- Cisco (San Jose, CA)
- …tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors . **Meet the Team** You will be a part of our Cisco Security Innovation ... team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will… more
- Texas Tech University (Lubbock, TX)
- …equipment for projects including the peripheral equipment. + Management of the shoot, actors , props, and scene. + Proficient mastery of the Adobe Creative Suite ... software for post-production. + Experience editing in the Adobe Creative Suite (primarily Lightroom, Photoshop, and Premiere). + Time management skills for scheduling shoots and for post-production. + Ability to work in a team-oriented, creative environment.… more
- Carle Health (Danville, IL)
- …Danville can be found in the heart of Vermilion River country. The hometown of actors Dick Van Dyke and Gene Hackman, Danville is also home to quality museums, ... quaint shops, several Abraham Lincoln historic sites, Danville Area Community College and several state parks with an abundance of wildlife. Residents and visitors alike enjoy beloved events such as Arts in the Park, The Festival of Trees, Balloons Over… more
- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- Capital One (New York, NY)
- …use their debit cards to spend and manage their money, and impossible for bad actors to do so. To accomplish this, we build the intelligent data-driven brain behind ... authorizations, managing the policies, models, and data integrations that power our automated decisions. We are a team of strategists, builders, and customer advocates who thrive on solving complex problems at the intersection of technology, data, and human… more
- BOOZ, ALLEN & HAMILTON, INC. (Washington, DC)
- …analysis tools to bulk and raw tra nsa ctional data of transnational organized crime actors + Knowledge of the EURASIA AOR + Ability to work in a collaborative ... environment and manage multiple tasks simultaneously Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; TS/SCI clearance is required. Compensation At… more
- Leidos (Washington, DC)
- …and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The selected ... candidate will be responsible for the following: + Support the User Activity Monitor Software solution, executing all updates, changes, deployments, and other sustainment activities. + Support UAM maintenance activities to ensure proper functionality and… more
- ARSIEM (Arlington, VA)
- …and procedures of various criminal, insider, hacktivist, and nation-state threat actors to identify and validate threats + Applying cybersecurity concepts to ... the detection and defense of intrusions into small and large-scale IT networks, and conducting a cursory analysis of log data. + Conducting a cursory analysis of log data + Monitoring external data sources (eg, Computer Network Defense vendor sites, Computer… more
- Novo Nordisk (Plainsboro, NJ)
- …threat hunting activities utilizing search techniques and well known TTP of threat actors + Utilize threat intelligence indicators and Mitre ATT&CK framework to form ... hunt searches looking for malicious activity + Inform and conduct triage of any findings + Contribute to and/or develop content (SIEM) recommendations + Engage in improving Novo Nordisk infrastructure security + Establishment and maintenance of relationships… more