- UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting. Knowledge of Structured Analytic TechniquesHost-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Engineer Washington D.C. / Hybrid We are seeking a Senior Security Engineer to join our team in support of a Security Operations Center that supports our client in Washington D.C. The ideal candidate will have experience working in a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC).
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize Threat Intelligence and Threat Models to create threat hypotheses. Previous experience in a federal government threat hunt team, especially DHS or DOD. Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A Principal Cyber Security Engineer for the Information Security Cyber Threat Intelligence team will provide strategic consultation and develop technical solutions to solve complex information security challenges.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
PSE works to help Google customers and peers operationalize cloud threat intelligence that results in actions and mitigations. The PSE Threat Intelligence team is focused on integrating threat intelligence into the product security lifecycle.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform threat hunting by reviewing threat intelligence feeds and analyzing system alerts using the native capabilities of the SIEM. Threat Hunting activities include: Researching threats identified by threat intelligence sources using the standard functionality of the SIEM that includes data sources such as firewall, web proxy, and Domain Name Services (DNS.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The core mission of this team is to improve detection and response for our enterprise customers through applied threat intelligence. The Manager of Threat Research will drive the normalization, correlation and integration of internal and external threat intelligence sources.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Counter Threat Network Intelligence Analyst will provide embedded and reach back support to Countering Weapons of Mass Destruction (CWMD) and Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a DTRA Counter Threat Network Intelligence Analyst with Mission Technologies, you will provide embedded and reach-back support to Countering Weapons of Mass Destruction (CWMD) and Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with key stakeholders across the enterprise to ensure threat intelligence analysis and products are mapped to prioritize company assets and risks. The individual in the role will report directly to the Sr. Manager, Physical Security Threat Assessments who is based in the United States, and function under their supervision.
$75,000 - $85,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As Director of Microsoft Threat Intelligence Center, you will be representing the company's efforts in cyber security and threat intelligence. Senior Director Threat Technical Program Manager-Threat Intelligence Programs in Microsoft Security, who is responsible for.
$158,500 - $276,600 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
More than three years of experience providing C-IED intelligence support and/or asymmetric threat analysis. Plan, develop, and deliver tailored intelligence capabilities and tools training to supported intelligence consumers and partners to enhance the organization’s ability to effectively mitigate improvised threat.
$68,900 - $124,550 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Counter UAS (C-UAS) Threat Assessment Systems Analyst supports the Partner Engagement Division, Global Integration Department (GI), Operations Integration Directorate, Defense Threat Reduction Agency (DTRA) by enabling and facilitating interagency groups, activities, and support to achieve DTRA counter Weapons of Mass Destruction (WMD) and counter improvised threat operations, activities, and investments (OAIs.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources. Perform Cyber Threat Assessment and Remediation Analysis.
Full-timeExpandApply NowActive JobUpdated 19 days ago
Title: threat Company: Scout Solutions in Ashburn, VA
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.