- Foxhole Technology, Inc (Washington, DC)
- …analytics infrastructures incorporating SIEM solutions, machine learning algorithms, and threat intelligence platforms to enable proactive threat detection ... and response. + Experience in establishing programmatic capability and effectiveness measurements and metrics. Utilize metric and scorecard techniques to develop tools and procedures for the program to measure and report performance. + Support planning,… more
- Penn Medicine (Philadelphia, PA)
- …and identifying objects in the shape of a weapon that may pose a threat , adhering to established protocols and procedures and assisting with the overall security ... system, providing clear instructions and ensuring compliance with screening procedures. + Threat Identification: Detect and respond to alarms triggered by the weapon… more
- RTX Corporation (Aurora, CO)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... generation of satellite data management capabilities in an evolving threat landscape. Tasks include design\implementing switch, firewall, and router configurations,… more
- Palo Alto Networks (New York, NY)
- …environments. + Conduct ongoing market and competitive analysis to monitor IoT threat trends, assess opportunity size, and provide data-driven insights that shape ... and network security, with deep expertise in network traffic analysis, threat detection, and security architecture design. + Comprehensive understanding of passive… more
- Amazon (Redmond, WA)
- …the enterprise with the excitement and challenge of quickly reacting to new threat scenarios. As a security engineering manager at Amazon, you will be expected ... Knowledge of information security technologies such as security design review, threat modeling, risk analysis, and software testing techniques - Experience managing… more
- Sandia National Laboratories (Albuquerque, NM)
- …their OT cyber security posture, develop new tools and processes, conduct threat assessments, and analyze government, military, and civilian OT systems? If so, ... assessment, and malware analysis + Network protection architectures for OT systems + Threat intelligence + Hardware and software trust and assurance + Security of… more
- Air National Guard Units (Mansfield, OH)
- …reports relevant to all aspects of Cyberspace Operations/Cyberspace Warfare. Produces threat analysis studies. (30%) 3. Prepares evaluations and interpretations of ... protection. Informs operators where mission findings match up with known threat indicators. Provides further intelligence and analysis to Cyberspace Operators based… more
- Huntington National Bank (Farmers Branch, TX)
- …tools and technologies. Analyze available data sources, security tools, and threat trends to identify attacks against the enterprise. Perform incident response, ... Knowledge of recent Cyber events and interpreting kill chain process and threat impacts + Presentation, analytical, and critical-thinking skills + Occasional travel… more
- Pacific Northwest National Laboratory (Richland, WA)
- …with decades of radiological and nuclear materials expertise, advanced computing and threat analysis capabilities, and a broad fundamental science base. We are ... radiation-interdiction and safeguards systems, technologies, and strategies worldwide. 6. ** Threat Detection and Interdiction Testing and Evaluation:** Leading the… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …EDR policies, rulesets, and scanning parameters to enhance endpoint visibility and threat detection capabilities. + Configure network access control policies for the ... for automation and customization. + Solid understanding of cybersecurity principles, threat landscapes, and best practices for configuring and tuning security tools.… more