CYBERSECURITY THREAT ANALYSIS LEADERSHIP jobs in UNITED STATES, United Kingdom

and Systems Application Architecture Design Threat Modelling Integration Design and Testing Cybersecurity Engineering... programs that can keep pace with the ever-changing threat landscape and evolve in sync with the latest technology/protocols...

Cencora

of less experienced staff. Coordinates with Cybersecurity teams, stakeholders and leadership to provide framework, design, threat, posture... analysis and reporting. Primary Responsibilities: Assist with with the design, development and maintenance of threat...

M&T Bank

and Vacation What is a Manager – Cybersecurity Vulnerability & Threat Management? The Manager – Cybersecurity Vulnerability... & Threat Management oversees and coordinates the activities of the cybersecurity operations team. Responsibilities include...

Central Hudson

, root cause analysis and malware analysis. Develop tactical and strategic cyber intelligence from acquired threat... of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity...

Truist

of less experienced staff. Coordinates with Cybersecurity teams, stakeholders and leadership to provide framework, design, threat, posture... analysis and reporting. Primary Responsibilities: Design, develop and maintain threat detection rules, alerts and use cases...

M&T Bank

Security and Cybersecurity Threat Management programs responding to cyber incidents while working in a multiple-team... analysis and malware analysis. 2. Develop tactical and strategic cyber intelligence from acquired threat intelligence...

Truist

analysis with a focus on cybersecurity and threat activities while deepening your consulting skills. Work with us as we help... Knowledge of cybersecurity, intelligence, and counterintelligence principles, or threat indicators and detection practices...

Booz Allen Hamilton

leadership. The cyber intelligence analysts compile cyber threat data gathered through independent research and analysis... source monitoring activities, cyber threat analysis and mitigation courses of action, provide the actionable intelligence...

Phoenix Cyber

leadership. The cyber intelligence analysts compile cyber threat data gathered through independent research and analysis... source monitoring activities, cyber threat analysis and mitigation courses of action, provide the actionable intelligence...

Phoenix Cyber

) and participates as a team member performing threat analyses based on knowledge of cybersecurity and concepts supporting intelligence... analysis requirements for all-source cyber analysis and reporting. Contributes to development of analytical threat models...

Peraton

Summary The Cyber Threat Intelligence Integration Center (CTIIC) is the DNI's Intelligence Community (IC) lead... for cyber intelligence issues. CTIIC is responsible for integrating IC collection and analysis on cyber intelligence issues...

Federal government of the United States

, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print... of threats against the Xerox reputation, brand, and systems through multiple threat intelligence sources. Communicate the same...

Xerox

investigative techniques like threat analysis, malware analysis, and forensics, you’ll work alongside multiple stakeholders..., such as cyber intelligence, cyber threat analysis, incident response, cyber investigations, malware analysis, or network forensics...

Booz Allen Hamilton

functions Qualifications The essentials Five (5) years of cybersecurity experience Two (2) years in a cyber threat... response, threat hunting, and/or other SOC functions. The preferred Adversary infrastructure link analysis leveraging...

Mattson Resources

its cybersecurity resources and capabilities to address the ever-changing cybersecurity threat landscape. We seek an experienced... of threat intelligence and threat-hunting analysts, providing guidance, mentorship, and support in conducting advanced analysis...

Johnson Controls

platforms, malware analysis, and threat hunting. We take advantage of SOAR capabilities to perform immediate actions when... (threat hunting, threat detection and response, malware analysis, etc). 2+ years working knowledge and experience...

MetLife

, security peer review, threat modeling, static analysis, software composition analysis, dynamic analysis, software supply chain... security analysis, and application penetration testing. Experience with managing security capabilities in Continuous...

Motion Recruitment