- UpvoteDownvoteShare Job
- Suggest Revision
Skills: Vulnerability, Threat Management, Endpoint, Rapid7, Nessus, Tripwire, Qualys, SIEM, QRadar / QROC, IBM Guradium, Symantec DLP. Being a member of the Cybersecurity Eng. & Ops Team, the Lead IT Security Engineer will be a subject matter expert (SME) for Vulnerability and Threat Management capabilities.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform digital forensics, malware analysis, and threat intelligence analysis as needed. Sony Corporation of America is seeking a Senior Engineer Detection & Response to fill a critical hybrid role encompassing security monitoring, detection engineering, incident response, digital forensics, and threat hunting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an expert in Microsoft Sentinel (SIEM), the engineer will optimize analytical rules and notebooks, and use Jupyter notebooks for threat hunting and remediation actions. Use Jupyter notebook for threat hunting and taking remediation actions through custom logic apps.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Utilize Threat Intelligence and Threat Models to create threat hypotheses. Previous experience in a federal government threat hunt team, especially DHS or DOD. Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A successful candidate will have a current TS/SCI with Polygraph and a strong understanding of Foreign Threat Systems; Scientific and Technical Intelligence; Foreign Material Exploitation; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology and Operations; Non Kinetic Defeat; DoD and IC Space; Electronic Warfare; and System Resiliency.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking a product owner to help deliver game-changing cybersecurity solutions based on threat, data, and design thinking. You seek to create enduring value by delivering reusable, extensible and resilient cybersecurity capabilities to address the evolving threat landscape.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our mission oriented team is responsible for the design, testing, deployment, maintenance, operation, and evolution of the systems directly supporting the insider threat detection program of a large government customer in the United States Intelligence Community (USIC.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Required skills:In-depth understanding of Cyware or Cyber threat Intelligence (CTI) capabilities for security data ingestion, storage, analysis, and visualization is vital. Possess an in-depth understanding of Cyware security data capabilities and Cyber Threat Intelligence (CTI) Feed Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Azure Monitoring and Logging: Information Protection (AIP), Advance Threat Protection, Security Center (ASC), Information Protection (AIP), Key Vault, Active Directory, Role Based Access Control (RBAC), Resource Manager (ARM), Resource Graph (ARG), Active Directory B2C, Key Vault, App Service, Service Trust Portal.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applies interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior (including insider threat), risk assessment, and network security to business and operational challenges, including technical IT and operational technology (OT) systems and processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, the selected individual will provide network analysis support as part of an integrated agile team that will be responsible for using, developing, maintaining, and enhancing models, tools and software for Intelligence Analysis-Counter-terrorism-Network Analysis, Predictive Modeling, Threat Research Support, Visualization and Query Support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging Unique Data Holdings - Harness the full weight of the company's unique data holdings, including product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings - Utilize these resources to collect malware samples of interest and produce valuable insights that enhance the effectiveness and differentiation of our threat intelligence capabilities.
Full-timeExpandApply NowActive JobUpdated Today
threat job Title: intelligence Company: Cyber Crime in Reston, VA
FEATURED BLOG POSTS
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.