- BASF (Houston, TX)
- …and improve Asset Effectiveness (ie Equipment Strategies, Criticality Assessment, Bad Actor Program, FMEA, RBI, RBM, RCM, Reliability Roadmap). + Being responsible ... for the interpretation and adherence to BASF Technical Standards, industry standards (ISA 84 or IEC 61508/11, NEC, NFPA), and applicable regulatory and design codes, as applicable to specific projects and/or site initiatives. **If you have ** + A Bachelor… more
- Google (Addison, TX)
- …through tool creation, research on techniques, incorporation of threat actor intelligence, internal presentations, and knowledge sharing.Part of Google Cloud, ... Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of… more
- DR Horton, Inc. (Arlington, TX)
- …Infrastructure and Applications * Advanced knowledge of Cyber Attackers and Threat Actor tactics * Advanced experience of project management and delegation * ... Advanced business communication and collaboration skills * Advanced Documentation skills * Ability to work with teammates on projects * Ability to work alone and accomplish tasks independently * Ability to interpret research into solutions to actual problems *… more
- 3M (Austin, TX)
- …and log correlation techniques + Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK + Strong analytical and ... problem-solving skills with attention to detail + Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms + Skilled in correlating data from multiple sources to identify and escalate confirmed threats + Proficient in… more
- GAP Solutions Inc (Fort Bliss, TX)
- …Contractor shall perform all work identified to professional writer and actor theatrical standards. + The Contractor shall schedule FAP training/courses, coordinate ... location for training/courses, prepare instructional materials, set-up classroom location, and clean-up after training/courses. The Contractor shall distribute customer-satisfaction surveys at the conclusion of FAP training courses and workshops and summarize… more
- Leidos (Fort Worth, TX)
- …analysts and intelligence community partners to identify vulnerable malign actors and operational response opportunities. + Creating comprehensive network diagrams ... and visualizations of state and non-state threat actors using All-source intelligence and analytic tools. + Demonstrating mastery of analytic methodologies and… more
- Proofpoint (Dallas, TX)
- …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and… more
- Amazon (Austin, TX)
- …sources and use that information to develop an understanding of sophisticated actors and their tools, techniques, and procedures. We then leverage that understanding ... drive the supporting capabilities. A deep understanding of current cyber threat actors and TTPs as well as experience performing question-driven analysis is… more
- Proofpoint (Dallas, TX)
- …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and… more
- Google (Austin, TX)
- …abuse challenges and exploited vulnerabilities to uncover tactics used by malicious actors . + Streamline Trust and Safety escalates across Workspace and develop ... strong internal and external partnerships for feedback integration. + Collaborate with cross-functional teams (Engineering, Product Managers, Program Managers, Data Scientists) to develop and implement effective counter-abuse strategies. + Conduct end-to-end… more