- Optiv (Boston, MA)
- The Cyber Operations Manager over Threat Detection, Response and Security Engineering is responsible for ensuring early and accurate detection, response, ... services. How you'll make an impact + Lead 24x7 Threat Detection and Response Analysts providing operational and strategic...and maintain employee morale and motivation. + Supervisory Responsibilities: Cyber Operations Manager will report… more
- Deloitte (Boston, MA)
- Cyber Google Security Operations Manager...external parties to deliver against expectations. + Familiarity with Threat Hunting and Cyber Threat ... assists clients in defending against advanced threats by transforming security operations , monitoring technology, data analytics, and threat intelligence. Helps… more
- Deloitte (Boston, MA)
- Cyber Palo Alto Networks Security Operations Manager Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in ... for this role ends on 12/31/25 The team Our Cyber Defense & Resilience offering assists clients in defending...clients in defending against advanced threats by transforming security operations , monitoring technology, data analytics, and threat … more
- Deloitte (Boston, MA)
- Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our ... clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that...role ends on 12/25/2025. Work you'll do As a Manager , you will be at the front lines with… more
- Staples (Framingham, MA)
- …a leadership role focused on incident response. + Deep understanding of cyber threat landscapes, attack vectors, malware behaviors, and forensic methodologies. ... customer-centric technology services We are seeking a decisive and highly experienced Cyber Security Incident Response Manager to lead the strategy, execution,… more
- The MITRE Corporation (Bedford, MA)
- …packages, and Security Controls Traceability Matrix (SCTM). Roles & Responsibilities: The Senior Cyber Risk Manager provides support for a system or enclave's ... that may cause ongoing and immediate impact to the environment. + Perform cyber defense trend analysis and reporting. + Perform event correlation using information… more
- Proficio, Inc. (Boston, MA)
- …video tour (https://youtu.be/s6zP\_TFwTt4) of our global network of 24/7 Security Operations Centers (SOCs). Proficio(R) has been highlighted in Gartner's Market ... only company in our space with a patent for cyber risk scoring and security posture gap analysis. Our...resources to address the challenges of a rapidly changing threat landscape. The difficulty of hiring and retaining cybersecurity… more
- RTX Corporation (Andover, MA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... (I4.0) team is seeking an experienced and results-oriented Sr. Manager , I4.0 Project Management Excellence with a proven track...a proven track record of delivering complex digital & cyber -physical solutions on time, within budget, and to the… more
- The Brattle Group (Boston, MA)
- …Incident Response Specialist** to join our **Boston, MA** office. The Cyber Security Incident Response Specialist (IRS) is responsible for identifying, containing, ... incidents that impact the firm's infrastructure, systems, or data. Reporting to the Manager of Cybersecurity., the IRS plays a key role in defending the enterprise… more
- GovCIO (Boston, MA)
- **Overview** The Department of Veterans Affairs Network Operations Center (NOC) defends, manages, and monitors the network operating status and cyber security ... posture of the VA by providing the day-to-day management, monitoring, operations , and configuration of the Trusted Internet Connection (TIC) Gateways, the delivery… more
- Highmark Health (Boston, MA)
- …sound security practices, principals, and controls in their strategies, programs, and operations . This includes, but is not limited to, specific focus on addressing ... (eg zero trust, data protection, identity & access mgmt., threat mgmt., etc.) + 3 years of experience with...development + Outstanding judgement and ability to methodically analyze cyber risk, and intelligence and both offer risk appropriate… more