- JPMorgan Chase (Columbus, OH)
- …various business functions. **Job responsibilities:** + Help deliver world class Phishing and malware protection solutions for enterprise mailing systems + Execute ... in cyber security, infrastructure engineering, especially malware protection and phishing domains + Excellent understanding of platform engineering and integration… more
- Insight Global (Columbus, OH)
- …working experience in Cybersecurity, Governance, or Risk and Compliance Knowledge of anti- phishing software (such as Microsoft ATP, Armorblox) as well as best ... practices to address phishing threats Ability to analyze and respond to previously undisclosed software and hardware vulnerabilities. Knowledge of vulnerability… more
- Optiv (Cleveland, OH)
- …Security Information and Event Management (SIEM), end-point security products, email/ phishing products, and case management/knowledge management systems such as ... Service NOW. + Creating and maintaining documentation for all playbooks, scripts, integrations, etc. + Excellent time management, reporting, and communication skills. + Superior developer problem-solving skills. + Experience working with Internal and client… more
- Signature Aviation (Cleveland, OH)
- …greeting + Drive cars, vans or other shuttles + Ability to detect phishing attempts and avoid attempts by others to infiltrate the Company computer network ... through practicing safe computer use and complying with company IT policies + Independently and proactively (i) anticipate customer needs/requests, (ii) perform open job tasks, and (iii) immediately speak up and/or point out observed safety concerns to all… more
- JPMorgan Chase (Columbus, OH)
- …record in cybersecurity assessments, to include social engineering operations like phishing and vishing. Additionally, the candidate will be able to demonstrate ... a general knowledge of computer networking fundamentals, modern threats and vulnerabilities, attack methodologies, and penetration testing tools. The Cybersecurity Red Team consists of highly skilled and qualified members who conduct advanced adversary… more
- MCPc Holdings, Inc. (Cleveland, OH)
- …Authentication + Identity & Access Management + Insider Threat Detection + Training/ Phishing Tests Managed Security Solutions + Cyber-as-a-Service and Virtual CISO + ... Managed Patching + Endpoint Detection & Response + Managed SIEM + Managed Backup + Help Desk All managed and monitored in wholly owned and operated 24/7/365 US security operations centers. Incident Response + Contain & Control + Threat Elimination & Disaster… more
- Kelly Services (Mason, OH)
- …General Compliance2. HIPAA3. Fraud, Waste, and Abuse4. Security Essentials5. Introduction to Phishing **What happens next:** Once you apply, you'll proceed to the ... next steps if your skills and experience look like a good fit. But don't worry-even if this position doesn't work out, you're still in our network. That means all our recruiters at Kelly will have access to your profile, expanding your opportunities even more!… more
- Proofpoint (Cleveland, OH)
- …detections for email-based threats. You'll research an ever-changing landscape of phishing , malware, and exploits to create network and file-based signatures to ... detect same. As a Proofpoint Senior Threat Detection Engineer, you will perform in-depth malware analysis and spend time searching through open source as well as internal data to facilitate signature creation, analyzing threats, and make that information… more
- Ameresco (OH)
- …any other domain is fraudulent. Report suspected phishing to 1-866-AMERESCO. Equal Opportunity/Affirmative Action Employer/Women/Minorities/Veteran/Disability. ... Energy careers at Ameresco bring employees to the forefront of new energy technology with the backing of an experienced team of energy efficiency and renewable energy engineers and professionals. Ameresco is a recognized leader throughout North America and… more
- GE Aerospace (Evendale, OH)
- …training, and exercise, including security awareness programs, penetration testing, phishing simulations, tabletops, and red-team exercises. + Maintain and improve ... security and cybersecurity legal processes and procedures, including incident response plans, and advise on other relevant policies, procedures, playbooks, and standards. + Collaborate with internal teams on cross-functional projects related to a wide range of… more