- UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with MS Azure Active Directory, Office 365 Suite Admin, Multifactor Authentication, Google G-Suite, Windows Server, DNS, VPN Connections, Ticketing Systems, Antivirus Software, Advanced Threat Management Tools, Privileged Access Management, Mobile Device Management, Apple Business Manager.
$60,000 - $75,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging Unique Data Holdings - Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings - Utilize these resources to collect malware samples of interest and produce valuable insights that enhance the effectiveness and differentiation of our threat intelligence capabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience implementing Enterprise Mobility and Security Suite (EM+S), Advanced Threat Protection (ATP), Azure Information Protection (AIP) and Intune. Extensive knowledge and experience with developing Cloud Security Frameworks using industry best practices such as those from the Cloud Security Alliance (CSA) and NIST (National Institute of Standards and Technology) CSF (Cyber Security Framework) and regulatory requirements such as HIPAA, HITRUST, and PCI-DSS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
More than three years of experience providing counter-threat operations-intelligence support and/or asymmetric threat analysis. As a C-UAS All Source Analyst, you will conduct data analysis of specialized C-UAS threat systems data to assist with Department of Defense (DoD) Force Protection (FP) efforts to understand, minimize and mitigate the threat posed by Unmanned Aerial Systems (UAS) against critical infrastructure, locations, assets and personnel.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated 4 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience supporting reverse engineering, threat analysis and vulnerability assessments of WMD-related facilities, processes and infrastructure (to include underground facilities). The position develops in-depth technical assessments and models of utilities for WMD facilities using multiple intelligence sources and analytical tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as lead cyber security content SME for collaboration with various teams for purposes including, but not limited to threat intelligence, hunt operations, red team engagements, identity management, security architecture review, security event logging issues, and detection content management for identifying gaps and enhancing NFCU cyber security monitoring posture.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to ramp up on a range of topics quickly, including emerging technologies, cyber threat intelligence, supply chain risk, foreign policy, financial systems, financial crime, market analysis, best practices analysis, and change management.
$49,800 - $102,000 a yearFull-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Primary Responsibilities: As a CTNA Intelligence Analyst, you will: Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience supporting reverse engineering, threat analysis, and vulnerability/survivability assessments of WMD-related facilities, processes, and infrastructure (to include underground facilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Intelligence Analyst - Current Intel, you will provide embedded and reach back support to Counter Weapons of Mass Destruction (CWMD) and Improvised Threat efforts and operations executed by the Defense Threat Reduction Agency (DTRA), committed warfighting units and partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor incident and threat reporting, and appropriately call for deployment of the appropriate response team(s) (Quick Response Force, Emergency Response Team, Explosive Ordnance Disposal, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
All of the duties listed support one or more of the following cybersecurity related functions; information security, SA&A, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.
ExpandApply NowActive JobUpdated Today
threat job Title: intelligence Company: Cyber Crime in Great Falls, VA
FEATURED BLOG POSTS
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.