- Optiv (Tampa, FL)
- …theory best practices for diverse audiences + Develop realistic and functional simulated phishing templates content on the simulated phishing platform + Execute ... and text in Adobe Photoshop, Illustrator, InDesign, and the simulated phishing platform to effectively communicate ideas + Develop functional, visually engaging,… more
- Amgen (Thousand Oaks, CA)
- …for: **Role Responsibilities** + Serve as the Product Owner for Internal Phishing Services within the Cybersecurity Education and Awareness program, advancing our ... culture of resilience across Amgen. + Maintain the internal phishing program platform and processes + Identify ways to continue to mature internal phishing … more
- Robert Half Technology (Los Angeles, CA)
- …weekly report generation, tracking, and follow up * Lead regular simulated phishing exercises across the organization to gauge and improve security awareness * ... level * Use skills in Cyber Security, Conduct Training Sessions and Simulated phishing to deliver on the responsibilities. Requirements * Applicant must hold a… more
- Linchpin Solutions, Inc. (Frederick, MD)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Robert Half Technology (Madison, WI)
- …including: + Cisco Email Security + Cisco Umbrella + Cisco DUO + Microsoft Phishing + Cisco Identity Services Engine (ISE) + Assist with the initial implementation ... operating and managing Cisco Access Points. * Knowledge and understanding of Phishing threats and countermeasures. * Experience in using FMC (Firepower Management… more
- Centene Corporation (Olympia, WA)
- …employee security awareness and training program. + Manage the enterprise-wide simulated phishing training program data. Support phishing training, manage and ... track results, develop reports, perform trend and risk analysis, and communicate results. + Determine if security policy and standards updates needed due to changes in regulations, business processes, and best practices; manage security policy framework in the… more
- Chemours (Wilmington, DE)
- …are not limited to, the following:** + Daily activities -Create and report on phishing campaigns, develop training materials for a broad range of users within the ... + Responsibilities-Work with senior education & awareness staff to create new phishing campaigns and to develop new, or improve upon existing, training materials,… more
- Linchpin Solutions, Inc. (29 Palms, CA)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Robert Half Technology (St. Petersburg, FL)
- …is a Big Plus: Knowledge of endpoint security, authentication, and phishing -resistant measures. Summary: We are seeking a detail-oriented Technical Project Manager ... IT security field, with knowledge of endpoint security, authentication, and phishing -resistant measures. + Experience with IT environments for smaller companies or… more
- TEKsystems (Chicago, IL)
- …technologies. * Oversee teams members whose duties involve reviewing email proxy phishing and spam queues. Provide guidance for tuning/adjustment of rules for the ... network exploitation, attack vectors and pathologies, intrusion techniques, such as phishing , denial of service attacks, OWASP Top 10 vulnerabilities, malicious… more
- CTG (Buffalo, NY)
- …responds to assigned tickets within established service level agreements. + Investigate potential phishing attacks, lead phishing campaigns. + Stay up to date ... with the latest trends in Information Security, such as related websites, blogs, articles, reports and other security intelligence sources. + Assist CSIRT analysts during incident response activities of escalated security incidents. + Contribute to detailed… more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Randstad US (Woodbridge, NJ)
- …enterprise environment. Our team provided support and Endpoint detection, phishing , database monitoring, security analysis, threat intelligence analysis, management ... management tool - Alert management experience - Accountable for conducting phishing analysis, web proxies, endpoint detection and response, database monitoring -… more
- Robert Half Technology (Knoxville, TN)
- …and cloud-based services alongside maintaining the security awareness training and phishing program. Responsibilities: * Administer Microsoft 365 and Azure Active ... and scanning troubleshooting and support. * Maintain the security awareness training and phishing program. * Monitor alerts and review logs for potential issues. *… more
- Vestis Services (Roswell, GA)
- …and physical --Knowledge of common cybersecurity attacks and indicators of compromise: phishing , smishing, malware, man in the middle attack, SQL Injection, Denial ... --Knowledge in setting up and running information security training programs and phishing campaigns --Skilled and proficient in MS Office O365 suite security… more
- Linchpin Solutions, Inc. (Camp Pendleton, CA)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- Linchpin Solutions, Inc. (New Orleans, LA)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.… more
- John Deere (Moline, IL)
- …any cyber security threat (3 yrs); Experience analyzing, investigating, and mitigating phishing threats using Phishing Triage Tool, Cofense, email Gateway, ... Proofpoint and advanced email threat protection tools and O365 security products (2 yrs); Knowledge of Incident Response methodologies and information security best practices/technologies, MITRE attack framework, Application Vulnerabilities and its… more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …us at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. We are an ... equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
- Linchpin Solutions, Inc. (Aberdeen Proving Ground, MD)
- …at ### if you suspect any type of social engineering attacks such as phishing , spear phishing , baiting or any other suspicious activity. Equal Opportunity ... Employment Statement We are an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. more
Related Job Searches:
Sr Threat Researcher Phishing