- Mission Support and Test Services (North Las Vegas, NV)
- …seeking an experienced Cyber Security Analyst to join our team as a Principal Threat Hunting Analyst. This role is responsible for managing threat hunting ... the analyst will ensure all incident response processes and associated threat hunting techniques are well-defined, documented, tested, and managed. The analyst… more
- Tyto Athene (Ashburn, VA)
- **Description** Tyto Athene is searching for a **Cyber Threat Hunt Team Lead** to support a law enforcement customer in Ashburn, VA.You will play a critical role in ... from cyber threats facing our clients. You will work closely with other threat hunters, threat analysts, and an established SOC, and we will rely on you to… more
- Tyto Athene (Ashburn, VA)
- **Description** Tyto Athene is searching for a **Cyber Threat Intelligence (CTI) Lead** to support a law enforcement customer in Ashburn, VA. You will drive advanced ... cyber threat analysis, intelligence collection, and proactive defense strategies. The...defense strategies. The CTI Lead will work closely with threat hunters, threat analysts, and an established… more
- Dentons US LLP (Chicago, IL)
- Threat Analyst Chicago, IL, USHouston, TX, USSt. Louis, MO, USWashington DC, DC, USKansas City, MO, USDallas, TX, USAtlanta, GA, USPhoenix, AZ, US Nov 25, 2025 ... Dentons US LLP is currently recruiting for a Threat Analyst. The Information Security Threat Analyst is responsible for proactively hunting for threats within… more
- HP Inc. (Austin, TX)
- …Come be a part of making a difference with us! **What does a Cybersecurity Threat Detection & Response Engineer do at HP:** + Uses knowledge of the HP environment ... remediation, and assists in developing courses of action. + Threat hunts the HP environment for known or emerging...Able to contribute to the posture or enhancement of counter- threat programs. **Individuals who thrive in this role at… more
- Zscaler (San Jose, CA)
- …talents to Zscaler and help shape the future of cybersecurity. The Red Canary Threat Response Engineering team is on the front lines, acting as the virtual boots ... and Response (EDR) and Identity telemetry to perform behavioral analysis and threat hunting while leveraging the Red Canary platform to take immediate action.… more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …conditions._ **This program requires US Citizenship** Job Description + Identify threat tactics, methodologies, gaps, and shortfalls aligned with the MITRE ATT&CK ... Framework and the Azure Threat Research Matrix (ATRM). + Perform Hypothesis-based or Intelligence-based Cyber Threat Hunts to identify threats and risks within… more
- National Renewable Energy Laboratory (Golden, CO)
- …and sustain the nation's evolving energy infrastructure. CRC research spans threat actor modeling and simulation, operational technology (OT) risk analysis, ... and research-focused professional to contribute to cyber adversarial science, threat emulation, and defense experimentation. The successful candidate will possess… more
- NetApp (Morrisville, NC)
- …have a strong background in leading incident response (IR) investigations, cyber threat hunting, vulnerability management, threat modeling, and agentic detection ... investigations, ensuring timely and effective resolution. + Conduct proactive cyber threat hunting to identify and mitigate potential threats. + Perform… more
- Tyto Athene (Ashburn, VA)
- …capabilities, to identify incidents' root causes, scope, and impact + Collaborate with cyber threat hunting and cyber threat intelligence teams + Serve as the ... professional cybersecurity experience with strong expertise in incident response, insider threat investigations, forensics, and threat analysis. + Minimum of… more
- McAfee, Inc. (Frisco, TX)
- …privacy, and digital safety controls Web Security - Secure and threat -aware browsing experiences across consumer contexts Device Security - Enhanced protection ... and product execution plans. + Collaborate closely with product management, threat intelligence, research teams, and executive stakeholders to shape long-term… more
- National Renewable Energy Laboratory (Golden, CO)
- …designed to support your career and well-being. **Job Description** The Cybersecurity Threat Analysis Group (CTAG) within the National Laboratory of the Rockies ... organizations. Research areas within CTAG includes energy system modeling and simulation, threat to consequence risk analysis, and hardware & software supply chain… more
- Pinkerton (Washington, DC)
- …of Pinkerton's largest global clients, will perform essential security monitoring and threat mitigation functions for the client, which has employees and offices ... worldwide. The Analyst performs tactical level threat intelligence functions to include collection of intelligence information and tracking physical threat … more
- LiveRamp (New York, NY)
- …position will also lead our incident response efforts and the development of threat detection platforms. **You will:** + Implement threat detection logic across ... including SIEM, and other security platforms as needed. + Utilize threat modeling and threat -based thinking to construct and prioritize detection use cases. +… more
- Tyto Athene (Reston, VA)
- …to predictive, enabling our teams to focus on strategic initiatives and complex threat hunting. The selected candidate will be a technical leader in Tyto's new ... telemetry, logs, flow data, packet captures, security alerts, endpoint data, threat intelligence feeds). + Perform advanced feature engineering on raw network… more
- ExxonMobil (Spring, TX)
- …for selected company events and executive protection assignments; Prepare threat assessments, protective intelligence reports, security reviews, and corporate ... with the protection of personnel, assets and information including enhancements as threat escalates and the development of security business plans; Conduct and… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …tactics, and capabilities of adversarial organizations to develop threat characterization + Identify information requirements, develop assessment strategies ... matter expertise in one or more of the following areas: Cyber Threat analyst; cyber planner experience; IAT II/III; All Source Analyst; Information Operations/CI… more
- Pinkerton (Phoenix, AZ)
- …a wide variety of cases including but not limited to life safety/ threat management (workplace violence, assault, harassment, stalking, domestic violence, and missing ... + Monitor persons of interest who may pose a threat of violence to people or assets. + Monitor...telephone records. + Produce high quality, timely, and tailored threat assessments for internal stakeholders while managing sensitive or… more
- Carnegie Mellon University (Pittsburgh, PA)
- …systems and related processes. A rapidly expanding mission area is timely AI/ML threat analysis supporting AI security of the Defense Industrial Base and US National ... analysis of emerging AI/ML software system vulnerabilities and recommendations; Threat actor intent, capability, and opportunities to actively exploit legitimate… more
- Carnegie Mellon University (Pittsburgh, PA)
- …systems and related processes. A rapidly expanding mission area is timely AI/ML threat analysis supporting AI security of the Defense Industrial Base and US National ... analysis of emerging AI/ML software system vulnerabilities and recommendations; Threat actor intent, capability, and opportunities to actively exploit legitimate… more
Related Job Searches:
Counter Threat Finance CTF,
Cyber Msft Threat Protection,
Cyber Threat Analyst,
Cyber Threat Intelligence Analyst,
Cyber Threat Intelligence Lead,
Insider Threat Program Analyst,
Manager Threat Intelligence Services,
Senior Adaptive Threat Replication,
Senior Cyber Threat Intelligence,
Threat Analyst