- UpvoteDownvoteShare Job
- Suggest Revision
Must have an understanding of cyber-based threat techniques and procedures to compare industry related events, exposures, and incidents with open source and gathered intelligence research to determine threat capability and intent, and the potential impact of the threat on customer network architecture and operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Will work under the guidance of a Sr. AppSec Engineer and be responsible for mitigating security defects in Zayo developed applications via multiple techniques and tools, including but not limited to threat modeling, attack surface analysis, code scanning, software composition analysis, application security testing, and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Stay updated with the latest threat intelligence, attack vectors, and cybersecurity trends. Proficiency in using threat detection and hunting tools (e.g., EDR, SIEM, NTA, IDS/IPS, sandboxing.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You will be working on multi-disciplinary teams using a wide array of technologies and skills such as embedded systems, microelectronics, threat intelligence, fuzzing, binary analysis, and network operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides mental health counseling services to students; leads suicide prevention programs (, Signs of Suicide presentations for students, Sources of Strength, gatekeeper training); supports universal mental health and social-emotional learning initiatives; assists in conducting threat assessments and suicide screenings; assists with Restorative Practices conferences; and provides crisis intervention support in response to critical incidents.
$3Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with team members on security assessments, incident response, and threat intelligence. Experience with security frameworks and methodologies (MITRE ATT&CK, NIST CSF). Collaborate with team members on security assessments, incident response, and threat intelligence.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to make recommendations to the IC CISO or designee for improving TTPS for better cyber threat protection. The Swift Group is seeking an experienced Security Control Assessor (SCA) to join our team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Within three to six months of joining the contract team, the Technical Lead-Model Operations will be expected to:Lead, develop and maintain end-user focused, object-oriented, data-driven analytic applications using DevOps and Agile development principles and technologies to support CBP threat analysis and targeting.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of traditional intelligence methodology as well as Cyber Intelligence threat models. Write intelligence reports to inform leadership about trends within the threat landscape.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify patterns/outliers within data sets that match threat actor TTPs, post compromise behavior, and otherwise unusual activity, such as insider threat. Identify patterns/outliers within data sets that match threat actor TTPs, post compromise behavior, and otherwise unusual activity, such as insider threat.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Data Scientist will lead AI discovery, research, algorithmic solution design, and rapid prototyping of data science based threat detection and automated risk assessments. This is an exciting opportunity to combine Cyber Security domain knowledge with machine learning algorithms to help our customers stay safe in a rapidly evolving threat landscape that in itself is more and more driven by AI driven attacks.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Description: As a Data Analytics Engineer, you will: Evolve Extract, Transform, Load (ETL) pipelines of structured and unstructured data from a verity of disparate sources to meet the needs of an advanced Insider Threat program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manages the Security Education Training and Awareness Program: develop and implement an Insider Threat Program, conduct indoctrinations, debriefings, annual refresher training, foreign travel, cyber security and special access briefings.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Rapiscan Systems is an industry leader in detection technology, providing cargo and vehicle inspection systems and services for ports, borders, military, high-threat facilities, and checkpoints to help customers combat terrorism, drug smuggling, illegal immigration, and trade fraud.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Determine cyber threat resource requirements, availability, adequacy, and define gap between cyber threat emulation capability and the actual threat. Evaluate cyber threats to inform threat realism for evaluating operational effectiveness, suitability, and survivability of military systems.
ExpandApply NowActive JobUpdated Today
threat job Title: intelligence Company: Cyber Crime in Reston, VA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: