- Leidos (Ashburn, VA)
- …of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's ... for dissemination to stakeholders regarding high priority threat campaigns, malicious actors , APTs, emerging threats, etc. + Bring a comprehensive understanding,… more
- Palo Alto Networks (Santa Clara, CA)
- …of the threat landscape, including common attack vectors, malware techniques, and threat actor tactics is a plus. **The Team** To stay ahead of the curve, ... it's critical to know where the curve is, and how to anticipate the changes we're facing. For the fastest growing cybersecurity company, the curve is the evolution of cyberattacks, and the products and services that proactively address them. Our engineering… more
- ADM (Marshall, MN)
- …regional RCM and performance excellence teams to drive defect elimination and bad actor management processes to quickly improve asset downtime + Review and analyze ... asset performance data and maintenance history to identify trends, predict failures, and supports improvement plans to close gaps + Collaborate with and guide maintenance and operations teams to develop and refine preventative and predictive maintenance… more
- Wells Fargo (Columbus, OH)
- …that could be exploited by financially motivated criminals. + Lead threat actor attribution initiatives to improve prevention controls and enrich Financial Crime ... Investigators working complex cases. + Interface with multiple lines of businesses and protect customers from emerging and active threats. **Required Qualifications** : + 7+ years of Cyber Security Research experience, or equivalent demonstrated through one or… more
- Phillips 66 (Westlake, LA)
- …Documents and as directed by Supervision. + Assist Areas with troubleshooting and resolving Bad Actor in the Area. + Be a key member of the Area Reliability Team, ... making the Area aware of upcoming issues or trends in the data analysis. + Follow all Safety Procedures and Policies. + Follow the Industrial Hygiene Standards. + Follow all Work Procedures and Policies. **What You'll Bring (Required)** + Legally authorized to… more
- CVS Health (Woonsocket, RI)
- …models). **Deep expertise in:** * **Multi-agent system architectures** : Actor model frameworks, distributed consensus protocols, agent communication standards ... (FIPA-ACL, KQML, MCP, A2A), and coordination patterns (hierarchical, peer-to-peer, marketplace-based). * **LLM Integration Platforms** : OpenAI API, Anthropic Claude API, Azure OpenAI Service, Google Vertex AI, and on-premises LLM deployment (vLLM,… more
- Meta (Boston, MA)
- …be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You ... will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. **Required Skills:** Security Engineer - IR Threat… more
- Amazon (Culver City, CA)
- …A day in the life A Localization Executive must vet music clearances, actor contracts, IP rights, and title clearances before work commences, and account for ... edits in Special Compliance Territories that require care and sensitivity. A Localization Executive ensures receipt of source/target materials to maintain schedules and plan for contingencies whilst managing changes that need to be cascaded to downstream… more
- Palo Alto Networks (Santa Clara, CA)
- …firewall, web, database, and other log sources to identify evidence of threat actor activity. + Collaborate with clients and internal teams to provide strategic ... guidance and recommendations for long-term remediation and security posture improvement. + Develop and produce high-quality, client-facing deliverables, including detailed reports and executive summaries. + Provide mentorship and guidance to junior team… more
- Meta (Austin, TX)
- …Investigate reported escalations across multiple channels on Meta's services, disrupt bad actor networks and respond to sensitive global partners inquiries 3. Apply ... project management methodologies, techniques, and strategy development to effectively plan, execute and monitor projects and initiatives 4. Effectively convey results of technical/investigative work and mitigation measures to various audiences including… more