- UpvoteDownvoteShare Job
- Suggest Revision
Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures TTPs data objects, campaign analysis, and threat patterns. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Threat Intelligence Analyst to join our team in the DMV area.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a threat intelligence analyst who is passionate about securing the desktop computing environment, loves macOS, and is committed to driving security investigations and improvements in macOS.At Apple, our mission involves securing and protecting over a billion endpoints; operationalizing threat intelligence into security engineering decisions affecting every layer of the stack; and touching the lives of everyone who interacts with our products.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a C-UAS All Source Analyst, you will conduct data analysis of specialized C-UAS threat systems data to assist with Department of Defense (DoD) Force Protection (FP) efforts to understand, minimize and mitigate the threat posed by Unmanned Aerial Systems (UAS) against critical infrastructure, locations, assets and personnel.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging Unique Data Holdings - Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings - Utilize these resources to collect malware samples of interest and produce valuable insights that enhance the effectiveness and differentiation of our threat intelligence capabilities.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This includes analytics, intelligence platforms such as our security information and event management (SIEM), security orchestration, automation, and response (SOAR), threat intelligence platform (TIP), and operational support of deployed cybersecurity products and services.
$128,900 - $195,400 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will: Support the Threat Analysis (TA) Program Team. Perform consolidated and comprehensive information and intelligence analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks.
$86,000 - $138,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Threat Intelligence Analyst - Clearance Required. Collect and process open-source, classified, and internal threat intelligence artifacts to provide context and informed recommendations for the larger security team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We provide innovative and comprehensive services and solutions that span cloud; systems integration and application management; security; intelligent platform services; infrastructure services; software engineering services; data and artificial intelligence; and global delivery through our Advanced Technology Centers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Intelligence Analyst - Current Intel, you will provide embedded and reach back support to Counter Weapons of Mass Destruction (CWMD) and Improvised Threat efforts and operations executed by the Defense Threat Reduction Agency (DTRA), committed warfighting units and partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Analyst performs tactical level threat intelligence functions to include collection of intelligence information and tracking physical threat activities which directly or indirectly affect employees, facilities and interests globally.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience supporting reverse engineering, threat analysis, and vulnerability/survivability assessments of WMD-related facilities, processes, and infrastructure (to include underground facilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The mission of this MSS team is to collect, curate and operationalize cyber threat intelligence (CTI) for internal security operations services teams. A Cyber Threat Intelligence Analyst is a member of the TDR SpiderLabs Applied Intelligence (SLAI) team within Trustwave Managed Security Services (MSS.
$150ExpandApply NowActive JobUpdated Today
infrastructure data software threat intelligence jobs Title: security clearance Company: Clearancejobs in Mclean, VA
FEATURED BLOG POSTS
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.