• SOC Analyst

    Insight Global (Melbourne, FL)
    …log analysis. Understanding of predominant cyber-attack vectors (Buffer Overflow, Phishing , etc.) Security+ Certification or equivalent certification null We are ... a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates… more
    Insight Global (05/31/24)
    - Related Jobs
  • Security Engineer

    Motion Recruitment Partners (Fort Lauderdale, FL)
    …Exploitation frameworks: Metasploit, CANVAS, Core Impact + Social Engineering campaigns: email phishing , phone calls, SET + Deep understanding of OSI model and OWASP ... + Security devices: Firewalls, VPN, AAA systems + OS Security: Unix/Linux, Windows, OSX + Understanding of common protocols: HTTP, LDAP, SMTP, DNS + Web application infrastructure: Application Servers, Web Servers, Databases + Web development and programming… more
    Motion Recruitment Partners (05/31/24)
    - Related Jobs
  • Sr. SOAR Engineer | Remote, USA

    Optiv (Tampa, FL)
    …Security Information and Event Management (SIEM), end-point security products, email/ phishing products, and case management/knowledge management systems such as ... Service NOW. + Creating and maintaining documentation for all playbooks, scripts, integrations, etc. + Excellent time management, reporting, and communication skills. + Superior developer problem-solving skills. + Experience working with Internal and client… more
    Optiv (05/30/24)
    - Related Jobs
  • Penetration Tester

    CACI International (Chantilly, VA)
    …SQLi, covert channels, secure tunneling,pivot, socks proxies, infil/exfil of data, phishing , writing buffer overflows, fuzzing, etc. **What We Can Offer You:** ... **- We've been named a Best Place to Work by the Washington Post.** **- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.** **- We offer competitive benefits and learning and development… more
    CACI International (05/30/24)
    - Related Jobs
  • Senior Manager, Active Defense Analyst, Cyber…

    Capital One (Mclean, VA)
    …actionable intelligence to mitigate cyber threats to include brand impersonations and phishing , in collaboration across the enterprise. You are adaptable and thrive ... working cross-functionally, adept at producing intelligence to support business requirements, and proactively identify areas for implementation of cyber defense measures. You are a People Leader leveraging capacity planning skills which help achieve a… more
    Capital One (05/30/24)
    - Related Jobs
  • Senior Server Engineer / Proofpoint

    Motion Recruitment Partners (Atlanta, GA)
    …Implement and manage email security policies and protocols to protect against phishing , malware, and other email-borne threats. + Analyze email security incidents, ... perform root cause analysis, and implement corrective measures. + Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards. + Technical Support and Troubleshooting: + Provide advanced technical support… more
    Motion Recruitment Partners (05/30/24)
    - Related Jobs
  • IT Professional - Security (Cybersecurity Analyst)

    The City of Houston (Houston, TX)
    …Center (SOC) mailbox and monitor and analyze the emails for threats including phishing and malware and escalates per procedures. + Participates in the investigations ... of information security incidents and may prepare reports on intrusions as required. + Perform real-time detection, analysis, and response to threats via an EDR tool. + Track, provide, and present analysis into observed attacks against the COH. + Assist with… more
    The City of Houston (05/30/24)
    - Related Jobs
  • Sr Systems Administrator

    VadaTech Inc. (Henderson, NV)
    …software. + Need to have experience working with cyber security tools for phishing /malware detection monitoring + Must be a US Citizen WORK ENVIRONMENT . Mostly ... Indoors/Office PHYSICAL DEMANDS This position involves work typical of an office environment with no unusual hazards. The physical demands described below are representative of those that must be met by an employee to successfully perform the essential… more
    VadaTech Inc. (05/30/24)
    - Related Jobs
  • Director of Cybersecurity Risk Management…

    Georgetown Univerisity (Washington, DC)
    …awareness and training program to include education, outreach, and performing phishing training campaigns. In a Senior-level position within the UISO, the ... Director represents the Office of the Chief Information Security Officer (CISO) on cybersecurity risk and vulnerability management across GU; serves point-of-contact for the security posture concerns related to departments and organizations outside UIS, the… more
    Georgetown Univerisity (05/30/24)
    - Related Jobs
  • Sr. Analyst, SOC

    CVS Health (Trenton, NJ)
    …Strong understanding of cyber security / Information Security concepts ( Phishing , Malware, Vulnerabilities, DDoS)* Strong understanding of Microsoft Technologies ... such as Active Directory, DNS, DHCP* Strong understanding of various identity and access management / authentication concepts and technologies* Ability to collect data from disparate systems in order to correlate and perform data analysis Skill In: * Precise &… more
    CVS Health (05/30/24)
    - Related Jobs