- Dentons US LLP (Chicago, IL)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Carnegie Mellon University (Pittsburgh, PA)
- …engineering and design concepts? + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded...artificial intelligence and machine learning?and using artificial intelligence to support reverse engineering and malware … more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
- altafiber (Honolulu, HI)
- …(APT) and crimeware threat program + Knowledge of information security threat types, their composition, and IOCs Dynamic Malware Analysis Experience. + ... Perform security research, furthering individual and team understanding of the threat landscape, as well as cutting-edge security technologies. + Attend security… more
- Tyto Athene (Ashburn, VA)
- …enforcement customer in Ashburn, VA. In this role, you will work closely with threat hunters, threat analysts, and an established SOC-playing a critical part in ... agency tools and technologies used for vulnerability testing, scanning, and threat identification. + Review and update vulnerability management plans, policies, and… more
- Tyto Athene (Ashburn, VA)
- …and maintain advanced security technologies, collaborate with security operations and threat hunting teams, and scale solutions that defend against emerging global ... security platforms, including: + Layer 2/Layer 3 network devices + Network Admission Control (NAC) and 802.1x + Firewalls, IDS/IPS, VPN solutions, WAFs, and content… more
- Bank of America (Chicago, IL)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
- Sandia National Laboratories (Albuquerque, NM)
- …and Authorization + Cryptography + Side Channel Analysis + Failure Analysis + Threat intelligence + Modeling, simulation, and emulation + Data science, ... to help address the country?s most pressing national security needs. In the Threat Intelligence Center, the mission of the Information Operations Program is… more
- Guardian Life (Bethlehem, PA)
- …and creative manner to address cyber incidents + Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies. ... situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity… more
- Bank of America (Addison, TX)
- …focus on malware /tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around ... Senior Red Team Developer - Adaptive Threat Simulation Chicago, Illinois;Washington, District of Columbia; Charlotte, North Carolina; Jacksonville, Florida; Denver,… more
- Carnegie Mellon University (Pittsburgh, PA)
- …engineering and design concepts + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware … more
- PSEG (Newark, NJ)
- …Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting. (S)he ... Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting for all… more
- Bluehawk LLC (HI)
- …damaged, or manipulated data and transform technical findings into actionable intelligence . Analysts contribute directly to cyber threat understanding, adversary ... Cyber (J6/Cyber) + Provides ad hoc briefings and contributes to general military intelligence products. Cyber Threat Analysis & Assessment + Conducts predictive … more
- General Dynamics Information Technology (St. Louis, MO)
- …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
- Mallinckrodt Pharmaceuticals (Bridgewater, NJ)
- …the organization. + Maintain relationships and connectivity with industry peers, relevant threat intelligence sources, and regulatory agencies to collaborate and ... and systems infrastructure, and security-related tools such as whitelisting, IDS/IPS, anti- malware , patch management, baselining, SIEM, access control , and… more
- Noblis (Chantilly, VA)
- …investigations + Memory analysis and disk forensics in adversarial environments + Threat intelligence platforms and integration + Encryption and obfuscation ... teams responding to sophisticated cyber threats + Conduct analysis of case and intelligence related cyber data to develop advanced analytical tools + Configure and… more
- Auburn University (Auburn, AL)
- … Hunting:** Conduct in-depth threat hunting and develop actionable threat intelligence for state and critical infrastructure partners. **Automation and ... (ISAC ) environment. The Senior Analyst is responsible for advanced threat hunting, incident leadership, automation initiatives, and operational support for state… more
- Travelers Insurance Company (St. Paul, MN)
- …detection, response and disruption of cybersecurity events across Travelers through threat intelligence gathering, detection, and techniques to assess, support, ... base, including creating, maintaining, and enforcing standard operating procedures (SOPs), threat intelligence , and other documentation. + Develop metrics and… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...options and effects for our nation in an ever-changing threat environment. Our team provides a full range of… more
- JPMorgan Chase (Plano, TX)
- …recommendations - making data-driven decisions that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about ... and risk management. Engage with peers and industry groups that share threat intelligence analytics. **Required qualifications, capabilities, and skills** +… more