- DCS Corp (Columbus, OH)
- …on personal issues, especially those that might affect their clearance. Monitor phishing emails daily; coordinate appropriate response to senders; report as needed ... through proper channels. Investigate, prepare, and submit Security Violations Reports in accordance with corporate and DCSA policy. Prepare for DCSA (Defense Counterintelligence and Security Agency) periodic reviews. Some short term travel may be required.… more
- Creative Financial Staffing (Columbus, OH)
- …annual access recertification projects to maintain data access integrity. Support phishing campaigns and security training. Identify and address security risks. Work ... with application development and infrastructure teams to enhance system security. Maintain comprehensive user administration and technical documentation. Develop and implement security auditing tools and scripts. Audit network security controls to identify and… more
- Paycom Payroll Llc (Oklahoma City, OK)
- …client sales management services, providing security awareness training, maintaining the phishing awareness program, and developing and maintaining IT policies and ... ongoing processes involving vulnerability scanning, reporting, and risk assessmentDeploy phishing awareness training and simulations enterprise-wide and report metricsReporting… more
- Creative Financial Staffing (Madison, WI)
- …actors Work with the business to devise security training including simulated phishing attacks Incident response - ensuring timely response and mitigation Monitor ... the network, and end points for potential risks and unusual activity PREFERRED EXPERIENCE FOR THE SECURITY ANALYST Experience with threat management, mitigation, and hunting Previous experience implementing security tools is a plus Experience working with a… more
- Patterson Companies, Inc. (St. Paul, MN)
- …aimed at creating and delivering a comprehensive security awareness and phishing program to help educate employees and protect Patterson Companies against ... involves leading the strategy and developing security awareness content, managing phishing awareness exercises and platforms, collaborating across business units to… more
- JPMorgan Chase (Columbus, OH)
- …various business functions. **Job responsibilities:** + Help deliver world class Phishing and malware protection solutions for enterprise mailing systems + Execute ... in cyber security, infrastructure engineering, especially malware protection and phishing domains + Excellent understanding of platform engineering and integration… more
- JPMorgan Chase (Columbus, OH)
- …different business functions. **Job responsibilities:** + Help deliver world class Phishing and malware protection solutions for enterprise mailing systems + Execute ... experience and expertise in cyber security, especially malware protection and phishing domains + Strong expertise in infrastructure engineering + Excellent… more
- Splunk (VA)
- …to accelerate and improve their analysis activities while keeping their companies safe from phishing and malware attacks. **Meet the Team** The SAA team is a small ... remote team + Experience in the security industry, ideally with malware and phishing + Excellent verbal and written communication skills + The ability to forge… more
- Paycom Online (Oklahoma City, OK)
- …client sales management services, providing security awareness training, maintaining the phishing awareness program, and developing and maintaining IT policies and ... processes involving vulnerability scanning, reporting, and risk assessment + Deploy phishing awareness training and simulations enterprise-wide and report metrics +… more
- Liberty Utilities (Columbus, OH)
- …and IT engagements + Review, document, evaluate, and support response to reported phishing emails. + Develop and compile reports on security incidents ( phishing , ... viruses, breaches, etc.) + Respond to and research innovation request technologies submitted by the business. Triage and provide recommendations to IT Security Risk and Compliance leads. **Education and Experience** + University - Bachelor degree or equivalent… more
- Hantz Group (Southfield, MI)
- …of critical security infrastructure, including firewalls, IDS/IPS, endpoint protection, anti- phishing tools, and vulnerability management platforms. + Assist with ... development, coordination, and deployment of staff security training, including anti- phishing and social engineering awareness. Preferred Skills: + Working knowledge… more
- Techtronic Industries North America, Inc. (Menomonee Falls, WI)
- …the Information Security tool and cloud suites including firewall rules, phishing controls, event configuration and policies. **You'll be DISRUPTIVE through these ... of the following areas: cloud security controls, networking, firewalls, phishing /malware tools, application administration, scripting, security analysis, threat detection,… more
- BlueVoyant (MD)
- …+ Attack Surface Management: Vulnerability Management, Patch Management, Penetration Testing, Phishing Testing + Cloud Security Posture Management: M365 and Azure ... fill gaps/vulnerabilities + ASM-related skills: Patch/Vulnerability Management tool expertise; Phishing and PenTesting tooling expertise and follow-on advisement with… more
- Linchpin Solutions, Inc. (New Orleans, LA)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
- Linchpin Solutions, Inc. (New Orleans, LA)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
- Linchpin Solutions, Inc. (Columbia, MD)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
- Fusion Technology LLC (Washington, DC)
- …include Social Engineering (including but not limited to the ability to perform Phishing and Spear Phishing ); these services should be performed following a ... documented and standardized methodology. The goals and objectives for each exercise will be determined by the S&T CISO. * Performing static code reviews as required, based on a given system's status within the security assessment and authorization cycle,… more
- City of New York (New York, NY)
- …related to the OTI Cyber Security Operations Center (SOC) Credential Leak, Phishing , Suspicious Activity Detected, and User(s) Clicked Phishing Link. Direct ... FIT AD Operations to reset passwords and instruct FIT Field Desktop Technicians to scan infected workstations. - Team lead designing policy per IRS Safeguard Computer Security Evaluation Matrix (SCSEM) and identify vulnerabilities. Track risks and escalate new… more
- Fusion Technology LLC (Washington, DC)
- …include Social Engineering (including but not limited to the ability to perform Phishing and Spear Phishing ); these services should be performed following a ... documented and standardized methodology. + Organize and facilitate activities that will clearly identify and document system vulnerabilities as well as help design and communicate effective improvement strategies. + Stay current on enterprise related attacking… more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
Related Job Searches:
Sr Threat Researcher Phishing