- MUFG (Jersey City, NJ)
- …Windows Defender Advanced Threat Protection (D-ATP) Office 365 Advanced Threat Protection Other endpoint security solutions and comprehensive ... Lead the response to an investigation of security breaches or incidents on the endpoint ...(AAD), Microsoft Cloud App Security (MCAS); Advanced Threat Analytics; Defender for O365, Microsoft Endpoint … more
- Trellix (Columbia, MD)
- …with Trellix Endpoint Security (ENS), e Policy Orchestrator (ePO), Endpoint Detection and Response (EDR), Threat Intelligence Exchange (TIE), and Data ... **_Job Title:_** Professional Services Product Consultant - Endpoint Security Engineer **_Role Overview:_** Join...will write technical documentation and briefings. + You will lead and/or participate in technical exchange meetings. + You… more
- Trellix (Columbia, MD)
- …with Trellix Endpoint Security (ENS), e Policy Orchestrator (ePO), Endpoint Detection and Response (EDR), Threat Intelligence Exchange (TIE), and Data ... **_Job Title:_** Professional Services Solution Consultant - Endpoint Security Engineer **_Role Overview:_** Join an industry leading team performing challenging… more
- Capital One (Mclean, VA)
- …United States of America, McLean, Virginia Manager, Cyber Technical Product Owner (Host and Endpoint Security ) Capital One is seeking a product owner to help ... deliver game-changing cybersecurity solutions based on threat , data, and design thinking. At Capital One, we...business. As a Product Owner supporting the Host and Endpoint Security Service, you will be accountable… more
- AutoZone, Inc. (Memphis, TN)
- …one or more of the following functional areas preferred: o Network and endpoint security , eg experience with enterprise firewalls, web gateway proxies, Active ... of Compromise) to improve fidelity and minimize false positives. o Threat hunting o Security incident response activities. . Knowledge and experience with… more
- General Dynamics Information Technology (Colorado Springs, CO)
- …detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket ... requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat ...Network Threat Hunting, Big Data + Analytics, Endpoint Threat Detection and Response, SIEM, workflow… more
- Bluehawk LLC (Schriever AFB, CO)
- …detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket ... every step of the way. Bluehawk is seeking a Security Operations Center (SOC) Analust Lead . As...technologies Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow… more
- P 11 Security, Inc. (Colorado Springs, CO)
- …detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket ... Security Operation Center (SOC) Analyst Lead ...technologies Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow… more
- PSEG (Bethpage, NY)
- …tune and enhance the effectiveness of network and endpoint security measures, including encryption protocols, and lead continuous improvement initiatives ... This position is an experienced, hands-on technical lead , performing IT security functions, especially related endpoint protection and network security .… more
- Capgemini (TX)
- …coding practices, web application vulnerabilities (eg, OWASP Top 10), and application security testing techniques. + ** Endpoint Security ** : Experience ... Account Team **Key skills:** **Technical skills :** A Cyber Security Solution lead needs a blend of...within a SOC environment, including incident detection, response, and threat hunting. + ** Security Information and Event… more
- General Dynamics Information Technology (Newington, VA)
- …Hunting expertise and deep analysis of raw data from assets supporting Network Security Services, Endpoint Security Services, and Cybersecurity Data Analysis ... Top Secret/SCI **Public Trust/Other Required:** None **Job Family:** Cyber Security **Skills:** Advanced Persistent Threats (APT),Cyber Threat Hunting,Cyber… more
- Federal Reserve Bank (Washington, DC)
- …other supporting documents. Identifies and analyzes emerging technology impact on Board security issues. May lead technical projects. Reviews the quality, ... enable threat hunt activities. The Sr. Cybersecurity Analyst (Sr. Security Analyst) provides technical and analytical assessments to support information … more
- Wells Fargo (Columbus, OH)
- …networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security + Review and correlate security ... **About this role:** Wells Fargo is seeking a Lead Information Security Engineer that has experience with directory server solutions to join our dynamic team.… more
- Wells Fargo (Irving, TX)
- …cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security . Review and correlate security logs. ... Lead Information Security Engineer Irving,TX Job...security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and… more
- RWJBarnabas Health (West Orange, NJ)
- …Maintenance + Unified Threat Management inclusive of SIEM, and security analytics + Endpoint Security Posture/Reporting/Metrics collection + ... the organization to protect the infrastructure. + DNS/DHCP Configuration Management + Endpoint Security Software Lifecycle Management + Endpoint Encryption… more
- Leidos (Ashburn, VA)
- …The Leidos Digital Modernization Team is seeking a Incident Response Deputy Team Lead The US Department of Homeland Security (DHS), Customs and Border ... Leidos is seeking an experienced Incident Response Deputy Team Lead professional to join our team. As a leader...Ability to stay up to date with the latest threat intelligence, security trends, tools and capabilities.… more
- Sherwin-Williams (Cleveland, OH)
- …all applications are using effective security monitoring, and work with the endpoint security team to test configurations. Here, we believe there's not one ... the security architects to validate potential architectures through techniques like threat modeling. + Maintain knowledge of best security practices through… more
- CareFirst (Washington, DC)
- …policies, indicators, and protocols. Designs technical solutions for network protection, endpoint security , access control, auditing, and log management. Uses ... and restores computers and electronic communication systems. Collaborates with the security community to obtain technical cyber threat intelligence. Researches… more
- Duquesne Light Company (Pittsburgh, PA)
- …the Cybersecurity Operations Supervisor. + Review endpoints to confirm compliance with endpoint security policies, procedures, and standards. + Performs forensic ... analysis of host-based systems. + Stay up to date on changes in threat landscape impacting Duquesne's information security program. + Research, investigate,… more
- Capital One (Mclean, VA)
- …One is seeking a technical security product owner to deliver game-changing endpoint security solutions based on threat , data, and design thinking. ... other stakeholders + Analyze and select alternatives based on threat , risk, desirability, feasibility, and viability + Keep abreast...makers based on business and technology risk based on endpoint security and product management expertise +… more