- UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to ramp up on a range of topics quickly, including emerging technologies, cyber threat intelligence, supply chain risk, foreign policy, financial systems, financial crime, market analysis, best practices analysis, and change management.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A successful candidate will have a current TS/SCI with Polygraph and a strong understanding of Foreign Threat Systems; Scientific and Technical Intelligence; Foreign Material Exploitation; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology and Operations; Non Kinetic Defeat; DoD and IC Space; Electronic Warfare; and System Resiliency.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Capital Area Division (CAD) of Applied Research Associates, Inc. (ARA) has an outstanding opportunity for a CWMD Plans and Exercise Specialist who is an accomplished Intelligence Specialist with experience integrating global WMD and CBRN-related threat information into substantive CWMD planning and exercise efforts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
More than three years of experience providing counter-threat operations-intelligence support and/or asymmetric threat analysis. + More than one year of C-UAS and/or Force Protection Operations-Intelligence analytic experience (tactical and/or operational levels) with DoD, US and/or interagency partners in the past five years (Department of Defense, Department of Homeland Security or Federal law enforcement agencies preferred but not required.
$85,800 - $180,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We define, architect, design and prototype creative ways to integrate and fuse all-source intelligence and new sources of data to empower analysts and inform the programmatic and technical direction of new and existing programs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leidos, Inc. is seeking a Lead Staff Operations Officer to support a financial intelligence mission in Northern VA. This position requires candidates to possess a current and active security clearance with appropriate polygraph to be considered.
$108,550 - $196,225 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Anduril Intelligence Systems (AIS) is focused on positioning Anduril as a lead provider of specialized engineering and products for Intelligence Community (IC) customers. Family Planning & Parenting Support: Fertility (eg, IVF, preservation), adoption, and gestational carrier coverage with additional benefits and resources to provide support from planning to parenting.
$168,000 - $342,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of threat intelligence, vulnerability management, and security incident response best practices. Relevant certifications such as GIAC Certified Incident Handler (GCIH) or Certified Incident Response Handler (GCFA) are preferred.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with MS Azure Active Directory, Office 365 Suite Admin, Multifactor Authentication, Google G-Suite, Windows Server, DNS, VPN Connections, Ticketing Systems, Antivirus Software, Advanced Threat Management Tools, Privileged Access Management, Mobile Device Management, Apple Business Manager.
$60,000 - $75,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our mission oriented team is responsible for the design, testing, deployment, maintenance, operation, and evolution of the systems directly supporting the insider threat detection program of a large government customer in the United States Intelligence Community (USIC.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working with various intelligence disciplines, including GEOINT, HUMINT, MASINT, OSINT, and SIGINT and a comprehension of the data and tools associated with these disciplines. Working with various intelligence disciplines, including GEOINT, HUMINT, MASINT, OSINT, and SIGINT and a comprehension of the data and tools associated with these disciplines.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with security monitoring tools (e.g., SIEM, IDS/IPS), threat intelligence platforms, and malware analysis tools. Conduct advanced analysis of security events and alerts, utilizing threat intelligence and industry best practices to uncover sophisticated threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking to fill a Senior Cloud Information System Security Officer (ISSO)role for one of our newest clients, a cyber intelligence-driven firm primarily focused on assisting the Federal Civilian, DoD, and U.S. Intelligence Communities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Much of our work contributes to innovative research in the fields of sensor science, signal processing, data fusion, artificial intelligence (AI), machine learning (ML), and augmented reality (AR.
ExpandApply NowActive JobUpdated Today
threat intelligence jobs Title: intelligence Company: Cyber Crime in Reston, VA
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.