- CACI International (Reston, VA)
- … capabilities. **Qualifications:** _Required:_ + Current Top Secret/Sensitive Compartmented Information Security Clearance, willingness to submit to a ... Sensitive Activities Advisor Job Category: Intelligence Time Type: Full time...Irregular Warfare threat networks capable of threatening US National Security and Integrated Deterrence objectives, via the use conventional… more
- Microsoft Corporation (Redmond, WA)
- …incident triage, control validation, and telemetry analysis. + Serve as a technical advisor and mentor to security engineers, sharing best practices for ... anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT),… more
- Cargill (Atlanta, GA)
- …experience. * Demonstrable experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems (eg, Splunk, ... will play a critical role in strengthening the organization's security posture by leading the collection, analysis, and dissemination...and enterprise risk. You will serve as a key advisor to both technical teams and leadership, transforming raw… more
- CACI International (Reston, VA)
- …address the threats. **Qualifications:** _Required:_ + Current Top Secret/Specialized Compartmented Information Security Clearance, willingness to submit to a ... * **The Opportunity:** As a CACI Sensitive Activities and Information Operations Advisor , you bring the full...and sensitive activity plans, operations, units, and friendly and adversary capabilities in direct support to the Department of… more
- General Dynamics Information Technology (San Diego, CA)
- …experience **US Citizenship Required:** Yes **Job Description:** Training Specialist Advisor - **SSDS Tactical Action Officer/Air Defense Warfare Coordinator ... instruction and performance/scenario-based shipboard laboratory training. As a Training Specialist Advisor , the candidate would serve as a Senior Instructor to train… more
- Palo Alto Networks (CA)
- …expertise and experience in investigations, data breach response, digital forensics, and information security . With a highly successful track record of ... product alignment, and market positioning + Continuously monitor the evolving security operations landscape, including adversary techniques, SOC tooling trends,… more
- BMO Financial Group (CO)
- …and Purple Team subject matter expert to business areas, project teams and information security practitioners to apply and execute appropriate use of technology ... for the planning and execution of ethical hacking and adversary emulation campaigns to identify weaknesses in security...security testing software and application of results to security analysis. + ** Information Security … more
- Leidos (Aberdeen Proving Ground, MD)
- …technologies, cryptographic modernization, and defensive cyber capabilities. + Act as principal advisor on all areas of Cybersecurity and Information Assurance + ... of innovative technology and sector expertise to customers in the national security , engineering, and the health industries. At Leidos, we deliver innovative… more
- Grant Thornton (Philadelphia, PA)
- …defend against advanced cyber threats. You will serve as a strategic advisor to executive stakeholders, guiding them through the design, implementation, and ... origination, client proposal development, and deal closure. + Advising CISOs and security leaders on threat detection, incident response, and security operations… more
- US Northern Command (Peterson AFB, CO)
- …meet customer needs. Serves as a senior analyst in the Wargaming Division and adversary subject matter expert (SME) advisor . Serves as a Wargaming Training and ... below to view Eligibilities being considered and other IMPORTANT information . Responsibilities The primary purpose of this position is:...threat to the mission of the Air Force, national security , and public safety. The selectee must sign a… more
- Leidos (Odenton, MD)
- …transition into operations. + Establish a community of interest between cyber-Watch security trainers and both industry and government CSSP requirements. + Analyze ... based on future capability needs, alternate approaches, flexible applications, and adversary modifications. + Assist in the maintenance of training databases to… more