- Lockheed Martin (North Charleston, SC)
- …to step up to one of today's most daunting challenges: the evolving threat of cyber warfare\. In Cyber & Intelligence , As a cyber security ... place to call home **WHAT WE'RE DOING:** Lockheed Martin, Cyber & Intelligence invites you to step...has an opportunity in Charleston, SC for a Deputy Lead Cyber Engineer supporting the National … more
- M&T Bank (Wilmington, DE)
- …methods for the integration and fusion of internal, external, and commercial threat intelligence sources. Build and refine correlation techniques to identify ... leveraging advanced tools and techniques to identify and mitigate cyber threats in real time through the collaborate with...sophisticated, multi-vector attacks, leveraging threat intelligence and behavioral analysis. + Continuously… more
- Tyto Athene (Ashburn, VA)
- …root causes, scope, and impact + Collaborate with cyber threat hunting and cyber threat intelligence teams + Serve as the primary incident point of ... **Description** Tyto Athene is searching for a ** Cyber Defense Forensics Lead ** to support...cybersecurity experience with strong expertise in incident response, insider threat investigations, forensics, and threat analysis. +… more
- Black & Veatch (Cary, NC)
- …detection routines, assimilating open-source threat intelligence , generating actionable cyber threat intelligence , and leading incident response and ... threat intelligence feeds. + Generate internal cyber threat intelligence reports and...security alerts and determine their impact and severity. + Lead incident response efforts including containment, eradication, and recovery.… more
- General Dynamics Information Technology (Springfield, VA)
- …Required:** Yes **Job Description:** Seize your opportunity to make a personal impact as a Cyber TSCM Lead supporting our intelligence customer. GDIT is your ... career. At GDIT, people are our differentiator. As a Cyber TSCM Lead you will help ensure...Generate finished correspondence, documents, briefing materials, spread sheets and threat reports in accordance with customer guidelines, as required… more
- Deloitte (New York, NY)
- …parties to deliver against expectations. + Familiarity with Threat Hunting and Cyber Threat Intelligence fundamentals. + Proficiency in data fabric ... Cyber Google Security Operations Manager Position Summary Our...by transforming security operations, monitoring technology, data analytics, and threat intelligence . Helps manage and protect dynamic… more
- SAIC (Broomfield, CO)
- **Description** **Job Description:** We are seeking a highly skilled and experienced Lead Cyber Engineer to oversee a dynamic team of engineers and subject ... the operations of missile tracking satellites. **Key Responsibilities:** + Lead and manage a team of cyber ...of a team. + Experience with incident response and threat management. Target salary range: $160,001 - $200,000. The… more
- Bank of America (Charlotte, NC)
- …cause analysis to inform future prevention and response. + Collaborate with threat intelligence , response teams, and vulnerability management teams to enhance ... Cyber Incident Response & Management Co- Lead ...security incidents and crisis communications. + Deep understanding of threat landscapes, attack vectors, and mitigation strategies. + Strong… more
- Proofpoint (Sunnyvale, CA)
- … Assessment:** + Proactively hunt for hidden threats within enterprise networks using threat intelligence and behavioral analytics. + Develop and refine ... high-severity security incidents within the global 24/7 SOC. + Lead complex investigations into advanced cyber threats,...US Citizen. + Strong background in SOC operations, SIEM, threat intelligence , and digital forensics. Expertise in… more
- MUFG (Jersey City, NJ)
- …+ Collaboration and Innovation: Work closely with cross-functional teams, including Threat Intelligence , Incident Response, Forensics and Security Operations to ... team will provide more details. **Job Summary:** As a Threat Detection and Response Engineer you will occupy a...security frameworks. Your expertise with this framework and the cyber security kill chain will form the foundation where… more