- Cipher Tech Solutions (Vienna, VA)
- …of information it is seeking to steal *How is it communicating with the author ( actor ) *Who that actor might be. Vaccination Notice: Please be aware that you ... are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements. Important Security Clearance Information:… more
- Cipher Tech Solutions (Tampa, FL)
- …of information it is seeking to steal *How is it communicating with the author ( actor ) *Who that actor might be. Vaccination Notice: Please be aware that you ... are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements. Important Security Clearance Information:… more
- Cipher Tech Solutions (Vienna, VA)
- …of information it is seeking to steal *How is it communicating with the author ( actor ) *Who that actor might be. Vaccination Notice: Please be aware that you ... are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements. Important Security Clearance Information:… more
- Amentum (Vienna, VA)
- …target development, such as identification of cyber-enabled crime networks that include actors and techniques that may represent a cyber threat to systemically ... in cryptocurrency, including global portfolios of virtual currencies, associated cyber actors and intrusion sets, and ransomware actors and infrastructure.… more
- Leidos (Ashburn, VA)
- …of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's ... for dissemination to stakeholders regarding high priority threat campaigns, malicious actors , APTs, emerging threats, etc. + Bring a comprehensive understanding,… more
- Lumen (Annapolis, MD)
- …to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors ... successfully identifying, tracking, and disrupting nation-state and cybercriminal threat actors . + Deep understanding of advanced threat hunting methodologies,… more
- Proofpoint (Carson City, NV)
- …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... an amazing, collaborative, industry-leading team focused on tracking threat actors , malware, phishing, and TTPs in order to develop...driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in… more
- Brookings (Washington, DC)
- …Fellowship and begin developing an impact strategy, identifying and engaging with local actors . Time commitment is roughly 15-20 hours a week during this phase. + ... CUE and the Global Economy and Development program. + Engage with key actors from the extended research, practice, and policy community within their home countries,… more
- Google (AL)
- …through tool creation, research on offensive techniques, incorporation of threat actor intelligence, internal presentations, and knowledge sharing. Part of Google ... Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique… more
- General Dynamics Information Technology (Fairfax, VA)
- …identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs). * 10 years' experience in ... collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and… more