- Palo Alto Networks (Dallas, TX)
- …within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary ... behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations. If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We… more
- Halliburton (Houston, TX)
- …the protection of critical infrastructure against cyber threats, such as malware , ransomware, and unauthorized access, while maintaining operational continuity. Job ... Duties Continued + Take a leading role in network security incident management, leveraging threat intelligence to mitigate threats and respond to incidents. + Continuously assess emerging security threats, propose strategies, and implement security solutions… more
- Google (Austin, TX)
- …with teams across Google to deliver bold solutions in abuse areas such as malware , spam and account hijacking. A team of Analysts, Policy Specialists, Engineers, and ... Program Managers, we work to reduce risk and fight abuse across all of Google's products, protecting our users, advertisers, and publishers across the globe in over 40 languages. The US base salary range for this full-time position is $129,000-$189,000 + bonus… more
- Celestica (Houston, TX)
- …tools and processes + Experience handling network security issues (viruses, malware , social engineering) + Understanding of IT Infrastructure asset lifecycle ... management + Plus: Understanding of NIST CSF and 800-171. **Physical Demands** + Duties of this position are performed in a normal office environment. + Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or… more
- Charles Schwab (Austin, TX)
- …to refine detection logic and reduce false positives. + Knowledge of MITRE ATT&CK, malware behaviors, and threat actor TTPs as they relate to endpoint security. + ... Advanced experience with scripting (PowerShell, CQL, Python, Bash) for automation and custom response actions. + Develop and report enterprise level metrics for endpoint security controls. + Architect solutions (initial state, transition, final state… more
- IBM (Austin, TX)
- …and data processing workflows . Protect organization against phishing, spoofing, malware , and advanced threats while maintaining user experience and compliance . ... Familiarity with Exchange, ProofPoint Email Solutions, Powershell, Azure, and M365 suite . Design, implement and maintain secure email solutions within the Microsoft 365 tenant and related servces . Moniotr and respond to email-related security incidents,… more
- OneMain Financial (Irving, TX)
- …more than one platform area (IDS/IPS, firewall/WAF, access and identity, malware defense, threat modeling, exposure management, among others), the Principal ... Cybersecurity Engineer is formally trained in enterprise IT design and architecture practices. + Collaborate with and mentor enterprise architects in security best practices, fostering a collaborative and high-performance work environment. + Prepare… more
- NANA Regional Corporation (Fort Hood, TX)
- …**Incident Response & Threat Management:** + Detect, investigate, and document malware , suspicious activities, and security incidents. Support CSIR, Army CERT, and ... OTC CERT in responding to incidents, and ensure timely notifications to appropriate personnel. **System Protection & Availability:** + Maintain the confidentiality, integrity, and availability of servers, desktops, and network devices. Manage security… more
- Google (Austin, TX)
- …**Responsibilities** + Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. + Identify ... security issues, and implement and design security controls, tools, and services to improve security systems and processes. + Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current… more
- Oracle (Austin, TX)
- …(including fuzzing, pen-testing), reverse engineering, dynamic monitoring of systems, or malware analysis + Experience in conducting security assessments + Knowledge ... of common exploitation countermeasures such as CFI, ASLR, etc. + Excellent programming skills in C, C++ and/or Python + Ability to work as part of a team as well as independently + Strong analytical skills combined with good communication skills and fluent… more