- Citigroup (Irving, TX)
- …the key engineer in supporting and advancing the platform used for threat -modeling process in Citi. The responsibilities will cover (among others) maintaining and ... supporting the threat -modeling application as well as developing relevant tools used...as well as developing relevant tools used throughout the threat -modeling process. The application is comprised of web servers… more
- JPMorgan Chase (Seattle, WA)
- …CTC. This role demands deep expertise in cloud identity provisioning, role management, threat hunting, and privileged access, along with a proven track record in ... RBAC, ABAC, PBAC, and role certification frameworks. + Lead threat hunting initiatives and develop threat models...+ Lead threat hunting initiatives and develop threat models for cloud IAM environments and collaborate with… more
- Brunswick (Mettawa, IL)
- …capabilities. This role will lead the Security Operations Center (SOC), Threat and Vulnerability Management, Cyber Incident Response, and Offensive Security ... across multiple domains. + Define and execute the strategic roadmap for SOC, threat detection, incident response, and offensive security. + Collaborate with IT, OT,… more
- Amentum (Fort Belvoir, VA)
- RED CELL ANALYST: Defense Threat Reduction Agency, Fort Belvoir, VA The Analyst is responsible for gathering information based on program objectives, identifying ... intentions, tactics, and capabilities of adversarial organizations to develop threat characterization using a combination of both classified and unclassified… more
- Abbott (St. Paul, MN)
- …teams on implementing fraud prevention strategies + Conduct cyber fraud threat modeling to identify vulnerabilities + Integrate applications into fraud monitoring ... and techniques used by fraud actors + Stay current with relevant cyber threat intelligence + Report periodically on the fraud posture of e-commerce environments… more
- Pinkerton (Phoenix, AZ)
- …a wide variety of cases including but not limited to life safety/ threat management (workplace violence, assault, harassment, stalking, domestic violence, and missing ... + Monitor persons of interest who may pose a threat of violence to people or assets. + Monitor...telephone records. + Produce high quality, timely, and tailored threat assessments for internal stakeholders while managing sensitive or… more
- Travelers Insurance Company (St. Paul, MN)
- …detection, response and disruption of cybersecurity events across Travelers through threat intelligence gathering, detection, and techniques to assess, support, and ... evaluation, hiring, and training of SOC staff), strong technical skills related to threat detection and response processes, as well as the curation and presentation… more
- RKON (Chicago, IL)
- …vulnerability and security information event management engagements. + Perform threat hunts that target known vulnerabilities, threats, and other attack ... and Response (NDR), Email Security, Cloud Security, and other security threat data sources. + Identify and remediate infrastructure and application vulnerabilities… more
- Mastercard (O'Fallon, MO)
- …world that unlocks priceless possibilities for all. Overview: The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security ... security technologies and controls. * Translate security requirements, risk policies, and threat models into actionable work items and initiatives. * Lead capability… more
- MUFG (Tampa, FL)
- …logs to identify and resolve issues, utilizing Splunk and SIEM platforms for threat detection, and ensuring secure configurations across Unix systems. The role also ... involves working with threat detection tools and file integrity monitoring solutions, as...contributing to continuous improvement of security posture + Support threat detection and file integrity monitoring initiatives, integrating tools… more