- Insmed Incorporated (NJ)
- …directly in cybersecurity operations , including incident response, threat detection, vulnerability management, and risk remediation.Architect and operationalize ... with a focus on continuous improvement.Guide the adoption of AI-driven threat analytics, secure DevOps practices, and automated response frameworks to strengthen… more
- Twist BioScience (South San Francisco, CA)
- …help us innovate on our core technology. We are looking for a "Triple Threat " Scientist: someone with strong Molecular Biology skills, a solid grasp of DNA ... Chemistry, and the ability to code their own data analysis.Your mission is to close the loop. You will take the DNA from the chip, perform complex enzymology and library preparation, and analyze the sequencing data to prove that our synthesis innovations are… more
- FM (Norwood, MA)
- …Technology (OT) honeypot. This role offers hands-on experience in threat detection, network segmentation, and cloud integration, with potential interaction ... traffic. Monitor honeypot activity and analyze captured data for threat intelligence. Document architecture, configurations, and observed behaviors. Collaborate with… more
- Daiichi Sankyo, Inc. (Bernards, NJ)
- …analysis of a variety of data sets to investigate potentially malicious activityReview threat material to determine impact and actionsWork closely with IT staff to ... work active incidents through to closureReview daily reports of phishing emails/locked accounts/potentially malicious activityPrepare cybersecurity awareness presentation material monthly Qualifications: Qualified candidates must currently be enrolled in an… more
- Reed Smith LLP (Pittsburgh, PA)
- …and support of LAN/WAN, remote access, IDS/IPS, PKI, and firewall/unified threat management systems, as well as Identity & Access Management, Endpoint ... Deploy, manage, and maintain firewalls, including Firewall-as-a-Service (FWaaS), Unified Threat Management (UTM) solutions, and Secure Web Gateways (SWG), to… more
- NY CREATES (Albany, NY)
- …and networks, the Cybersecurity Analyst will recognize and investigate the ever-evolving threat landscape utilizing data from a variety of cyber defense tools. The ... and services are configured correctly and functioning optimally. Monitor threat intelligence and investigate new Common Vulnerabilities and Exposures (CVEs)… more
- Agile IT (San Diego, CA)
- …and aligned with each clienta€ (TM) s policies and CMMC requirements. Threat Monitoring & Incident Response: Monitor security alerts and events across client ... catch real threats while minimizing false positives. Adjust alerting based on emerging threat patterns and the unique needs of each clienta€ (TM) s environment, all… more
- NY CREATES (Albany, NY)
- …Lead enterprise risk assessment program: design methodology, facilitate workshops, perform threat modeling, quantify likelihood and impact, and maintain dynamic risk ... register with residual risk tracking and KRIs. Own third-party risk management framework: develop tiering model, author due diligence questionnaires, lead evidence reviews, negotiate contractual security clauses, and enforce continuous monitoring via automated… more
- USAA (San Antonio, TX)
- …business cases to address them. This team is a part of our Cyber Threat Operation Center (CTOC), which protects, detects and responds to cyber security events. The ... CTOC is comprised of several teams that partner as needed to provide centralized and coordinated response and mitigation activities. Leads one or more analytical, business or technical support functions and is responsible for the implementation and management… more
- The Computer Merchant, LTD. (Waltham, MA)
- …concepts, including network security, data protection, identity management, and threat modeling across major cloud providers. Extensive hands-on experience with ... Azure, AWS, GCP and other major cloud providers and security tools and technologies (Azure Security Center, AWS Security Hub, GCP Security Command Center, CNAPP tools, etc.). Strong security foundations to include experience with network security,… more