- JPMorgan Chase (Columbus, OH)
- …skills in cybersecurity to have a real impact on the financial industry. As an Threat Modeling / Endpoint Lead Cybersecurity Architect at JPMorgan Chase ... in support of project goals. **Job responsibilities** + Executes threat modeling and security baseline creation and maintenance + Leads technology and process… more
- JPMorgan Chase (Columbus, OH)
- …at JPMorgan Chase within the Cybersecurity & Technology Controls organization, you lead a specific security architecture area and drive impact within ... across departments. Utilize your in-depth knowledge of architecture, systems, applications, security concepts, and product management to lead multiple complex… more
- JPMorgan Chase (Columbus, OH)
- …+ Partners with Threat Intelligence teams to enable them to correlate threat data with endpoint security controls, facilitating prioritized remediation ... the world's largest and most influential companies. As a Lead Security Engineer at JPMorgan Chase within...as SCCM, Puppet or similar + Expertise in cyber security endpoint security and vulnerability… more
- Trellix (Reston, VA)
- …with Trellix Endpoint Security (ENS), e Policy Orchestrator (ePO), Endpoint Detection and Response (EDR), Threat Intelligence Exchange (TIE), and Data ... **_Job Title:_** Professional Services Product Consultant - Endpoint Security Engineer **About** **Trellix:** **Trellix, the trusted CISO ally, is redefining the… more
- Leidos (Washington, DC)
- **Description** **Leidos is seeking a skilled and driven Endpoint Security as a Service (ESS) Engineer and Administrator to join our team at the Washington Navy ... ESS deployments and policy rollouts across local and remote systems. + Conducting threat analysis and crafting custom security rules tailored to advanced… more
- Mount Sinai Health System (New York, NY)
- …Mac endpoint lifecycle using Microsoft Intune, JAMF Pro. + Lead Intune-based Windows 11 device management, autopilot provisioning, configuration policies, and ... + Define and enforce compliance, app protection (MAM), encryption, and mobile threat defense policies. + Collaborate with clinical, security , and infrastructure… more
- Procter & Gamble (Cincinnati, OH)
- …application owners, patching teams, security leaders in order to mitigate a security threat . + Should have deep technical knowledge of the following: + ... exploit code and propose effective countermeasures and mitigation strategies. + Enterprise Endpoint Security and Security Orchestration, Automation and… more
- JPMorgan Chase (New York, NY)
- …+ Develop a threat hunting strategy to lead an already mature threat hunting team within the global security operations team + Execute and influence the ... solutions to address complex security challenges. As the manager of the Global Threat Hunting Operations team you will develop and execute a threat hunting… more
- Insight Global (Richardson, TX)
- …Takes a primary role in investigating and responding to complex security incidents identified through threat -hunting activities, including containment, ... Offers strategic input for the development and maintenance of the organization's security roadmap, informed by insights gained from threat -hunting activities and… more
- Woodforest National Bank (The Woodlands, TX)
- …and monitor security threats. . Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security ... the largest employee-owned banks in the country! The Cybersecurity Threat Intelligence Lead will serve as the...security solutions to assist with logging, alerting, and threat analysis. . Security system monitoring and… more
- Ball Corporation (Westminster, CO)
- …with Security Operations and IT to continuously integrate and fine-tune security controls (firewalls, IDS/IPS, SIEM, endpoint tools) for optimized detection ... 3. Advanced Incident Response (IR) a. Act as a lead responder for critical incidents, guiding containment, eradication, and...core requirement. c. Mentor junior analysts and other cyber security staff in threat hunting techniques, incident… more
- TEKsystems (Orange, CA)
- …the team's efforts to support core cyber functions and technologies such as: - Endpoint Security , Anti-Virus (AV), Endpoint Detection and Response (EDR) - ... with policies to support full scope cyberspace operations. * Lead the security incident lifecycle from detection...data, in compliance with Federal and State mandates Skills Endpoint Security , Palo Alto Firewall, Endpoint… more
- Volvo Group (Greensboro, NC)
- …alert and incident response processes, conducting in-depth analysis of network and endpoint data, and incorporating threat intelligence to enhance detection and ... Operations Center experience in the following: intelligence driven detection, security principles, threat lifecycle management, incident management, digital… more
- State of Maine, Bureau of Human Resources (Augusta, ME)
- …10, 2025 Apply with Linkedin Apply OFFICE OF INFORMATION TECHNOLOGY - MAINE IT SECURITY OPERATIONS / THREAT INTELLIGENCE Opening Date: June 25, 2025 Closing ... Position Summary: We are seeking a detail-oriented and highly analyticalTier 2 Threat Intelligence Analystto join our growing Security Operations group. In… more
- DoorDash (New York, NY)
- …The Security Operations team spans several capabilities, to include Threat Response, Threat Hunt, Threat Intelligence, Detection Engineering, ... delivery network to support our three-sided marketplace of consumers, merchants, and Dashers. Security is integral to the success of the business, as we secure the… more
- Navy Federal Credit Union (Pensacola, FL)
- …program through cross-functional engagement and continuous improvement initiatives. Responsibilities + Lead DLP investigations across email, endpoint , web, and ... ensuring that sensitive data is protected in alignment with Navy Federal's security policies and regulatory obligations. This role is highly collaborative, requiring… more
- Comcast (Philadelphia, PA)
- …Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and ... does not directly manage people. **Job Description** **Responsibilities** + Lead response to Cyber Security Incidents of...threat detection alerts and related signals into the Security Operations Center. + Serve as a technical subject… more
- MUFG (Tempe, AZ)
- … security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, ... more security domains including Security Governance and Oversight, Security Risk Management, Network Security , Threat and Vulnerability Management,… more
- ARCO (Brentwood, MO)
- … information and event monitoring (SIEM) system logging and analysis, application security , endpoint privileged management (EPM), threat intelligence, ... Gateway (SIG), vulnerability management, security configuration monitoring, firewalls, endpoint detection and response (EDR), threat intelligence, … more
- Palo Alto Networks (Santa Clara, CA)
- …in a Security Operations role + Familiarity with the principles of network and endpoint security , current threat and attack trends, and have a working ... to determine root cause and impact + Own and lead individual incident response activities by analyzing security... Security team is part of the Global Security Operations team and supports threat detection… more