- Wells Fargo (Charlotte, NC)
- …assets, and operations. This position is at the forefront of threat detection, risk assessment, and strategic intelligence, transforming information into actionable ... security, IT, HR, legal, and executive leadership to share intelligence, coordinate threat mitigation efforts, and promote security awareness + Lead cross functional… more
- Cisco (Washington, DC)
- …read/understand exploit code, development skills, and think like an attacker. + Certified Threat Intelligence Analyst (CTIA) or GIAC Cyber Threat ... applicant may be performing work on FedRamp environments and partnering with researchers and threat intel teams that require they be a US Person (ie US citizen, US… more
- ManTech (Ashburn, VA)
- …(CISSP) and at least one of the following: SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Certified Incident Handler (GCIH), SANS GIAC Certified ... Seven (7+) years of professional experience with a solid understanding of incident response, insider threat investigations, forensics, cyber threats, and… more
- ICF (San Jose, CA)
- …and rapid response to incidents. + Oversee SOC training programs, ensuring analyst proficiency in threat detection, correlation, and response processes. + ... Elastic, Tenable, and SOAR platforms. + Knowledge of MITRE ATT&CK, DoD Cyber Threat Framework, and NIST 800-61 (Computer Security Incident Handling Guide). +… more
- BCMC (Arlington, VA)
- …and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, ... capabilities. Team personnel provide front line response for digital forensics/ incident response (DFIR) and proactively hunting for malicious cyber activity.… more
- MartinFederal Consulting, LLC (Huntsville, AL)
- …the following GIAC certifications: + GIAC Continuous Monitoring (GMON) + GIAC Certified Incident Handler (GCIH) + GIAC Forensic Analyst (GCFA) + GIAC Intrusion ... solve problems using the latest software like Splunk and Sentinel. Using threat monitoring, you'll work alongside multiple stakeholders to evaluate risk and make… more
- altafiber (Honolulu, HI)
- …Perform security research, furthering individual and team understanding of the threat landscape, as well as cutting-edge security technologies. + Attend security ... operations team including outages and incidents. Lead technical troubleshooting or incident handling events/calls on behalf of the client's security operations team… more
- Citigroup (Irving, TX)
- …+ Ensure high availability and optimal performance of the threat -modeling application through proactive monitoring, incident management, and ... the key engineer in supporting and advancing the platform used for threat -modeling process in Citi. The responsibilities will cover (among others) maintaining and… more
- V2X (Reston, VA)
- …Security Administrator + Penetration Testing Associate Mid-Level (3-7 Years Experience) + Incident Response Analyst + Cybersecurity Engineer + Cloud Security ... not limited to: Entry-Level (0-3 Years Experience) + Security Analyst + SOC Analyst (Tier 1 &...(7+ Years Experience) + Information Security Manager + Cyber Threat Intelligence Lead + Red Team Lead + Chief… more
- Noetic Strategies Inc. (Huntsville, AL)
- …+ Microsoft Sentinel + GIAC Continuous Monitoring Certification (GMON) + GIAC Certified Incident Handler (GCIH) + GIAC Certified Forensic Analyst (GCFA) + GIAC ... involving Splunk and Sentinel. BASIC QUALIFICATIONS: Minimum of 8+ years of Splunk/Cyber Threat experience. + Bachelor's in a computer science related field + Active… more