- FM (Norwood, MA)
- …Technology (OT) honeypot. This role offers hands-on experience in threat detection, network segmentation, and cloud integration, with potential interaction ... traffic. Monitor honeypot activity and analyze captured data for threat intelligence. Document architecture, configurations, and observed behaviors. Collaborate with… more
- Reed Smith LLP (Pittsburgh, PA)
- …and support of LAN/WAN, remote access, IDS/IPS, PKI, and firewall/unified threat management systems, as well as Identity & Access Management, Endpoint ... Deploy, manage, and maintain firewalls, including Firewall-as-a-Service (FWaaS), Unified Threat Management (UTM) solutions, and Secure Web Gateways (SWG), to… more
- Insmed Incorporated (NJ)
- …directly in cybersecurity operations , including incident response, threat detection, vulnerability management, and risk remediation.Architect and operationalize ... with a focus on continuous improvement.Guide the adoption of AI-driven threat analytics, secure DevOps practices, and automated response frameworks to strengthen… more
- Agile IT (San Diego, CA)
- …and aligned with each clienta€ (TM) s policies and CMMC requirements. Threat Monitoring & Incident Response: Monitor security alerts and events across client ... catch real threats while minimizing false positives. Adjust alerting based on emerging threat patterns and the unique needs of each clienta€ (TM) s environment, all… more
- NY CREATES (Albany, NY)
- …and networks, the Cybersecurity Analyst will recognize and investigate the ever-evolving threat landscape utilizing data from a variety of cyber defense tools. The ... and services are configured correctly and functioning optimally. Monitor threat intelligence and investigate new Common Vulnerabilities and Exposures (CVEs)… more
- Twist BioScience (South San Francisco, CA)
- …help us innovate on our core technology. We are looking for a "Triple Threat " Scientist: someone with strong Molecular Biology skills, a solid grasp of DNA ... Chemistry, and the ability to code their own data analysis.Your mission is to close the loop. You will take the DNA from the chip, perform complex enzymology and library preparation, and analyze the sequencing data to prove that our synthesis innovations are… more
- Daiichi Sankyo, Inc. (Bernards, NJ)
- …analysis of a variety of data sets to investigate potentially malicious activityReview threat material to determine impact and actionsWork closely with IT staff to ... work active incidents through to closureReview daily reports of phishing emails/locked accounts/potentially malicious activityPrepare cybersecurity awareness presentation material monthly Qualifications: Qualified candidates must currently be enrolled in an… more
- MCKESSON (Columbus, OH)
- …standards for quality, reliability, and security. This includes risk-analysis, threat -assessment, and other quality-assurance tools and process. Meet feature, ... schedule, and technical requirements. Deliver features that matter most, early and often. Guide stakeholder communication, ensuring that status on high profile metrics and projects are well-communicated and well-understood up and across the business. About… more
- NY CREATES (Albany, NY)
- …Lead enterprise risk assessment program: design methodology, facilitate workshops, perform threat modeling, quantify likelihood and impact, and maintain dynamic risk ... register with residual risk tracking and KRIs. Own third-party risk management framework: develop tiering model, author due diligence questionnaires, lead evidence reviews, negotiate contractual security clauses, and enforce continuous monitoring via automated… more
- USAA (San Antonio, TX)
- …business cases to address them. This team is a part of our Cyber Threat Operation Center (CTOC), which protects, detects and responds to cyber security events. The ... CTOC is comprised of several teams that partner as needed to provide centralized and coordinated response and mitigation activities. Leads one or more analytical, business or technical support functions and is responsible for the implementation and management… more
- The Computer Merchant, LTD. (Waltham, MA)
- …concepts, including network security, data protection, identity management, and threat modeling across major cloud providers. Extensive hands-on experience with ... Azure, AWS, GCP and other major cloud providers and security tools and technologies (Azure Security Center, AWS Security Hub, GCP Security Command Center, CNAPP tools, etc.). Strong security foundations to include experience with network security,… more
- Sprague Pest Solutions (Davis, CA)
- …disposal of chemicals and equipment What we do at Sprague: Pests pose a serious threat to public health and our world's food supply. Food-borne illnesses as a result ... of bacteria transmitted by pests sicken millions of people annually. Sprague's highly trained and dedicated team is driven to design and deliver pest management programs using the latest technology and products to safeguard people, property, and food, and… more
- JPMorgan Chase (Tempe, AZ)
- The Threat Manager is vital to the Global Security Threat Management team, managing complex threat cases and improving workplace violence prevention. This ... role requires autonomy, expert decision-making, and specialized threat management knowledge. The Threat Manager oversees cases, leads projects, and influences… more
- Marriott (Bethesda, MD)
- …for insider risk analysis responsible for supporting the Global Insider Threat Management Program. Duties will include incident response to insider incidents ... technical subject matter expert to enhance adjacent programs such as threat intelligence, cybersecurity incident response, risk management, audit, ethics, etc.… more
- Citigroup (Irving, TX)
- …growth and progress together. Citi is seeking a highly motivated and experienced **Cyber Threat Hunt Senior Analyst** to join our team in **Irving, TX** . This role ... a member of this team, you will use proactive threat intelligence from the CIC to conduct advanced, hypothesis-based... intelligence from the CIC to conduct advanced, hypothesis-based threat hunts and sustain coverage over Citi's most advanced… more
- Leidos (Springfield, VA)
- …the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your experience to ... monitoring, and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The… more
- COLSA Corporation (Kingsport, TN)
- …role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Key responsibilities ... of mitigations. + Conduct research on the latest organization's environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures… more
- Medtronic (Lafayette, CO)
- …* Boston, Massachusetts * Memphis, Tennessee As the IT Manager of the Threat Intelligence team, you will oversee the collection, analysis, and dissemination of cyber ... threat intelligence to proactively identify risks and guide defensive...* Define and lead the multi-year strategy for the threat intelligence program aligned with the organization's risk appetite… more
- Bank of America (Chicago, IL)
- Senior Threat Hunter Charlotte, North Carolina;Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Charlotte/Senior- Threat -Hunter\_25037629) **Job Description:** At Bank of America, we are… more
- BAE Systems (Merrimack, NH)
- …can change the world. BAE Systems is seeking a highly motivated, experienced Threat Analyst to join the Mission Assessments team to and analyze various intelligence ... data to support our analysis mission. A Threat Analyst is responsible for working directly with Government...understand the threats and lead the production of the threat models in support of Mission Analysis. The … more
Related Job Searches:
Counter Threat Finance CTF,
Cyber Msft Threat Protection,
Cyber Threat Analyst,
Cyber Threat Intelligence Analyst,
Cyber Threat Intelligence Lead,
Insider Threat Program Analyst,
Manager Threat Intelligence Services,
Senior Adaptive Threat Replication,
Senior Cyber Threat Intelligence,
Threat Analyst