- Bank of America (Chicago, IL)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado To proceed with your application, you must ... must be at least 18 years of age. Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner_25045349-2) Job Description:… more
- Dentons US LLP (Washington, DC)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... as defined investigation and response procedures. Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Bank of America (Jacksonville, FL)
- …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
- Carnegie Mellon University (Pittsburgh, PA)
- …etc.) Software engineering and design concepts Firmware and device driver development Malware tradecraft and threat actor tactics, techniques, and procedures ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware … more
- General Dynamics Information Technology (Tampa, FL)
- …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... development, and best practices. Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. Adhering to… more
- Nightwing (Falls Church, VA)
- …Strong working knowledge of: Boolean Logic TCP/IP Fundamentals Network Level Exploits Threat Management Regular Expressions Knowledge of Control Frameworks and ... technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding… more
- Bank of America (Chicago, IL)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
- Sandia National Laboratories (Albuquerque, NM)
- …and Authorization + Cryptography + Side Channel Analysis + Failure Analysis + Threat intelligence + Modeling, simulation, and emulation + Data science, ... to help address the country?s most pressing national security needs. In the Threat Intelligence Center, the mission of the Information Operations Program is… more
- Dentons US LLP (Atlanta, GA)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Guardian Life (Bethlehem, PA)
- …and creative manner to address cyber incidents + Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies. ... situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity… more
- Bank of America (Jersey City, NJ)
- …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
- Carnegie Mellon University (Pittsburgh, PA)
- …engineering and design concepts + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware … more
- PSEG (Newark, NJ)
- …Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting. (S)he ... Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting for all… more
- Bluehawk LLC (HI)
- …damaged, or manipulated data and transform technical findings into actionable intelligence . Analysts contribute directly to cyber threat understanding, adversary ... Cyber (J6/Cyber) + Provides ad hoc briefings and contributes to general military intelligence products. Cyber Threat Analysis & Assessment + Conducts predictive … more
- Quantexa (Virginia Beach, VA)
- …across cloud platforms, SaaS services, and enterprise toolsets. You will integrate threat intelligence , refine detection rules, enhance incident readiness, and ... automated response playbooks across Wiz, Zscaler, and related platforms in accordance with threat intelligence and adversary techniques such as the Mitre Attack… more
- General Dynamics Information Technology (St. Louis, MO)
- …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
- L3Harris (Melbourne, FL)
- …and collaborates discovered intelligence via information sharing platform. + Researches threat actors, malware , attack vectors, and other threat ... (ISS) position that is staffed in the Security Operations Control Center (SOCC). + This position is on-site and...support as needed. Essential Functions: + Responsible for cybersecurity threat intelligence data collection via open … more
- Mallinckrodt Pharmaceuticals (Bridgewater, NJ)
- …the organization. + Maintain relationships and connectivity with industry peers, relevant threat intelligence sources, and regulatory agencies to collaborate and ... and systems infrastructure, and security-related tools such as whitelisting, IDS/IPS, anti- malware , patch management, baselining, SIEM, access control , and… more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... and best practices. + Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. + Adhering to… more