- Chenega Corporation (Huntsville, AL)
- …assessment, and remediation of vulnerabilities. This senior-level role integrates threat intelligence, asset criticality, and mission impact to drive strategic ... inventories and mission risk. + Drive patch prioritization aligned with threat intelligence. Supports RMF and POA&M inputs. + Lead vulnerability identification,… more
- KeyBank (Brooklyn, OH)
- …for application security pen tests, secure code reviews, application design reviews, threat modeling, and processes, tools, and security automation for the Corporate ... related to comprehensive application security testing, secure application design, application threat modeling, cloud security, SaaS security, and AI security. + A… more
- Carrier (Palm Beach Gardens, FL)
- …management (IAM) processes. + Maintain daily awareness of emerging insider threat tactics and develop improvements to monitoring tools and workflows. **Required ... + Bachelors Degree + Demonstrable experience in identifying and mitigating insider threat indicators in an enterprise-level environment ; creating and outlining data… more
- SOS International LLC (Scott Air Force Base, IL)
- …software, firmware, and systems comprised of those components. + Derive transfer processing threat , identity threat , policy threat and corresponding policy ... by-pass threat , and site mitigation risk ratings with sufficient justification to receive approval/authorization from CDS forums including: National Security Agency (NSA), Connection Approval Office (CAO), DoD Information Security Risk Management Committee… more
- IBM (Austin, TX)
- …embed security into the development processes. We are responsible for design review, threat modeling, and code review of new features, as well as vulnerability ... on multiple information security areas (eg security architecture, application security, threat modeling etc.). * Plan & execute security assessments (dynamic… more
- Chenega Corporation (Oakton, VA)
- …role combines Splunk expertise with advanced network awareness to drive threat detection, baselining, and event correlation across enterprise and air-gapped ... environments. The ideal candidate collaborates closely with network engineers, threat analysts, and Extra Hop SMEs to interpret packet-level data and refine alert… more
- General Dynamics Information Technology (Tustin, CA)
- …None **Job Family:** Intelligence Operations and Analysis **Skills:** Case Briefs,Cyber Threat Analysis,Cyber Threat Intelligence **Experience:** 6 + years of ... collection and research efforts to provide relevant, timely, and actionable cyber threat intelligence to law enforcement investigators and members of the information… more
- Manulife (Boston, MA)
- …security solutions. + **Strategic Planning** : Translate business, technology, and threat drivers into practical security roadmaps. You'll ensure our security ... and integrate artificial intelligence capabilities into security operations and threat detection. + **Domain-Specific Accountabilities:** + **Application Security** :… more
- Node.Digital (Arlington, VA)
- …for motivated individuals who can support the development of new and innovative Cyber Threat Intelligence techniques, to be the tip of the spear for VM's threat ... gathered CTI * Conduct in-person and virtual briefings on vulnerabilities or threat actors * Identify intelligence gaps, specify collection requirements to fill gaps… more
- World Wide Technology (Fort Meade, MD)
- …Center (NAIC). + Design, present, and demonstrate Zero Trust Architectures, Threat Hunting models, Network Security, and Cyber Analytics solutions. + Provide ... + Deploy and optimize IPS/IDS, deep packet inspection (DPI), and cyber threat intelligence integration for proactive defense. + Collaborate with internal teams and… more