- MUFG (Tempe, AZ)
- …EDR and threat hunting tools to find adversaries, identify gaps in detection and cyber hygiene, and recommend improvements to detection rules. You ... hunting , and track and measure the value of threat hunting activity. You will work closely...after hours or on weekends in support of a cyber incident or other threat related requirement.… more
- MUFG (Tempe, AZ)
- …perspectives on the behavior of adversaries. **Major Responsibilities** + Perform cybersecurity threat detection , assessment, and mitigation efforts as part of a ... development of security operations detections, playbooks, and automations to ensure threat detection , monitoring, response, and forensics activities align with… more
- Meta (Phoenix, AZ)
- …collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify ... threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively… more
- Dentons US LLP (Phoenix, AZ)
- …to streamline detection and response and maintain comprehensive documentation of threat hunting activities. The analyst collaborates with internal teams to ... in incident response, and continuously adapts to the evolving cyber threat landscape. **Responsibilities** + Analyze activity...hunts and incident response. + Create and deliver regular threat hunting and threat intelligence… more
- Deloitte (Tempe, AZ)
- …with internal and external parties to deliver against expectations. + Familiarity with Threat Hunting and Cyber Threat Intelligence fundamentals. ... Cyber Google Security Operations Manager Position Summary Our...engineering skills and strong knowledge of Google SecOps tools, threat detection engineering, and automation development are… more
- Wells Fargo (Tempe, AZ)
- …monitoring, remediation, and reporting to ensure timely mitigation of technical risks. + Cyber Threat Intelligence and Adversary Hunting : Including threat ... + Experience with security operations, including SIEM, log management, and threat detection technologies. + Expertise with vulnerability management tools,… more
- Amentum (Phoenix, AZ)
- …and related concepts, eg boundary protection, network segmentation, firewalls, endpoint security, threat hunting . . Deep understanding of network protocols (eg ... and hands-on role, responsible for ensuring Amentum assets are protected from cyber threats. This role provides technical expertise in multiple areas of… more