- UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Currently, ManTech is seeking a motivated, career and customer-oriented Threat Intelligence Analyst to join our team in the DMV area.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Open-Source Intelligence (C-OSINT) AND Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients. Develop regular threat intelligence briefs based on general threat actor concerns across the agency, business units, and those specific to our client and deliver briefs to senior executives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Produce actionable cyber intelligence following the Cybersecurity Threat Intelligence Lifecycle framework. Cyber Threat Intelligence Analyst - Clearance Required. Support process improvement of the cyber threat intelligence program to meet the growing needs of the client-s dynamic mission.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Will provide OSINT, unclassified and classified LEI, CUI and classified Criminal/Police/Law Enforcement Intelligence or military intelligence research on multiple computer networks for threat personas, networks, and groups both CONUS and OCONUS.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Integrate threat intelligence into daily hunting activities for early identification of emerging threats and into incident response processes to enhance detection and response capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As the Splunk Analyst Lead of the Advanced Analysis, Research, and Insider Threat Management Support Team, you will manage a team of Threat Intelligence Analysts, a Log Analyst, a Data Scientist, and a Splunk Analyst.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform digital forensics, malware analysis, and threat intelligence analysis as needed. Sony Corporation of America is seeking a Senior Engineer Detection & Response to fill a critical hybrid role encompassing security monitoring, detection engineering, incident response, digital forensics, and threat hunting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintain integration of threat intelligence sources with the Security Incident & Event Management Tool. The Cyber Threat Intelligence Lead works with the cyber defense team to make accurate, risk-based decisions on where to focus security efforts that will protect our employees, operations, and revenue streams to yield the highest ROI from expended security resources.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Utilize malware threat intelligence to develop new & updated attack methods for use in LPT activities. Lead penetration testing activities, develop new attack strategies, and provide intelligence to customer security teams for the reduction of cyber-attack risks.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
A successful candidate will have a current TS/SCI with Polygraph and a strong understanding of Foreign Threat Systems; Scientific and Technical Intelligence; Foreign Material Exploitation; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology and Operations; Non Kinetic Defeat; DoD and IC Space; Electronic Warfare; and System Resiliency.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The mission of this MSS team is to collect, curate and operationalize cyber threat intelligence (CTI) for internal security operations services teams. Minimum of 2-years’ experience producing threat intelligence, tracking cyber threats, incident response and/or threat hunting with a focus on attacker TTPs and attribution.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience within the Threat and Cyber domain and tradecraft approaches across multiple intelligence disciplines. Current familiarity with Huntsville, Al. business community and the major tenant organizations on the Redstone Arsenal including ARMY Threat Systems Management Officer (TSMO) Army Space and Missile Defense Command (SMDC), Missile Defense Agency (MDA,) Army Rapid Capabilities and Critical Technologies Office (RCCTO), Space Development Agency and the FBI.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Threat Emulation and Hardware in the loop (HWIL) development. This is an outstanding opportunity to lead Growth efforts for the Threat and Cyber Division that includes ownership of business development and strategy while working with other Growth functions such as Government Affairs and Marketing/Communications.
$150Full-timeExpandApply NowActive JobUpdated Today
threat intelligence jobs Company: Cyber Crime in Mclean, VA
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.