- Abbott (Abbott Park, IL)
- …and Standards. 2. Leverage security technologies and tools, such as SIEM, SOAR, and Cyber Threat Intelligence (CTI) tools to monitor and analyze security ... remotely in the US **What You'll Work On** 1. Lead the development and improvement of Security Operations processes,...across the organization. 5. Support the advancement of Lingo's cyber threat intelligence to ensure… more
- Lockheed Martin (North Charleston, SC)
- …to step up to one of today's most daunting challenges: the evolving threat of cyber warfare\. In Cyber & Intelligence , As a cyber security ... place to call home **WHAT WE'RE DOING:** Lockheed Martin, Cyber & Intelligence invites you to step...has an opportunity in Charleston, SC for a Deputy Lead Cyber Engineer supporting the National … more
- M&T Bank (Wilmington, DE)
- …methods for the integration and fusion of internal, external, and commercial threat intelligence sources. Build and refine correlation techniques to identify ... leveraging advanced tools and techniques to identify and mitigate cyber threats in real time through the collaborate with...sophisticated, multi-vector attacks, leveraging threat intelligence and behavioral analysis. + Continuously… more
- Tyto Athene (Ashburn, VA)
- …root causes, scope, and impact + Collaborate with cyber threat hunting and cyber threat intelligence teams + Serve as the primary incident point of ... **Description** Tyto Athene is searching for a ** Cyber Defense Forensics Lead ** to support...cybersecurity experience with strong expertise in incident response, insider threat investigations, forensics, and threat analysis. +… more
- Black & Veatch (Cary, NC)
- …detection routines, assimilating open-source threat intelligence , generating actionable cyber threat intelligence , and leading incident response and ... threat intelligence feeds. + Generate internal cyber threat intelligence reports and...security alerts and determine their impact and severity. + Lead incident response efforts including containment, eradication, and recovery.… more
- General Dynamics Information Technology (Springfield, VA)
- …Required:** Yes **Job Description:** Seize your opportunity to make a personal impact as a Cyber TSCM Lead supporting our intelligence customer. GDIT is your ... career. At GDIT, people are our differentiator. As a Cyber TSCM Lead you will help ensure...Generate finished correspondence, documents, briefing materials, spread sheets and threat reports in accordance with customer guidelines, as required… more
- Deloitte (New York, NY)
- …parties to deliver against expectations. + Familiarity with Threat Hunting and Cyber Threat Intelligence fundamentals. + Proficiency in data fabric ... Cyber Google Security Operations Manager Position Summary Our...by transforming security operations, monitoring technology, data analytics, and threat intelligence . Helps manage and protect dynamic… more
- Proofpoint (Sunnyvale, CA)
- … Assessment:** + Proactively hunt for hidden threats within enterprise networks using threat intelligence and behavioral analytics. + Develop and refine ... high-severity security incidents within the global 24/7 SOC. + Lead complex investigations into advanced cyber threats,...US Citizen. + Strong background in SOC operations, SIEM, threat intelligence , and digital forensics. Expertise in… more
- Bank of America (Charlotte, NC)
- …cause analysis to inform future prevention and response. + Collaborate with threat intelligence , response teams, and vulnerability management teams to enhance ... Cyber Incident Response & Management Co- Lead ...security incidents and crisis communications. + Deep understanding of threat landscapes, attack vectors, and mitigation strategies. + Strong… more
- MUFG (Jersey City, NJ)
- …+ Collaboration and Innovation: Work closely with cross-functional teams, including Threat Intelligence , Incident Response, Forensics and Security Operations to ... team will provide more details. **Job Summary:** As a Threat Detection and Response Engineer you will occupy a...security frameworks. Your expertise with this framework and the cyber security kill chain will form the foundation where… more