- Leidos (Colorado Springs, CO)
- …teams to contain and eradicate threats. **Primary Responsibilities:** + Review DoD and open - source intelligence for threats. + Identify Indicators of ... operations team, responsible for: + Analyzing real-time cyber threat intelligence to stay ahead of emerging threats. + Correlating...Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated… more
- Gavin de Becker & Associates (San Antonio, TX)
- …or have worked in a law firm or an investigative firm. + You're familiar with Open Source Intelligence (OSINT) and computerized legal research. + You have an ... Investigations Division for candidates interested in pursuing a career in investigations and intelligence . This position is based in San Antonio, TX and will be a… more
- Golden Route Operations (Las Vegas, NV)
- …industry. + Gather and share advanced CTI (Cyber Threat Intelligence ) and OSINT ( Open - Source Intelligence ) to bolster Team defenses. + Support audits by ... providing documentation, responses, and remediation plans. + Evaluate third-party risks (vendors, contractors) through documentation reviews and assessments. + Contribute to security training and user awareness programs, including teaching cyber hygiene and… more
- Concentrix (Austin, TX)
- …will: + Proactively hunt for threats and undetected abuse by leveraging internal data, open - source intelligence , and third party private intelligence . + ... Execute complex investigations to understand how abuse is occurring and implement enforcement strategies to detect and mitigate harm. + Analyze and interpret large datasets to advance investigations, quantify trends or support findings. Execute complex… more
- Texas Instruments (Dallas, TX)
- …cloud security, data security, malware reverse engineering, security countermeasures, open - source intelligence , and technical writing. **Cybersecurity ... Engineering** : Responsible for protecting organizational assets, including infrastructure, networks, hardware devices, applications, and data from cyberattacks. This role will build your expertise in enterprise security, security controls, security testing,… more
- Texas Instruments (Dallas, TX)
- …cloud security, data security, malware reverse engineering, security countermeasures, open - source intelligence , and technical writing. **Cybersecurity ... Engineering:** Responsible for protecting organizational assets, including infrastructure, networks, hardware devices, applications, and data from cyberattacks. This role will build your expertise in enterprise security, security controls, security testing,… more
- RTX Corporation (Washington, DC)
- …and other security solutions to detect and prevent unauthorized transfers. + Apply Open - Source Intelligence (OSINT) techniques to gather and analyze publicly ... available information related to insider threats. + Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. + Articulate the implications of the risks relative to insider threats and educate… more
- The Walt Disney Company (Burbank, CA)
- …Media Research program, which includes working-level knowledge and experience with: conducting open source intelligence (OSINT) research, building queries to ... automate the collection of key words and phrases, producing tailored products, and collaborating with vendors to ensure the GSCC leverages best in class capabilities and industry trends. + **Travel Risk Management:** Experience in developing and overseeing a… more
- SOS International LLC (El Paso, TX)
- …public records and data tools, including **LexisNexis** , **CLEAR** , and other open - source intelligence (OSINT) platforms. The analyst will be responsible ... for collecting, analyzing, and interpreting large sets of data from a variety of public, proprietary, and commercial sources to support internal investigations, due diligence, risk assessments, and reporting needs. **Essential Job Duties** + Conduct… more
- Walmart (Bentonville, AR)
- …multi-accounting, collusion, GPS spoofing, and other platform abuses . Conduct OSINT ( Open - Source Intelligence ) research to uncover external fraud signals ... and validate suspicious identities . Review ID verification sessions for signs of tampering, biometric spoofing, or fake documentation . Analyze large datasets using Excel (VLOOKUPs, pivot tables, advanced formulas) and optionally SQL to detect fraud patterns… more