• Senior Cyber Threat

    TD Bank (Mount Laurel, NJ)
    …and production expertise across a variety of intelligence functions, to include cyber , fraud, geopolitical and insider threat domains. This role requires an ... Technology Solutions **Job Description:** This role is for Senior Threat Intelligence Analyst for the Threat...review intelligence products and communications for stakeholders, operational personnel, and leadership. + Support cyber more
    TD Bank (10/16/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Defense Sr Specialist Threat

    SAP (Newtown Square, PA)
    …SAP faces today. The Cyber Threat Hunt capability is aligned to SAPs Cyber Threat Intelligence (CTI) team and is an intelligence driven ... TTPs identified via hypothesis generation and informed by actionable cyber threat intelligence . 2. **SIEM... intelligence reporting and feeds into the threat hunting process as well as an operational more
    SAP (11/01/24)
    - Save Job - Related Jobs - Block Source
  • Lead SIEM Engineer

    KPMG (Philadelphia, PA)
    …future as we are, join our team. KPMG is currently seeking a Cyber Operations Content Development & Engineering to join our Enterprise Security Services ... is a remote work opportunity. Responsibilities: + Apply a thorough understanding of cyber security operations and monitoring to manage and perform the day-to-day … more
    KPMG (09/08/24)
    - Save Job - Related Jobs - Block Source
  • Security Data Analyst - Penn Presbyterian Medical…

    Penn Medicine (Philadelphia, PA)
    …operations team; including security monitoring, incident response, vulnerability management, threat intelligence , and reporting + Development and enhancement ... **Summary:** + The Security data analyst will be responsible for operational oversight providing leadership and expertise to the management of vulnerabilities,… more
    Penn Medicine (09/13/24)
    - Save Job - Related Jobs - Block Source
  • IT Security Associate Director - Security…

    Wolters Kluwer (Philadelphia, PA)
    …including but not limited to; Identity and Access Management, Cloud Security, Cyber Operations, Threat Intelligence , Vulnerability Management, (ex. IGA, ... experience with risk assessment, control development, control testing, and operational risk management practices. + Strong background with key technical… more
    Wolters Kluwer (09/28/24)
    - Save Job - Related Jobs - Block Source