Manager, Threat Intelligence Jobs
By DNSFilter At United States
4+ years experience in People Management
Be a people manager with a team of 3-5 highly skilled threat and domain intelligence experts
Be working with our various departments to help enable them end-to-end in project management
Set team direction, manage workloads, and help form strategic direction in the threat and domain intelligence space
Demonstrated expertise in protective DNS, domain intelligence, and/or threat intelligence cyber security experience
Full medical, dental, and vision benefits for US Based Employees
Cyber Intelligence Analyst Jobs
By General Motors At , Detroit, Mi
At least 2 years overall experience in cyber threat intelligence, vulnerability management, security engineering, incident response or offensive security
Conceptual and technical knowledge of modern IT environments to include server configuration/architecture, cloud, database management/configuration, networking protocols/designs and access management/access controls
Experience in open source collection, use of online tools, experience querying internal databases of information in support of investigative efforts
Experience documenting cyber threat intelligence in a consumable manner that non-IT professionals can easily understand
Demonstrated interpersonal skills and ability to work effectively and collaboratively with a wide range of stakeholders
Demonstrated executive-level verbal and written communication skills
Sr. Analyst – Threat Intelligence
By Cardinal Health At , , Pa
Collaborate with the Risk Management team to assess threats, vulnerabilities, and control gaps.
Work alongside the vulnerability management, offensive security, incident response teams, to improve proactive defensive processes.
Apply comprehensive knowledge and a thorough understanding of concepts, principles, and technical capabilities to perform varied tasks and projects.
Familiarity with Information Security Risk Management Frameworks and MITRE Att&ck Framework
We promote a culture that protects information assets, manages risk and embeds security in people, process and technology.
Defines solutions that balance information security requirements against business needs.
Threat Intelligence Cyber Security Professional (Hybrid Or Remote)
By Freddie Mac At , Mclean, 22102, Va $80,000 - $120,000 a year
Respond to requests for ad-hoc reporting and research topics from management, as requested
Monitor various sources for relevant cyber threats and vulnerabilities
Produce and disseminate timely, relevant intelligence products on a variety of topics including threat actors, vulnerabilities, industry developments, and more
Conduct research on remerging threats to maintain current knowledge on industry trends and developments
Basic understanding of the current threat landscape including trends, threats, vulnerabilities, and geopolitical events impacting the cyber domain
Demonstrated excellent written and verbal communication skills
Threat Intelligence Analyst Jobs
By University of Oregon At , Eugene, Or $72,000 - $82,000 a year
Demonstrated experience with anticipating and/or emulating threat capabilities and actions based on knowledge of tactics used by cyber threat actors.
Bachelor’s degree from an accredited college or university or demonstrated equivalent skills and experience
Demonstrated experience with cyber intelligence/information collection capabilities and repositories.
One (1) year of experience in an operational information security role.
Demonstrated experience with the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Demonstrated experience with common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Cyberware Engineers | Cyber Threat Hunters
By Praxis Engineering At , Melbourne, Fl
Some exposure/experience with hardware breakdown, soldering, board analysis, or a strong desire to learn.
Attractive total compensation package to include competitive salary and medical benefits with an option for FREE employee HSA medical plan!
Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master...the list of certifications goes on and on!
Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands-on training.
Vaccination requirements will depend on the status of the federal contractor mandate and customer site
Embedded software developer proficient in C, C++, and comfortable reading/writing assembler, particularly but not limited to, x86, ARM.
Threat Intelligence Analyst, Sear
By Apple At , Seattle, Wa
Proven history of successfully working on solo and group projects (experience with virtual/remote collaboration is a plus).
Minimum of 5 years experience conducting threat research.
Experience in analyzing highly-complex threat actor campaigns, including infrastructure, malware, and victim endpoints.
Ability to distill complex problems into manageable tasks and then drive those tasks to completion.
Some knowledge of macOS and iOS internals.
Excellent communications skills (verbal and written).
Cyber Threat Intelligence Analyst (Europe, Remote)
By INTEL 471 At , Remote
Excellent time management and organisation skills.
Knowledge of common hacking tactics, techniques, and procedures (TTPs) such as malware, vulnerabilities, exploits, carding, fraud, etc.
Collaborate internally with an experienced, globally diverse, cross-cultural team to aid the collection, analysis, and production of intelligence.
Experience tracking malware, malware campaigns, phishing campaigns and infrastructure related to them.
Experience identifying and tracking TTPs commonly used for cybercrime and malware.
A proven ability to communicate cyber threat intelligence use cases and how Intel 471’s offerings can meet them.
Threat Intelligence Analyst, Sear
By Apple At Seattle, WA, United States

Summary Apple’s Security Engineering & Architecture (SEAR) provides operating system security foundations across all of Apple’s innovative products, including Mac, iPhone, iPad, Apple Watch, ...

