- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- Bank of America (Denver, CO)
- …implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Typically has 3-5+ years ... of relevant experience and will act as an individual contributor. This position will be a member of the GIS Vulnerability Identification Assurance (VIA) Vulnerability Identification QC (Quality Control) team. In this role, you will help implement, manage, and… more
- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- State of Colorado (Lakewood, CO)
- …Include, briefly, the facts of the incident, motivations, implications for public safety actors , and how it may impact risk of targeted violence in Colorado in ... the future. Please limit the analysis to no more than two pages, single spaced, 12 point font and acknowledge that you have attached this to your application. + Yes + No 04 Positions within the Colorado Department of Public Safety require a comprehensive… more
- New York Times (New York, NY)
- …they may even make fraudulent employment offers. This is done by bad actors to collect personal information and money from victims. All legitimate job opportunities ... from The New York Times will be accessible through The New York Times careers site (https://www.nytco.com/careers/) . The New York Times will not ask job applicants for financial information or for payment, and will not refer you to a third party to do so. You… more
- Metro One Loss Prevention Services Group (Philadelphia, PA)
- …. Limit losses from theft by discouraging criminal behavior and holding bad actors accountable for any damage caused through loss of product. . APOs look ... for patterns of suspicious behavior and closely observe shoppers. . Relies on Customer Service and Observation skills. Qualifications and Requirements: . Must be at least 21 years old. . High school diploma or equivalent (GED) required. . Must be legally… more
- Coinbase (Salt Lake City, UT)
- …connects the world and a strong desire to protect good users from bad actors . You are motivated by the challenges of fighting fraud, detecting scams, preventing ... account takeovers, and generally thwarting "baddies." You exhibit our core cultural values: add positive energy, communicate clearly, be curious, and be a builder. * *Deep AI/ML Expertise:* Expertise in one or more areas of applied AI/ML (eg, Risk ML, Gradient… more
- Carnegie Mellon University (Pittsburgh, PA)
- …Preference for those with experience working with large scale data, millions of actors and messages. Successful candidates will work on at least two related ... agent-based simulation and empirical analysis projects, develop and run virtual experiments, analyze existing social media data, document results, write papers with Dr. Carley and possibly relevant PhD students, and present those results in the IDeaS… more
- Leidos (Washington, DC)
- …and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The selected ... candidate will be responsible for the following: Support the ITP network infrastructure, perform all routine maintenance activities, provide guidance on upgrades and system recapitalization, perform availability/capacity management. Oversee High Speed Guard… more