Featured Job
-
Job Removed or Not Found
Related Jobs
- Sony Pictures Entertainment (Culver City, CA)
- …Strategic Leadership: Develop, implement, and mature a holistic cyber threat intelligence program tailored to the entertainment industry, covering content security,
- Control Risks (Washington, DC)
- …Client Engagement Lead scoping conversations with existing and prospective clients as a subject matter expert. Provide insight into how OTI deliverables can bring value
- Novo Nordisk Inc. (Plainsboro, NJ)
- …developing and implementing security controls and formulating operational risk mitigations. Relationships: Reports directly to the manager of Global Security Operations -
- Strategic Analysis (Arlington, VA)
- …*Threat Analysis: Analyze intelligence related to foreign espionage, insider threats, and counterintelligence risks. *Investigative Support: Provide analytical support to
- CRM Force (New York, NY)
- …No sponsorship available. Type of job: Full-time salary. No C2C. Compensation: Base salary + Performance Bonuses based on renewals, retention + company pays 100% of all
- Insight Global (Richmond, VA)
- …including threat intelligence, vulnerability management, incident response, and the design, implementation, and tuning of defensive security controls. In this role, you
- Obsidian Security (Palo Alto, CA)
- …Own product strategy and roadmap for AI-based cybersecurity products (eg, threat detection, behavior analytics, anomaly detection, threat intelligence, etc.). Partner
- Schneider Electric (Boston, MA)
- …Monitor and Analyze Security Telemetry Continuously monitor telemetry from OT-specific sensors, IT-Specific Sensors, SIEM platform, and Network Security tools to detect
- CACI International, Inc. (Tampa, FL)
- …As a CACI Cyber Operations Planner supporting the SOCCENT Irregular Warfare Directorate, your responsibilities may include, but are not limited to: Conducting detailed,
- Amazon (San Diego, CA)
- …*Complete risk analyses using complex data sets (SQL, Python, R etc.). *Use high-level judgment to own our most complex risk mitigation and security policy compliance