- Bank of America (Chicago, IL)
- …to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques. In support of these processes, ... the role will also include developing and documenting new and innovative threat hunt hypotheses to increase the team's ability to find existing threats that are otherwise going unidentified or unnoticed. The role will also be expected to actively share… more
- Boston University (Boston, MA)
- …focus on (b) stakeholder engagement through semi-structured interviews with critical actors in selected sectors, informed by the systematic literature reviews. ... Thematic analysis will capture how different stakeholders perceive barriers and risks, revealing both points of alignment and tension while mapping influence networks to identify strategic intervention opportunities. The third phase employs (c) technology… more
- Meta (Harrisburg, PA)
- …features and our protective frameworks that make life harder for bad actors on the Instagram platform. **Required Skills:** Product Security Engineer, Instagram ... Responsibilities: 1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products 2. Security Reviews: Perform manual design and… more
- Meta (Washington, DC)
- …We are seeking a security engineer to investigate sophisticated threat actors , advance investigative methods, automate and mature team processes through tooling ... and AI, drive innovative approaches to protecting people from offline harm, and lead across a group of cross-functional problems to find scaled solutions to counter the risk of coordinated adversarial threats. You will have the opportunity to work on some of… more
- Meta (Chicago, IL)
- …Financing (AML/CTF) laws, protect Meta's platforms from being abused by bad actors , and continue to enable and foster a safe environment for our ... users.Meta Payments Inc. is committed to complying with Anti-Money Laundering/Counter-Terrorist Financing ("AML"/"CTF") obligations imposed by federal, state, foreign, and other applicable laws. These governing laws and regulations may include without… more
- Cengage Group (Columbus, OH)
- …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
- HCA Healthcare (Nashville, TN)
- …Response Engineer 1 - serving as the last line of defense between HCA and the threat actors that wish to bring harm to HCA and the patients we serve - is a critical ... member of the 24/7 CDC team. They will use state of the art technologies to detect threats on our network and eradicate them as a member of our Cyber Defense Center (CDC). As a member of the CDC, they will operate along with a small team of like-minded… more
- University of Miami (Miami, FL)
- …agencies. + Assists with the training and preparation of standardized patients ( actors ) incorporated into course instruction. + Serves as course coordinator for ... on-site courses by managing time, overseeing instructors, and ensuring course goals and objectives are met. + Assists with equipment and supply inventory maintenance. + Participates in efforts to recruit qualified new adjunct and PETD instructors. +… more
- Meta (New York, NY)
- …and ongoing assessments, and review and analysis of potential activity by sanctioned actors . 5. Act as a liaison for State examinations and internal and external ... independent audits of MFT's and MPY's sanctions/OFAC compliance programs. 6. Responsible for responding to exam and audit findings, and overseeing the corrective action of any related compliance deficiencies or violations. 7. Responsible for maintaining and… more
- Meta (Menlo Park, CA)
- …protecting critical intellectual property and proprietary technologies from advanced threat actors 15. Ability to obtain and maintain US government security ... clearance 16. In-depth experience of one or more project and/or product management methodologies (for example: agile, PMI, product execution) 17. Track record of making risk based decisions using data to understand trends and support decision making 18. Track… more