- Bank of America (Denver, CO)
- Malware Threat Intelligence Control Owner Chicago, Illinois;Washington, District of Columbia; Denver, Colorado **To proceed with your application, you ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Malware - Threat - Intelligence - Control -Owner\_25045349-2) **Job Description:**… more
- Dentons US LLP (Phoenix, AZ)
- …investigations of security events. The role involves monitoring and operationalizing threat intelligence , engineering automation and SOAR playbooks to streamline ... defined investigation and response procedures. + Monitor, triage, and operationalize threat intelligence from commercial, open-source, ISAC/ISAO, and government… more
- Carnegie Mellon University (Pittsburgh, PA)
- …engineering and design concepts + Firmware and device driver development + Malware tradecraft and threat actor tactics, techniques, and procedures (TTPs) ... the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is a federally funded... intelligence and machine learning and using artificial intelligence to support reverse engineering and malware … more
- PSEG (Newark, NJ)
- …Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting. (S)he ... Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat Intelligence , and Cyber Threat Hunting for all… more
- The MITRE Corporation (Mclean, VA)
- …the collection, transformation, and analysis of complex datasets, optimizing workflows for threat intelligence operations. + Serve as the go-to problem solver ... analysis and enables advanced querying and data mining in support of cyber threat intelligence objectives. + Collaborate with cross-functional teams, including … more
- General Dynamics Information Technology (Springfield, VA)
- …recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. All Contractor ... with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter … more
- Mallinckrodt Pharmaceuticals (Bridgewater, NJ)
- …the organization. + Maintain relationships and connectivity with industry peers, relevant threat intelligence sources, and regulatory agencies to collaborate and ... and systems infrastructure, and security-related tools such as whitelisting, IDS/IPS, anti- malware , patch management, baselining, SIEM, access control , and… more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …+ Knowledge of cloud-based networking, security, and best practices + Implement network threat detection and prevention rules and data control methods. + Operate ... 24/7 threats/vulnerabilities/events. + Provide leadership w/ security and cybersecurity intelligence , posture/capabilities status, ways-forward, trend analysis and personnel readiness… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API and ... and best practices. + Evaluating and integrating emerging security technologies and threat intelligence feeds into the automation fabric. + Adhering to… more
- Auburn University (Auburn, AL)
- … Hunting:** Conduct in-depth threat hunting and develop actionable threat intelligence for state and critical infrastructure partners. **Automation and ... (ISAC ) environment. The Senior Analyst is responsible for advanced threat hunting, incident leadership, automation initiatives, and operational support for state… more