Featured Job
-
Job Removed or Not Found
Related Jobs
- Novo Nordisk Inc. (Plainsboro, NJ)
- …developing and implementing security controls and formulating operational risk mitigations. Relationships: Reports directly to the manager of Global Security Operations -
- Gong.io (New York, NY)
- …Security Operations Management: Oversee the Security Information and Event Management (SIEM) system, triaging alerts, and responding to security incidents effectively.
- Capgemini Government Solutions (Indianapolis, IN)
- …As a Senior Security Operations Analyst, you will: Work as part of a team of Information Security professionals supporting a global enterprise. Mentor less experienced
- Capgemini (Irving, TX)
- …Research and analyze emerging threats, utilizing the CTI lifecycle for daily collections. Curate and communicate intelligence on the cyber threat landscape, including
- Department of State - Agency Wide (Los Angeles, CA)
- …Applicants must meet all the required qualification requirements described below by the closing date of this announcement. NOTE: Applicants must meet time-in-grade and
- Booz Allen Hamilton, Inc. (Huntsville, AL)
- …1+ years of experience supporting a Computer Incident Response Team, Cyber Network Operations, or Security Operations Center (SOC) operations for a large and complex
- Zions Bank (Midvale, UT)
- …*Requires a Bachelor's and 2+ years of loss prevention, fraud investigations, prevention, regulatory, compliance functions and/or security area experience, preferably in
- Klaviyo (San Francisco, CA)
- …we hope you'll still consider applying. Want to learn more about life at Klaviyo? Visit careers.klaviyo.com to see how we empower creators to own their own destiny.
- Praescient Analytics (Arlington, VA)
- …Serve as a key support resource to NOSC and Subcommittee leadership, including the Subcommittee Chair Schedule, facilitate, and document meetings, capturing minutes, key
- NetSage (Annapolis, MD)
- …We are seeking Exploitation Analysts (EAs) to support our customer's missions. The analysts must possess the skills to analyze, map, protect, or discover vulnerabilities,