- UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Intelligence Analyst - Current Intel, you will provide embedded and reach back support to Counter Weapons of Mass Destruction (CWMD) and Improvised Threat efforts and operations executed by the Defense Threat Reduction Agency (DTRA), committed warfighting units and partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging Unique Data Holdings - Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings - Utilize these resources to collect malware samples of interest and produce valuable insights that enhance the effectiveness and differentiation of our threat intelligence capabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyzing segments of financial or cyber threat information for inclusion in tactical or strategic studies, such as: cyber threat intelligence, indicators of compromise, malware forensics, blockchain transactions, law enforcement information, classified intelligence, or other financial data for the production of intelligence reports, investigative memoranda, evidentiary packages, and other written materials; AND.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and CSOC. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
All of the duties listed support one or more of the following cybersecurity related functions; information security, SA&A, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as a leader and SME in relation to identity resolution review and intelligence coordination of national security threat actor encounters. Focus on identity resolution review and intelligence coordination of national security threat actors encounters both internally at the TSC and externally with multi-agency partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Skills and Qualifications:Experience in Open-Source Intelligence Research (OSINT). Overview: IntelliBridge is an award-winning national security company with an immediate opening for an experienced analyst to support a federal law enforcement client’s Counterterrorism Threat to Life (TTL) unit.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
More than three years of experience providing C-IED intelligence support and/or asymmetric threat analysis. Plan, develop, and deliver tailored intelligence capabilities and tools training to supported intelligence consumers and partners to enhance the organization’s ability to effectively mitigate improvised threat.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Developed/Created Intel Alerts, reports, or threat bulletins which have been distributed in support of CBP operations/ Experience in the development and implementation of operational and tactical intelligence initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition to routine physical security and life safety tasks such as foot patrols, evacuations, and ID checks, the GSOC Operator will monitor multiple computer screens and implement a variety of tools ranging from access control and alarm monitoring systems to business intelligence sources, open-source media, and other in-house security tools.
$26 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos, Inc. is seeking a Lead Staff Operations Officer to support a financial intelligence mission in Northern VA. This position requires candidates to possess a current and active security clearance with appropriate polygraph to be considered.
$108,550 - $196,225 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as lead cyber security content SME for collaboration with various teams for purposes including, but not limited to threat intelligence, hunt operations, red team engagements, identity management, security architecture review, security event logging issues, and detection content management for identifying gaps and enhancing NFCU cyber security monitoring posture.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience in insider threat detection, fraud detection, or anti-abuse engineering is preferred. - Write documentation about CDAO's strategic approach to insider threat defense and how it fits within the broader DoD insider threat ecosystem.
$78,200Full-timeExpandApply NowActive JobUpdated Today
threat intelligence jobs Title: intelligence Company: Cyber Crime in Great Falls, VA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: