- Microsoft Corporation (Redmond, WA)
- …Security, and Business Units to align risk mitigation strategies. + Conduct threat assessments on foreign intelligence and nation-state threat actors. + ... Collect and analyze data on emerging technologies, supply chain risks, and entities of concern, leveraging OSINT and internal holdings. + Analyze proposed partnerships, conduct enhanced due diligence, and escalate suspicious concerns. + Identify trends and… more
- Leidos (VA)
- …of Action & Milestones (POA&M) findings. **Operations, Risk, and Strategy** + ** Threat & Risk Management:** Lead comprehensive threat modeling and vulnerability ... management efforts. Conduct thorough Security Impact Analyses (SIAs) and risk assessments for new services, functionality, and proposed architectural changes, ensuring all risks are documented and mitigated. + **Continuous Monitoring:** Design and implement… more
- Robert Half Technology (St. Louis, MO)
- …Monitor networks and systems for security events using advanced tools and threat intelligence sources. + Analyze potential security incidents to determine their ... impact and coordinate incident response efforts. + Conduct threat and vulnerability assessments, performing regular system scans and risk analyses. + Support the… more
- University of Southern California (Los Angeles, CA)
- …posture with a renewed focus on resilience, cyber risk management, and threat -informed defense. As a world-class research institution, USC is building a culture ... that supports its academic and research mission in a rapidly evolving threat landscape. This role sits within a newly restructured cybersecurity organization that's… more
- University of Miami (Miami, FL)
- …internal teams in the execution of initiatives as they relate to threat analysis, monitoring, systems and applications, responding to all related cybersecurity ... threats, and best cybersecurity practices + Collect, analyze, and disseminate cyber threat intelligence from various sources to stay ahead of emerging threats This… more
- Fiserv (Berkeley Heights, NJ)
- …drive corrective actions. + Research and apply emerging tools, techniques, and threat intelligence to continuously improve testing coverage and automation. + Mentor ... cloud-native applications. + 8+ years of experience with secure SDLC practices, threat modeling, and application security standards (OWASP Top 10, NIST, SANS) and… more
- Meta (Menlo Park, CA)
- …Specifically, this Security Delivery Manager will focus on: (1) Advanced persistent threat (APT) detection and mitigation and (2) Protection of critical intellectual ... in protecting critical intellectual property and proprietary technologies from advanced threat actors 15. Ability to obtain and maintain US government security… more
- Huntington Ingalls Industries (Roanoke, VA)
- …SWFT. * Oversight of personnel security, physical security, DD254 preparation, Insider Threat , and electronic fingerprinting. * Serve as an expert advisor to ... certificate of completion is required. Preferred Requirements * Establishing an Insider Threat Program Course certificate completion, a plus. * Knowledge of managing… more
- Lockheed Martin (Huntsville, AL)
- …you may be contacted for this and future openings\. The modern missile\- threat landscape is characterized by increasing complexity and rapid evolution, making it ... trajectory, launching an interceptor, and guiding it to successfully destroy the threat in mid\-air is an extraordinarily complex and challenging task\. It demands… more
- PenFed Credit Union (Tysons Corner, VA)
- …a job or perform the essential functions of a job unless doing so causes a direct threat to these individuals or others in the workplace and the threat cannot be ... eliminated by reasonable accommodation or if the accommodation creates an undue hardship to PenFed. Contact human resources (HR) with any questions or requests for accommodation at ###. more