- WestRock Company (West Point, VA)
- …* Trains area personnel in key mill reliability techniques (Bad Actor Analysis, Equipment Strategy Development, Root Cause Analysis, Reliability Fundamentals). These ... include processes and guidelines developed within the Engineering Manufacturing Services (EMS) * Develops and monitors Key Performance Indicators (KPI) to determine the value of the mill reliability effort. * Provides leadership in implementing and maintaining… more
- Perdue Farms, Inc. (Bridgewater, VA)
- …+ Assist in downtime analysis and reporting to determine "bad actor " assets, performance trends and identify capacity improvement opportunities + Participate ... in root cause analysis efforts to address equipment failures and propose corrective actions. + Contribute to preventative maintenance optimization and failure mode effects analysis, including review and updating of PM schedules in EAM/CMMS. + Assist with CMMS… more
- Vanguard (Malvern, PA)
- …threat identification, analysis and action. + Expert knowledge in threat actor tactics, techniques and procedures, blending technical capabilities with kinetic and ... insider threats to ensure a holistic understanding of threat scenarios that could impact Vanguard's crew, assets or locations. + Documented experience in crisis management, crisis communications and managing incident response for events that had… more
- University of Maryland, Baltimore (Baltimore, MD)
- …a Standardized Patient/PETA/GUTA, a health professional, an instructor, or an actor experience working with Zoom or similar teleconferencing platforms preferred. ... OTHER:Except for qualifications established by law, additional related experience and formal education in which one has gained the knowledge, skills, and abilities required for full performance of the work of the job class may be substituted for the education… more
- Leidos (Ashburn, VA)
- …compliance with relevant cybersecurity regulations and standards + Identify threat actor TTPs, post-compromise behaviors, and insider threats through data analysis + ... Create and modify SIEM dashboards to visualize findings and monitor activity + Drive implementation and enhancement of tools, frameworks, and methodologies + Promote best practices in incident response, cybersecurity analysis, case management, and SOC… more
- NVR (Reston, VA)
- …+ Develop custom tools, scripts, and exploits to simulate sophisticated threat actor techniques. + Collaborate with Blue Team and SOC to improve detection ... and response capabilities. + Provide detailed reports and executive summaries of findings, including risk ratings and remediation guidance. + Contribute to the development of threat scenarios and tabletop exercises for incident response readiness. + Stay… more
- Meta (Providence, RI)
- …3. Meta advertising policy and human review protocol development focusing on actor -level contents and behaviors with deep knowledge in assets interaction models, ... operational maturity, limitations, efficiencies and tradeoffs 13. 4. Operational process development with end-to-end enforcement- appeals infrastructure process, policy/process development, escalations and investigations of advertising assets to determine if… more
- TAI (Baltimore, MD)
- …data + Identifies and scopes potential reliability improvement projects and conducts Bad Actor analysis + Performs FMEA's and RCFA's to ensure long term maintenance ... equipment problems are appropriately investigated with solutions implemented. + Participates in Process Hazard Analysis (PHAs) including GMP and PSSR and Management of Change (MOCs) + Manages small projects including contract bidding and supervision to… more
- Research Foundation CUNY (New York, NY)
- …train and supervise staff to implement projects + Train and supervise actor -teachers and educators to ensure program activities comply to contract mandates, and ... that high program quality is maintained + Plan and lead training sessions with educators as required + Orient staff on CUNY/CAT protocols - sick leave, timesheets - office protocols and space - email, equipment use, health benefits orientation, fingerprinting,… more
- IBM (Austin, TX)
- …incident investigation and containment activities. * Familiarity with cyber threat actor behaviors, including common tactics, techniques, and procedures (TTPs). * ... Experience using endpoint and network security tools (eg, CrowdStrike, Microsoft Defender for Endpoint) to support incident detection and response. * Basic understanding of enterprise network infrastructure and security controls, such as firewalls, proxies,… more
Recent Jobs
-
Principal Enterprise Security Architect
- Global Foundries (Malta, NY)
-
Quality Assurance Specialist
- Catalent Pharma Solutions (Greenville, NC)
-
Training Specialist 1
- ThermoFisher Scientific (Lenexa, KS)
-
Senior Cyber Architect
- BAE Systems (San Diego, CA)