- BlackRock (Wilmington, DE)
- …and indicators. + Intermediate knowledge of current threat landscape (threat actors , APT, cyber-crime, etc.). + Intermediate knowledge of security related ... technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc.). + Intermediate knowledge of Windows and Unix or Linux. + Intermediate knowledge of Firewall and Proxy technology. + Intermediate knowledge of malware operation… more
- Nightwing (Arlington, VA)
- …CTI + Conduct in-person and virtual briefings on vulnerabilities or threat actors + Identify intelligence gaps, specify collection requirements to fill gaps in ... information, and evaluate resulting intelligence requirements **Required Skills:** + US Citizenship + Must have an active TS/SCI clearance + Must be able to obtain DHS Suitability + 2+ years of directly relevant experience + Good understanding of intelligence… more
- Walmart (Bentonville, AR)
- …to learn new technologies and skills quickly. + Familiar with OT/IoT threat actors and their techniques **About Walmart Global Tech** Imagine working in an ... environment where one line of code can make life easier for hundreds of millions of people. That's what we do at Walmart Global Tech. We're a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world's… more
- Proofpoint (Sunnyvale, CA)
- …to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and ... protect people. Our BRAVE Values: At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow. We seek people who are bold enough to challenge the status quo, responsive in the face of… more
- Cengage Group (Detroit, MI)
- …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
- GovCIO (Alexandria, VA)
- …cyber threat profiles based on geographic region, country, group, or individual actors . Produces cyber threat assessments based on entity threat analysis. May ... provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques,… more
- BigBear.ai (WA)
- …network-based intelligence insights to counter national security threats and malicious actors . Our software developers will assist in crafting, testing, and ... recommending scalable, flexible, and resilient designs and implement integrations with a standard platform in a cloud environment. The ideal candidate will have experience in strategizing overall build tools and software to facilitate information and data… more
- BCMC (Arlington, VA)
- …CTI * Conduct in-person and virtual briefings on vulnerabilities or threat actors * Identify intelligence gaps, specify collection requirements to fill gaps in ... information, and evaluate resulting intelligence requirements Required Skills: * US Citizenship * Must have an active TS/SCI clearance * Must be able to obtain DHS Suitability * 2+ years of directly relevant experience * Good understanding of intelligence… more
- Leidos (Whitehall, OH)
- …outlining your findings. + Triage security alerts to rapidly identify malicious actors targeting customer networks. + Monitor and analyze DoD and open-source ... intelligence feeds to identify Indicators of Compromise (IOCs) and integrate them into security sensors and SIEMs. + Report security incidents to customers and USCYBERCOM, ensuring timely communication and coordinated response. **Required Qualifications:** +… more
- CACI International (Crane, IN)
- …and fuses the technical terminology explaining tactics used by threat actors . + Conducts requirements analysis, Scientific and Technical Intelligence (S&TI) ... research, and produces finished S&TI assessments on adversarial emerging and disruptive technologies with the potential to impact US military operations. + Prepares and provides S&TI products in support of Department of Defense concepts, capability… more