- Fannie Mae (Reston, VA)
- …function or related business process.THE IMPACT YOU WILL MAKEThe Defense and Response - Threat Detection - Senior Manager role will offer you the flexibility to make ... responsibilities:Team Leadership and Development: Lead, mentor, and develop the insider threat team, fostering a culture of continuous improvement and professional… more
- Mindlance (Charlotte, NC)
- Job Title: Cyber Threat Analyst Job Location: 214 North Tryon, Charlotte NC Zip Code: 28202 Top 3/5 Skills: DLP, PII, PIH, Cyber and threat . Description : ... Business Initiative/Purpose: (Goal, Business Impact, Accomplishments from the work) . Lower and Maintain DLP Alerts. Bachelor Degree: (Required, Preferred or Not Required) . Required. Role Responsibilities: (what they will be doing) The following is a summary… more
- DCS Corp (Ridgecrest, CA)
- …capabilities, quantities, and geographical locations of the most current, viable threat systems available/in-use throughout the world today. Essential Job Functions: ... Identify threats, validate threat via numerous sanctioned... via numerous sanctioned Intelligence sources, and describe the threat in the Intelligence Database and/or other written format.… more
- Fidelity TalentSource LLC (Merrimack, NH)
- …customer and enterprise data and assets are protected in a constantly evolving cyber- threat landscape. As part of that mission, ECS is seeking a highly skilled ... Web applications. Hands-on software architecture and engineering experience. Application threat modeling and risk assessment experience.Proven leadership skills, demonstrated… more
- Fidelity TalentSource LLC (Durham, NC)
- …be immersed in a quick changing environment in a very rapid changing threat landscape, working with numerous security professionals. The qualified candidate must be ... This role will assist and coordinate with incident response staff, threat intelligence, vulnerability management, and perimeter security teams during response… more
- Reynolds Consumer Products Inc. (Lake Forest, IL)
- …is responsible for continuous monitoring and analyzing information security incidents, threat intelligence, vulnerabilities, and risk profiles using data and alerts ... vulnerabilities, discovered through periodic scanning.Prioritize risk mitigation based on Threat Intelligence information.Lead responses to Cyber Incidents encountered in… more
- FUJIFILM Holdings America Corporation (Atlanta, GA)
- …and Privacy and be responsible for: conducting inventory tool-based threat hunting activities to proactively identify vulnerabilities in company applications, ... responsibilitiesAnalyze and monitor IT Systems and applications for vulnerabilities and threat activities - this would include experience securing various computer… more
- Galapagos Federal Systems, LLC (Arlington, VA)
- …as the senior authority in Unified Asset Management (UAM) and insider threat mitigation, this role leverages extensive expertise to develop tailored solutions and ... the senior expert in Unified Asset Management (UAM) and insider threat mitigation, offering specialized knowledge and solutionsDevelop tailored recommendations and… more
- KaiHonua (Killeen, TX)
- …will perform the following:Develop and maintains knowledgebase on changing regulatory, threat , and technology landscapes to continually develop or maintain security ... detection and prevention system solutionsAnalyze IA security events, including threat model development and resulting security risk analysis of systemsReview… more
- EDI Staffing (Wilkes-Barre, PA)
- …migrations, as well as participate in related SIEM investigations and threat response events Responsibilities: Configuring and integrating cloud security controls ... all critical areas are being received for proper analysis Continuously monitor threat and vulnerability sources for potential risks to the overall safe operation… more
- DivIHN Integration Inc (Atlanta, GA)
- …improve the cybersecurity posture of Client's site and applications through threat modeling, cybersecurity design and implementation, risk assessment and process ... of emerging cybersecurity vulnerabilities discovered through product monitoring and threat intelligence. Contribute to the design of cybersecurity toolsets to… more
- DCS Corp (Ogden, UT)
- …Combat Training and Aircrew Readiness, Command and Control Systems, Advanced Radar Threat Systems, Combat Survivor Evader Locator, P5 Combat Training Systems, Black ... radar, shelter and radome systems, aircraft trainer pods, radios and communication systems, EW systems, or threat emitters depending on the specific branch needs. more
- DivIHN Integration Inc (St. Paul, MN)
- …and aligns with industry leading information security practices. Perform threat identification and mitigation activities using industry leading security controls ... and tools sets. Support the advancement of the Company s cyber threat and vulnerability management program to ensure consistent identification, analysis, response,… more
- Reynolds Consumer Products Inc. (Lake Forest, IL)
- …Reynolds Consumer Products' new stand-alone Continuous Monitoring, Vulnerability Management, Threat Intelligence and Incident Response programs. The role will have ... vulnerabilities, discovered through periodic scanning.Prioritize risk mitigation based on Threat Intelligence information.Lead responses to Cyber Incidents, encountered in… more
- Fidelity TalentSource LLC (Durham, NC)
- …Web Application Firewall (WAF), Intrusion Prevention System (IPS), Advance Threat Protection (ATP), Cloud Security and Email Security operational functions.Expertise ... in Email Security, Email and Web Advance Threat Protection, DNS, DDoS and IDS/IPS. Analyzing email, DNS and DDoS attack patterns to improve protections. Expert in… more
- DCS Corp (Ridgecrest, CA)
- …and the conduct of Cyber Survivability Risk Assessments (CSRAs) and threat vector analysis. Essential Job Functions: Assess/determine cyber threats at the ... on findings according to Standard Work Packages (SWPs) or implementation guides. Identify threat vectors and risks to the system throughout the lifecycle of the… more
- Careerbuilder-US (Pittsburgh, PA)
- …operations metrics.? Assist with Application Security operations such as threat modeling, SAST, DAST, SCA, and security vulnerability/bug management.? Assist ... Manage and evaluate security vendor relationships and technologies.?? Skills/Knowledge/Qualifications: Vulnerability/ Threat Management? Endpoint Detection Response/IDS/IPS? PCI Standards? System Hardening?… more
- DivIHN Integration Inc (Green Oaks, IL)
- …and aligns with industry leading information security practices. Perform threat identification and mitigation activities using industry leading security controls ... and tools sets. Advance the Company s cyber threat and vulnerability management program to ensure consistent identification, analysis, response, and monitoring of… more
- Fidelity TalentSource LLC (Boston, MA)
- …(incident management, life safety, investigations, workplace violence prevention, threat assessment), security technology, physical security principles and first ... that could impact the safety of the workspaceAbility to successfully monitor threat intelligence, and how the internal and external risk environments impact the… more
- DivIHN Integration Inc (St. Paul, MN)
- …and aligns with industry-leading information security practices. Perform threat identification and mitigation activities using industry-leading security controls ... and tool sets. Advance the company's cyber threat and vulnerability management program to ensure consistent identification, analysis, response, and monitoring of… more
Related Job Searches:
Cyber Security Threat,
Cyber Security Threat Analyst,
Cyber Threat Analyst,
Cyber Threat Intelligence Analyst,
Insider Threat Analyst,
Network Threat Support Specialist,
Senior Cyber Threat Analyst,
Senior Cyber Threat Intelligence,
Senior Threat Analyst,
Threat Analyst