role willdevelop, mature, and drive application security initiativesat IMF including the design, implementation, and management of a comprehensive program to embed security into the software development lifecycle.
Full-timeExpandApply NowActive JobUpdated Today
mature threat management response jobs in Arlington, VA
FEATURED BLOG POSTS
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.