• IT Cybersecurity Analyst - Threat Intel

    CommonSpirit Health (Englewood, CO)
    …media, and dark web forums. + Actively research and track specific threat actors , malware, campaigns, code families, and infrastructure. + Analyze threat data using ... structured analytical techniques and employ predictive analytic methods to determine changes in adversaries' capabilities, motivations, and intent. + Maintain continuous situational awareness of the cyber threat landscape and emerging threats relevant to the… more
    CommonSpirit Health (11/20/25)
    - Related Jobs
  • Technical Investigations Manager

    Securitas Security Services USA, Inc. (Abilene, TX)
    …to include knowledge of methods, techniques and practices used by hostile actors , competitors, and nation states + Understanding of the electromagnetic spectrum, and ... RF interrelationships and characteristics as they relate to the design and operation of electronic, electromechanical and computer systems; + Hands-on experience in the operation and use of electronic instrumentation such as multimeters, oscilloscopes,… more
    Securitas Security Services USA, Inc. (11/20/25)
    - Related Jobs
  • Sr. Technical Project Manager

    Proofpoint (Helena, MT)
    …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... protect people. Our BRAVE Values: At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow. We seek people who are bold enough to challenge the status quo, responsive in the face of… more
    Proofpoint (11/19/25)
    - Related Jobs
  • Customer Success Specialist, New England/PA…

    Cengage Group (Boston, MA)
    …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
    Cengage Group (11/19/25)
    - Related Jobs
  • Sr Product Manager

    Cengage Group (Boise, ID)
    …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
    Cengage Group (11/19/25)
    - Related Jobs
  • Cyber Shift Lead - Night Shift

    Leidos (Whitehall, OH)
    …outlining your findings. + Triage security alerts to rapidly identify malicious actors targeting customer networks. + Monitor and analyze DoD and open-source ... intelligence feeds to identify Indicators of Compromise (IOCs) and integrate them into security sensors and SIEMs. + Report security incidents to customers and USCYBERCOM, ensuring timely communication and coordinated response. + **Team Leadership &… more
    Leidos (11/19/25)
    - Related Jobs
  • Learning & Career Enablement Intern

    New York Times (New York, NY)
    …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
    New York Times (11/19/25)
    - Related Jobs
  • Professional Services Consultant - Data Security

    Proofpoint (Houston, TX)
    …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... protect people. Our BRAVE Values: At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow. We seek people who are bold enough to challenge the status quo, responsive in the face of… more
    Proofpoint (11/19/25)
    - Related Jobs
  • Cyber Analyst II - Information Systems Security…

    BAE Systems (Boulder, CO)
    …+ May perform duties as a cyber security threat hunter; track threat actors ; responsible for reviewing system log events and data packets to proactively detect ... advanced threats that evade traditional security solutions; participate in developing processes, procedures, and training for new technologies. + Identify and manage Plan of Action & Milestones (POA&Ms) through remediation as well as develop corrective action… more
    BAE Systems (11/19/25)
    - Related Jobs
  • Sr. Technical Account Manager

    Proofpoint (Richmond, VA)
    …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... protect people. Our BRAVE Values: At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow. We seek people who are bold enough to challenge the status quo, responsive in the face of… more
    Proofpoint (11/19/25)
    - Related Jobs