- UpvoteDownvoteShare Job
- Suggest Revision
Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures TTPs data objects, campaign analysis, and threat patterns. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Threat Intelligence Analyst to join our team in the DMV area.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes analytics, intelligence platforms such as our security information and event management (SIEM), security orchestration, automation, and response (SOAR), threat intelligence platform (TIP), and operational support of deployed cybersecurity products and services.
$128,900 - $195,400 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will: Support the Threat Analysis (TA) Program Team. Perform consolidated and comprehensive information and intelligence analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks.
$86,000 - $138,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a subcontractor we are providing services from: DevSecOps , software development, network administration, systems analysis, database administration, storage engineering, hardware engineering, Tier 1 – Tier 3 support in traditional data center environments (bare metal frames), cloud , and hybrid cloud.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Follow a formal design process using formal specifications, data flow diagrams, and other accepted design techniques and also shall adhere to laws, standards, and established guidelines for prototyping and delivery of software and web tools (e.g., software reuse, modifiable, efficient, reliable, understandable, fault tolerant.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
USTLD's mission is to ensure that the Threat Detection and Response organization can detect and mitigate the most critical threats to our user data, employees, and operations. U.S. Data Security ("USDS") is a subsidiary of TikTok in the U.S. This new, security-first division was created to bring heightened focus and governance to our data protection policies and content assurance protocols to keep U.S. users safe.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging Unique Data Holdings - Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings - Utilize these resources to collect malware samples of interest and produce valuable insights that enhance the effectiveness and differentiation of our threat intelligence capabilities.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Engage with internal and external customers on personnel security to ensure the assigned program / project is fully integrated; leverage current threat intelligence to enhance or modify procedures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Software Engineering, Intelligence Community, Java EE, Amazon AWS Consulting Partner, GSA Schedule, Microsoft Partner, Cross Domain Solutions, Business Automation, Business Intelligence, Artificial Intelligence & Machine Learning, Content Management, and Integrated Data Management.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience and technical proficiency with data management software; Working knowledge of threat assessment and threat management theory and practice and experience in assessment and management of cases involving potential violence.
$150Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a threat intelligence analyst who is passionate about securing the desktop computing environment, loves macOS, and is committed to driving security investigations and improvements in macOS.At Apple, our mission involves securing and protecting over a billion endpoints; operationalizing threat intelligence into security engineering decisions affecting every layer of the stack; and touching the lives of everyone who interacts with our products.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a C-UAS All Source Analyst, you will conduct data analysis of specialized C-UAS threat systems data to assist with Department of Defense (DoD) Force Protection (FP) efforts to understand, minimize and mitigate the threat posed by Unmanned Aerial Systems (UAS) against critical infrastructure, locations, assets and personnel.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an open source intelligence (OSINT) and publicly available information (PAI) analyst on our team, you'll explore new data sources, create effective queries, and combine information from disparate sources to support the military client and operational partners.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Collect and process open-source, classified, and internal threat intelligence artifacts to provide context and informed recommendations for the larger security team. You and your team will operate as the intelligence arm of the larger security organization providing actionable intelligence insights to threat hunters, incident responders, SOC analysts, and security engineers.
Full-timeExpandApply NowActive JobUpdated Today
data software threat intelligence jobs Title: security Company: Clearancejobs in Mclean, VA
FEATURED BLOG POSTS
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.