- Bank of America (Washington, DC)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
- Dentons US LLP (Washington, DC)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Quantexa (Washington, DC)
- …across cloud platforms, SaaS services, and enterprise toolsets. You will integrate threat intelligence , refine detection rules, enhance incident readiness, and ... automated response playbooks across Wiz, Zscaler, and related platforms in accordance with threat intelligence and adversary techniques such as the Mitre Attack… more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
- Leidos (Odenton, MD)
- …and reduce the attack surface. + Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability ... x 365 days per year support DCDC Operations Center, providing command, control , and defensive cyber operations (DCO) functions across the Combatant Commands, Service… more
- RightDirection Technology Solutions LLC (Washington, DC)
- …and client related antivirus incidents, and upgrading servers and clients; + Provide malware and virus analysis and removal; Create indicators from analysis for use ... + Ensure HBSS set up conforms to requirements and recommendations IAW Intelligence Community Security Coordination Center (ICSCC); Operate and maintain the current… more