- TD Bank (Mount Laurel, NJ)
- …for this role. **Line of Business:** Technology Solutions **Job Description:** This role is for Senior Threat Intelligence Analyst for the Threat ... a variety of intelligence functions, to include cyber , fraud, geopolitical and insider threat domains....and coordinate intelligence operations within the Singapore Threat Intelligence Group supporting the Regional Operations.… more
- SAP (Newtown Square, PA)
- …of technology and remains a trusted partner for businesses worldwide. SAP is seeking a Senior Cyber Threat Hunt analyst to run a world-class capability ... Threat Hunt capability is aligned to SAPs Cyber Threat Intelligence (CTI) team...SAP Global Security and Compliance (SGSC) organization. As a Senior Cyber Threat Hunter at… more
- West Pharmaceutical Services (Exton, PA)
- …design, network security, cloud/mobile security, data security and internal/external threat intelligence /analysis. + Cultural alignment - unwavering ethical ... Senior Manager, Internal Audit Requisition ID: 66896 Date:...of risk areas including Enterprise Risk Management, ESG reporting, Cyber security, etc. We are seeking someone with a… more
- JPMorgan Chase (Wilmington, DE)
- …recommendations - making data-driven decisions that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about ... As an Assessments & Exercises Vice President in the Cyber and Tech Controls line of business, you will...management. Engage with peers and industry groups that share threat intelligence analytics **Required qualifications, capabilities, and… more
- Vanguard (Malvern, PA)
- … Cyber Security Operations Center, get ahead of threats with our threat intelligence teams, perform security assessments with our penetration testing group, ... world, and eager to develop their technical expertise in Cyber Security while building their leadership skills. The program...environments + Build a network with program managers, alumni, senior leaders and peers + Demonstrate the ability to… more
- Wolters Kluwer (Wilmington, DE)
- …including but not limited to; Identity and Access Management, Cloud Security, Cyber Operations, Threat Intelligence , Vulnerability Management, (ex. IGA, ... reporting. + Establish and maintain cybersecurity metrics, KPIs, and KRIs for senior leadership and both technical and non-technical partners. + Serve as a… more