- Abbott (Chicago, IL)
- …stakeholders across the enterprise. **Main Responsibilities:** + Manage the phishing simulation program including data analytics and communication activities + ... vendor and internal support teams + Analyze data from phishing results including benchmarking and providing information for the...scenarios based on ongoing threats/incidents and execute the Proofpoint phishing program per the plan + Be able to… more
- Splunk (WA)
- …Summary: Join our team, formerly known as TwinWave, in developing phishing detections for our cutting-edge, microservice-based threat analysis pipeline. This role ... involves creating new phishing detection logic and technologies, utilizing our existing analysis...will work closely with principal threat researchers specializing in phishing detection. If you take pride in thwarting … more
- Amgen (Thousand Oaks, CA)
- …for: **Role Responsibilities** + Serve as the Product Owner for Internal Phishing Services within the Cybersecurity Education and Awareness program, advancing our ... culture of resilience across Amgen. + Maintain the internal phishing program platform and processes + Identify ways to continue to mature internal phishing … more
- Linchpin Solutions, Inc. (Liberty, NC)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Salary Description… more
- Randstad US (Woodbridge, NJ)
- …enterprise environment. Our team provided support and Endpoint detection, phishing , database monitoring, security analysis, threat intelligence analysis, management ... management tool - Alert management experience - Accountable for conducting phishing analysis, web proxies, endpoint detection and response, database monitoring -… more
- Sepire (Willowbrook, IL)
- …and defenses, encryption, certificate authority, web filtering, anti-malware, phishing simulation, anti- phishing , multi-factor authentication. This employer ... participates in E-Verify. Click here (https://e-verify.uscis.gov/web/media/resourcesContents/E-Verify\_Participation\_Poster\_ES.pdf) for more information. Powered by JazzHR more
- Linchpin Solutions, Inc. (Fayetteville, NC)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (Fayetteville, NC)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (Fayetteville, NC)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (Fayetteville, NC)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Robert Half Technology (Knoxville, TN)
- …and cloud-based services alongside maintaining the security awareness training and phishing program. Responsibilities: * Administer Microsoft 365 and Azure Active ... and scanning troubleshooting and support. * Maintain the security awareness training and phishing program. * Monitor alerts and review logs for potential issues. *… more
- BD (Becton, Dickinson and Company) (Franklin Lakes, NJ)
- …their roles. + Collaborate with Regional Cybersecurity Officers to complete phishing simulations and leverage technology to deliver meaningful feedback and relevant ... proven experience in a cybersecurity vigilance role + Experience managing phishing simulations preferred + Strong knowledge of cybersecurity principles, threats, and… more
- AON (Washington, DC)
- …to demonstrate your understanding of ransomware incidents, business email compromise cases, phishing campaigns, data breaches, and other types of cyber security and ... to demonstrate your understanding of ransomware incidents, business email compromise cases, phishing campaigns, data breaches, and other types of cyber security and… more
- Linchpin Solutions, Inc. (IA)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (Camp Pendleton, CA)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- MindPoint Group (Washington, DC)
- …learn basic incident response techniques, and how to effectively investigate phishing threats against our clients. **Responsibilities:** + Utilize the SOCs security ... + Knowledge of Windows and Unix operating systems + Knowledge of common phishing techniques and how to investigate them + Proficiency in technical writing +… more
- Splunk (ID)
- …Engineer is crucial in revolutionizing cyber threat defense, particularly against phishing and malware distributed through malicious URLs. Your expertise will ... ethical considerations in automated web interactions. + Knowledge of common phishing techniques and experience in developing automated detection systems. +… more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Davenport Community Schools (Davenport, IA)
- …awareness is maintained district-wide + Work with Network team to develop Phishing Campaigns including cadence for phishing simulations + Help establish ... a district-wide process to evaluate cybersecurity tools & vendors, maintain a catalog of approved and preferred tools, and assist tool rationalization where feasible + Ensure Network Infrastructure and Security toolset (hardware and software) comply with life… more
Related Job Searches:
Sr Threat Researcher Phishing