• Bank of America (Chicago, IL)
    Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado To proceed with your application, you must ... must be at least 18 years of age. Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner_25045349-2) Job Description:… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Dentons US LLP (Washington, DC)
    …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... as defined investigation and response procedures. Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Bank of America (Jacksonville, FL)
    …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Carnegie Mellon University (Pittsburgh, PA)
    …etc.) Software engineering and design concepts Firmware and device driver development Malware tradecraft and threat actor tactics, techniques, and procedures ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • General Dynamics Information Technology (Tampa, FL)
    …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... development, and best practices. Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. Adhering to… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Nightwing (Falls Church, VA)
    …Strong working knowledge of: Boolean Logic TCP/IP Fundamentals Network Level Exploits Threat Management Regular Expressions Knowledge of Control Frameworks and ... technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding… more
    job goal (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Malware Threat Intelligence

    Bank of America (Chicago, IL)
    Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
    Bank of America (11/25/25)
    - Save Job - Related Jobs - Block Source
  • Early Career Cybersecurity Researcher - Cyber…

    Sandia National Laboratories (Albuquerque, NM)
    …and Authorization + Cryptography + Side Channel Analysis + Failure Analysis + Threat intelligence + Modeling, simulation, and emulation + Data science, ... to help address the country?s most pressing national security needs. In the Threat Intelligence Center, the mission of the Information Operations Program is… more
    Sandia National Laboratories (12/03/25)
    - Save Job - Related Jobs - Block Source
  • Threat Analyst

    Dentons US LLP (Atlanta, GA)
    …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
    Dentons US LLP (10/29/25)
    - Save Job - Related Jobs - Block Source
  • Head of Cyber Incident Response & Cyber…

    Guardian Life (Bethlehem, PA)
    …and creative manner to address cyber incidents + Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies. ... situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity… more
    Guardian Life (10/15/25)
    - Save Job - Related Jobs - Block Source
  • Senior Red Team Developer - Adaptive Threat

    Bank of America (Jersey City, NJ)
    …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
    Bank of America (12/01/25)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer Researcher

    Carnegie Mellon University (Pittsburgh, PA)
    …engineering and design concepts + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware more
    Carnegie Mellon University (11/19/25)
    - Save Job - Related Jobs - Block Source
  • Director Cybersecurity Operations

    PSEG (Newark, NJ)
    …Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting. (S)he ... Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting for all… more
    PSEG (10/15/25)
    - Save Job - Related Jobs - Block Source
  • Computer Forensics Specialist - Mid-Level

    Bluehawk LLC (HI)
    …damaged, or manipulated data and transform technical findings into actionable intelligence . Analysts contribute directly to cyber threat understanding, adversary ... Cyber (J6/Cyber) + Provides ad hoc briefings and contributes to general military intelligence products. Cyber Threat Analysis & Assessment + Conducts predictive … more
    Bluehawk LLC (12/04/25)
    - Save Job - Related Jobs - Block Source
  • Senior Security Engineer - North America

    Quantexa (Virginia Beach, VA)
    …across cloud platforms, SaaS services, and enterprise toolsets. You will integrate threat intelligence , refine detection rules, enhance incident readiness, and ... automated response playbooks across Wiz, Zscaler, and related platforms in accordance with threat intelligence and adversary techniques such as the Mitre Attack… more
    Quantexa (12/11/25)
    - Save Job - Related Jobs - Block Source
  • CSOC Tier 3 Engineer

    General Dynamics Information Technology (St. Louis, MO)
    …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
    General Dynamics Information Technology (11/13/25)
    - Save Job - Related Jobs - Block Source
  • Sr Assocaite, IT Security - IT Security Operations…

    L3Harris (Melbourne, FL)
    …and collaborates discovered intelligence via information sharing platform. + Researches threat actors, malware , attack vectors, and other threat ... (ISS) position that is staffed in the Security Operations Control Center (SOCC). + This position is on-site and...support as needed. Essential Functions: + Responsible for cybersecurity threat intelligence data collection via open … more
    L3Harris (12/11/25)
    - Save Job - Related Jobs - Block Source
  • Executive Director & CISO

    Mallinckrodt Pharmaceuticals (Bridgewater, NJ)
    …the organization. + Maintain relationships and connectivity with industry peers, relevant threat intelligence sources, and regulatory agencies to collaborate and ... and systems infrastructure, and security-related tools such as whitelisting, IDS/IPS, anti- malware , patch management, baselining, SIEM, access control , and… more
    Mallinckrodt Pharmaceuticals (10/25/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Defense Incident Responder- Senior

    ABBTECH Professional Resources, Inc. (Washington, DC)
    …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
    ABBTECH Professional Resources, Inc. (11/11/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Splunk SOAR Engineer

    General Dynamics Information Technology (Macdill AFB, FL)
    …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... and best practices. + Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. + Adhering to… more
    General Dynamics Information Technology (12/11/25)
    - Save Job - Related Jobs - Block Source