- Microsoft Corporation (Redmond, WA)
- …3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) ... detection, threat analytics, security incident and event management (SIEM), information...4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center… more
- IBM (San Jose, CA)
- …embed security into the development processes. We are responsible for design review, threat modeling, and code review of new features, as well as vulnerability ... on multiple information security areas (eg security architecture, application security, threat modeling etc.). * Plan & execute security assessments (dynamic… more
- Chenega Corporation (Huntsville, AL)
- …assessment, and remediation of vulnerabilities. This senior-level role integrates threat intelligence, asset criticality, and mission impact to drive strategic ... inventories and mission risk. + Drive patch prioritization aligned with threat intelligence. Supports RMF and POA&M inputs. + Lead vulnerability identification,… more
- KeyBank (Brooklyn, OH)
- …for application security pen tests, secure code reviews, application design reviews, threat modeling, and processes, tools, and security automation for the Corporate ... related to comprehensive application security testing, secure application design, application threat modeling, cloud security, SaaS security, and AI security. + A… more
- Carrier (Palm Beach Gardens, FL)
- …management (IAM) processes. + Maintain daily awareness of emerging insider threat tactics and develop improvements to monitoring tools and workflows. **Required ... + Bachelors Degree + Demonstrable experience in identifying and mitigating insider threat indicators in an enterprise-level environment ; creating and outlining data… more
- SOS International LLC (Scott Air Force Base, IL)
- …software, firmware, and systems comprised of those components. + Derive transfer processing threat , identity threat , policy threat and corresponding policy ... by-pass threat , and site mitigation risk ratings with sufficient justification to receive approval/authorization from CDS forums including: National Security Agency (NSA), Connection Approval Office (CAO), DoD Information Security Risk Management Committee… more
- IBM (Austin, TX)
- …embed security into the development processes. We are responsible for design review, threat modeling, and code review of new features, as well as vulnerability ... on multiple information security areas (eg security architecture, application security, threat modeling etc.). * Plan & execute security assessments (dynamic… more
- Chenega Corporation (Oakton, VA)
- …role combines Splunk expertise with advanced network awareness to drive threat detection, baselining, and event correlation across enterprise and air-gapped ... environments. The ideal candidate collaborates closely with network engineers, threat analysts, and Extra Hop SMEs to interpret packet-level data and refine alert… more
- General Dynamics Information Technology (Tustin, CA)
- …None **Job Family:** Intelligence Operations and Analysis **Skills:** Case Briefs,Cyber Threat Analysis,Cyber Threat Intelligence **Experience:** 6 + years of ... collection and research efforts to provide relevant, timely, and actionable cyber threat intelligence to law enforcement investigators and members of the information… more
- Manulife (Boston, MA)
- …security solutions. + **Strategic Planning** : Translate business, technology, and threat drivers into practical security roadmaps. You'll ensure our security ... and integrate artificial intelligence capabilities into security operations and threat detection. + **Domain-Specific Accountabilities:** + **Application Security** :… more