• Malware Threat Intelligence

    Bank of America (Denver, CO)
    Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
    Bank of America (12/22/25)
    - Save Job - Related Jobs - Block Source
  • Threat Analyst, Google Threat

    Google (VA)
    Threat Analyst, Google Threat Intelligence Group _corporate_fare_ Google _place_ Virginia, USA; United States _laptop_windows_ Remote eligible **Mid** ... purpose languages. + 5 years of experience in a threat intelligence or a related analyst role..... **Responsibilities** + Identify, analyze, and document network signals, malware behaviors, and threat reports related to… more
    Google (01/09/26)
    - Save Job - Related Jobs - Block Source
  • Threat Analyst

    Dentons US LLP (St. Louis, MO)
    …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
    Dentons US LLP (10/29/25)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer Researcher

    Carnegie Mellon University (Pittsburgh, PA)
    …engineering and design concepts + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware more
    Carnegie Mellon University (11/19/25)
    - Save Job - Related Jobs - Block Source
  • Director Cybersecurity Operations

    PSEG (Newark, NJ)
    …Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting. (S)he ... Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting for all… more
    PSEG (10/15/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Lead

    Ball Corporation (Westminster, CO)
    …a superior customer/client experience and build long-term relationships. + Familiarity with threat intelligence and threat hunting. + Technical expertise ... information security principles, including risk assessment, intrusion detection, network access control (NAC), encryption, threat and vulnerability management. +… more
    Ball Corporation (01/07/26)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Operations Scientist

    The MITRE Corporation (Houston, TX)
    …the collection, transformation, and analysis of complex datasets, optimizing workflows for threat intelligence operations. + Serve as the go-to problem solver ... analysis and enables advanced querying and data mining in support of cyber threat intelligence objectives. + Collaborate with cross-functional teams, including … more
    The MITRE Corporation (01/06/26)
    - Save Job - Related Jobs - Block Source
  • CSOC Tier 3 Engineer

    General Dynamics Information Technology (Springfield, VA)
    …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
    General Dynamics Information Technology (11/13/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Splunk SOAR Engineer

    General Dynamics Information Technology (Macdill AFB, FL)
    …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... and best practices. + Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. + Adhering to… more
    General Dynamics Information Technology (12/11/25)
    - Save Job - Related Jobs - Block Source
  • Senior Cybersecurity Analyst, McCrary Institute

    Auburn University (Auburn, AL)
    … Hunting:** Conduct in-depth threat hunting and develop actionable threat intelligence for state and critical infrastructure partners. **Automation and ... (ISAC ) environment. The Senior Analyst is responsible for advanced threat hunting, incident leadership, automation initiatives, and operational support for state… more
    Auburn University (11/18/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Operations Center (SOC) Manager

    Travelers Insurance Company (St. Paul, MN)
    …detection, response and disruption of cybersecurity events across Travelers through threat intelligence gathering, detection, and techniques to assess, support, ... base, including creating, maintaining, and enforcing standard operating procedures (SOPs), threat intelligence , and other documentation. + Develop metrics and… more
    Travelers Insurance Company (10/31/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Assessment Team Lead

    Tyto Athene (Ashburn, VA)
    …enforcement customer in Ashburn, VA. In this role, you will work closely with threat hunters, threat analysts, and an established SOC-playing a critical part in ... agency tools and technologies used for vulnerability testing, scanning, and threat identification. + Review and update vulnerability management plans, policies, and… more
    Tyto Athene (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Assessments and Exercises Vice President-Purple…

    JPMorgan Chase (Plano, TX)
    …recommendations - making data-driven decisions that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about ... and risk management. Engage with peers and industry groups that share threat intelligence analytics. **Required qualifications, capabilities, and skills** +… more
    JPMorgan Chase (10/19/25)
    - Save Job - Related Jobs - Block Source
  • CSOS Analyst - Tier 2

    CACI International (Springfield, VA)
    …and recovery measures for events and incidents. CSOC Tier 2 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT ... CSOC Tier 2 services will be under the direct control of, and take direction from, the Government CIRT...and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement… more
    CACI International (12/24/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Incident Manager

    The Salvation Army (West Nyack, NY)
    … Hunting * Firewall, Proxy, and IDS Log Analysis (eg, Fortinet, Meraki) * Threat Intelligence Integration and Analysis * Email Header and Phishing Analysis * ... and Analysis:The Cyber Incident Manager should deeply understand the cyber threat landscape, including the latest trends in cyber-attacks and defense strategies.… more
    The Salvation Army (12/25/25)
    - Save Job - Related Jobs - Block Source
  • Assessments & Exercises Vice President - Offensive…

    JPMorgan Chase (Plano, TX)
    …recommendations - making data-driven decisions that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about ... and risk management. Engage with peers and industry groups that share threat intelligence analytics **Required qualifications, capabilities, and skills** + 5+… more
    JPMorgan Chase (10/12/25)
    - Save Job - Related Jobs - Block Source
  • Lead Cyber Fusion Analyst

    Leidos (Odenton, MD)
    …and reduce the attack surface. + Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability ... x 365 days per year support DCDC Operations Center, providing command, control , and defensive cyber operations (DCO) functions across the Combatant Commands, Service… more
    Leidos (12/30/25)
    - Save Job - Related Jobs - Block Source
  • CSOC Analyst T2 - NC

    Nightwing (Falls Church, VA)
    …Exploits + Threat Management + Regular Expressions + Knowledge of Control Frameworks and Risk Management techniques + Excellent oral and written communication ... technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding… more
    Nightwing (12/04/25)
    - Save Job - Related Jobs - Block Source
  • Security Engineering Lead

    Tyto Athene (Ashburn, VA)
    …and maintain advanced security technologies, collaborate with security operations and threat hunting teams, and scale solutions that defend against emerging global ... security platforms, including: + Layer 2/Layer 3 network devices + Network Admission Control (NAC) and 802.1x + Firewalls, IDS/IPS, VPN solutions, WAFs, and content… more
    Tyto Athene (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Information Assurance Policy and Compliance - Ops…

    NANA Regional Corporation (Albuquerque, NM)
    …+ Vulnerability assessment and penetration testing tools + Knowledge of cyber threat intelligence , risk assessments, and compliance frameworks (NIST, RMF, FISMA, ... maintain compliance. + Conduct regular audits, risk assessments, and security control evaluations to identify gaps and recommend improvements. + Generate compliance… more
    NANA Regional Corporation (11/18/25)
    - Save Job - Related Jobs - Block Source