Cyber Threat Intelligence Analyst
By Delta Air Lines At Atlanta, GA, United States
Information security experience in the areas of cyber threat intelligence, security monitoring/SOC, vulnerability management, Incident Response, or penetration testing.
Experience in vulnerability research, malware analysis and exploit investigation.
Comfortable handling multiple deliverables and able to manage priorities in a time-sensitive environment.
Experience using a Threat Intelligence Platform (TIP)
Preferred key industry certifications such as CEH, Security+, CISSP, CISA, CISM, GCIH, etc.
AWS Certification is a plus.
Internship Program - Threat Research
By TXOne Networks At United States
Experience in at least 1 programming language such as C, C++, Python, or Golang.
The internship program will be conducted remotely, with biweekly onsite discussions and sync-ups in the office.
Infrastructure Development - Develop and test the systems required for various threat research and threat analysis.
Sophomore standing (to be) or above at a university worldwide.
Strong interest and motivation in the field of cybersecurity and threat research.
Strong interest and motivation in software development.
Business Intelligence Internship (Remote Within The Usa)
By Businessolver At , $23.40 an hour
Must have great communication skills for providing customer service, taking instruction and providing thorough documentation
Intermediate to Advance visualization skill set desired
Knowledge of AWS preferred (not required)
Businessolver provides a comprehensive benefits package which can be viewed here:
Must be self-motivated and able to prioritize a number of tasks effectively
Available at least 30 hours a week
Specialist, Cyber Intelligence Jobs
By CAE At Patrick AFB, FL, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Comprehensive and competitive benefits package and flexibility that promotes work-life balance
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Cyber Threat Intelligence Engineer
By Veeva Systems At United States
Author intelligence reports that address specific intelligence requirements and emerging threats
Collaborate across other Veeva teams on relevant intelligence of emerging vulnerabilities to prioritize and drive remediation efforts
Experience in delivering adversary-based metrics or authoring/contributing to threat intelligence reports
Strong experience in organizing, processing, analyzing, and vetting indicators using sorting/processing tools to maintain a current, relevant threat database
Experience in enriching data of the four atomic indicators (domains, strings, IP addresses, accounts) to deliver additional context to incident responders
Strong experience in leveraging existing threat intelligence to augment investigations during incident response
Cyber Threat Intelligence Internship
By Mastercard At , New York, 10011, Ny
Inter-team collaboration, educational presentations and projects will see the intern not just learn but also work closely with other business units
Volunteer and team building experiences
Assist in the research, analysis and composition of written threat intelligence reports for dissemination to Mastercard's customers
Networking sessions and leadership speakers series
Innovative thinking and thoughtful risk taking
Ability to partner across the organization
Cyber Threat Intelligence Analyst || **100% Remote
By Dice At United States
3-5 years of experience of active monitoring (SIEM or data aggregation systems), data analysis and cyber processes (monitoring, triage, escalations)
Knowledge of processes, procedures, and methods to research, analyze, and disseminate threat intelligence
Threat and Risk experience using industry best practices
Demonstrated critical thinking and problem-solving skills
Experience using proprietary and/or open-source tools to gather and analyze intelligence
Position : Cyber Threat Intelligence Analyst (100%Remote)
Cyber Threat Intelligence Intern
By Cowbell Cyber Inc. At , Pleasanton, 94566, Ca $30 an hour
Penetration testing experience and understanding of remediation techniques for common misconfigurations and vulnerabilities
Develop and maintain application scanning solutions to inform stakeholders of security weaknesses & vulnerabilities.
Review outstanding vulnerabilities with product teams and assist in remediation efforts to reduce risk
Help in developing the capability to automate triaging, validating, reporting and reproducing application vulnerabilities.
Detail-oriented student leader with problem solving, communication, and analytical skills.
On track to complete the requisite degree and a goal of successfully obtaining relevant certifications associated with your career field.
Cyber Threat Intelligence Analyst Ii (Remote)
By Home Depot / THD At , Atlanta, 30301, Ga $130,000 a year
Skilled at managing competing priorities.
Skilled at Key term Analysis.
Has a growth mindset and is looking to enhance their technical and soft skills.
Previous experience as an investigator in Law Enforcement, Military, or Government sectors
This Position typically reports to Manager or Sr. Manager
Minimum Years of Work Experience:
Cyber Threat Intelligence Analyst
By GEICO At , Chevy Chase, 20815, Md $70,000 - $185,000 a year
Assist in the coordination, validation, and management of all-source collection requirements.
Knowledge and experience working frame works such as Pyramid of Pain, Diamond Model, Kill Chain, and MITRE ATT&CK framework.
Bachelor’s degree in computer science, Information Systems, or equivalent education or work experience
Benefits may be different by location. Benefit eligibility requirements vary and may include length of service.
Produce timely notice of potential cyber attacks/threats or activities which may impact the business operations, objectives, resources, or capabilities.
Experience with creating and maturing intelligence reports and briefings.