- General Dynamics Information Technology (Tampa, FL)
- …and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT + ... Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat , and security violations. + Identify acceptable use policy infractions. +… more
- TECO Energy (Ybor City, FL)
- …A solid understanding of fundamental principles of cybersecurity, including threat landscape, vulnerabilities, and risk management. + Significant high-level ... tools and platforms, such as SIEM, IDS/IPS, endpoint protection, and threat intelligence solutions, for effective risk analysis and mitigation. + Ability… more
- RTX Corporation (El Segundo, CA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... that effectively capture system and system of systems effects in complex threat environments. These models will generate virtual and/or analytical solutions to… more
- AIG (Charlotte, NC)
- …you will create an impact This position, within AIG's Security Remediation Team - Threat Assessment which perform threat assessments and real world attacks to ... test an organization's defenses, resilience, and response against our people, processes and technologies. Responsibilities will include: + Identify vulnerabilities, exploit weaknesses, and challenge assumptions within security protocols, enabling the… more
- Mission Support and Test Services (North Las Vegas, NV)
- …to multitask as required between responsibilities. + Review Cyber Security threat information and assist with mitigating vulnerabilities identified. + Develop ... Responder (GCFR) + GIAC Cloud Penetration Tester (GCPN) + GIAC Cloud Threat Detection (GCTD) + Certified Computer Examiner (CCE) + EnCase Certified Examiner… more
- Truist (Raleigh, NC)
- …with Cybersecurity to integrate security monitoring, anomaly detection, and threat intelligence into observability solutions. Engage with business and operations ... with SIEM tools and security monitoring, ensuring alignment with SOC and threat detection capabilities. Experience in API monitoring, network telemetry, and database… more
- Global Foundries (Malta, NY)
- …design patterns for applications, APIs, and AI/ML pipelines. + Integrate threat modeling, secure coding standards, and automated security testing into DevSecOps ... engineering. + Strong understanding of secure design principles, DevSecOps, and threat modeling. + Experience with AI/ML platforms. + Familiarity with AI-specific… more
- Insight Global (Warner Robins, GA)
- …Warfare (EW) integration. * Supports tactics development, mission planning, and threat assessments while advising leadership on the optimal employment of Air ... in operational scenarios across multiple mission types. * Conduct detailed threat assessments and provide recommendations for EW-enabled mission success. *… more
- New York Times (New York, NY)
- …+ Wordle Bot: Your Daily, Personalized Wordle Score + "A Huge Threat to the US Budget Has Receded. And No One Is Sure ... Why. (https://www.nytimes.com/interactive/2023/09/05/upshot/medicare-budget- threat -receded.html) " + "Coastal Cities Priced Out Low-Wage Workers. Now College… more
- Transdev (Phoenix, AZ)
- …+ Must pass the Fingerprint-Based Criminal History Records Check or a Security Threat Assessment (STA). This process involves a check against FBI databases, as well ... other federal databases, to assess whether an individual poses a security threat . Physical Requirements: The essential functions of this position require the ability… more