Threat Intelligence Analyst Jobs
By University of Oregon At , Eugene, Or $72,000 - $82,000 a year
Demonstrated experience with anticipating and/or emulating threat capabilities and actions based on knowledge of tactics used by cyber threat actors.
Bachelor’s degree from an accredited college or university or demonstrated equivalent skills and experience
Demonstrated experience with cyber intelligence/information collection capabilities and repositories.
One (1) year of experience in an operational information security role.
Demonstrated experience with the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Demonstrated experience with common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Threat Program Manager Jobs
By Nike At Beaverton, OR, United States
3+ years of Threat Management/Mitigation experience preferred
Professional affiliation with ATAP, Certified Threat Management (CMT) certification, GDBA Threat Management training are a plus
Strong time management skills and ability to complete multiple projects simultaneously
Bachelor's degree or combination of relevant education, experience, and training
5 years of work experience
3+ years of corporate work experience preferred
Cyberware Engineers | Cyber Threat Hunters
By Praxis Engineering At , Melbourne, Fl
Some exposure/experience with hardware breakdown, soldering, board analysis, or a strong desire to learn.
Attractive total compensation package to include competitive salary and medical benefits with an option for FREE employee HSA medical plan!
Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master...the list of certifications goes on and on!
Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands-on training.
Vaccination requirements will depend on the status of the federal contractor mandate and customer site
Embedded software developer proficient in C, C++, and comfortable reading/writing assembler, particularly but not limited to, x86, ARM.
Manager, Prospect Intelligence Jobs
By United States Fund for UNICEF At , New York, Ny $65,300 - $70,000 a year
Bachelor’s degree with five years of relevant work experience; three years non-profit prospect research experience preferred
Excellent writing, editing, and proofreading skills
Key Responsibilities & Outcomes (include but are not limited to):
· Determine appropriate assignment fit among prospect manager portfolios
Strong client services-oriented approach and desire to build strong partnerships with colleagues
Ability to exercise good judgment in balancing deadlines, prioritizing multiple projects
Threat Intelligence Analyst, Sear
By Apple At , Seattle, Wa
Proven history of successfully working on solo and group projects (experience with virtual/remote collaboration is a plus).
Minimum of 5 years experience conducting threat research.
Experience in analyzing highly-complex threat actor campaigns, including infrastructure, malware, and victim endpoints.
Ability to distill complex problems into manageable tasks and then drive those tasks to completion.
Some knowledge of macOS and iOS internals.
Excellent communications skills (verbal and written).
Cyber Threat Intelligence Analyst (Europe, Remote)
By INTEL 471 At , Remote
Excellent time management and organisation skills.
Knowledge of common hacking tactics, techniques, and procedures (TTPs) such as malware, vulnerabilities, exploits, carding, fraud, etc.
Collaborate internally with an experienced, globally diverse, cross-cultural team to aid the collection, analysis, and production of intelligence.
Experience tracking malware, malware campaigns, phishing campaigns and infrastructure related to them.
Experience identifying and tracking TTPs commonly used for cybercrime and malware.
A proven ability to communicate cyber threat intelligence use cases and how Intel 471’s offerings can meet them.
Cyber Threat Specialist Jobs
By Booz Allen Hamilton At El Segundo, CA, United States
Experience collaborating with multiple internal and external stakeholders to gather and analyze data and information
Knowledge of open-source research techniques and threat research resources
Experience working on major DoD space programs
If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.
Ability to obtain a security clearance
Scheduled to obtain a Bachelor's degree by Spring 2023
Threat Intelligence Analyst, Sear
By Apple At Seattle, WA, United States

Summary Apple’s Security Engineering & Architecture (SEAR) provides operating system security foundations across all of Apple’s innovative products, including Mac, iPhone, iPad, Apple Watch, ...

Cyber Threat Intelligence Analyst
By Delta Air Lines At Atlanta, GA, United States
Information security experience in the areas of cyber threat intelligence, security monitoring/SOC, vulnerability management, Incident Response, or penetration testing.
Experience in vulnerability research, malware analysis and exploit investigation.
Comfortable handling multiple deliverables and able to manage priorities in a time-sensitive environment.
Experience using a Threat Intelligence Platform (TIP)
Preferred key industry certifications such as CEH, Security+, CISSP, CISA, CISM, GCIH, etc.
AWS Certification is a plus.
Specialist, Cyber Intelligence Jobs
By CAE At Patrick AFB, FL, United States
Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information systems.
Experience successfully interfacing with internal/external customers (DCSA, AO/DAO, GCAs, IT, Program Managers, Program Engineering, Cyber Architects/Engineers, etc.)
Comprehensive and competitive benefits package and flexibility that promotes work-life balance
Graduate Degree and a minimum of 6 years of prior related experience.
Bachelor’s Degree in discipline (STEM) and minimum 8 years of prior relevant experience or,
2 years post-Secondary/Associates Degree and a minimum of 10 years of prior related experience
Cyber Threat Intelligence Engineer
By Veeva Systems At United States
Author intelligence reports that address specific intelligence requirements and emerging threats
Collaborate across other Veeva teams on relevant intelligence of emerging vulnerabilities to prioritize and drive remediation efforts
Experience in delivering adversary-based metrics or authoring/contributing to threat intelligence reports
Strong experience in organizing, processing, analyzing, and vetting indicators using sorting/processing tools to maintain a current, relevant threat database
Experience in enriching data of the four atomic indicators (domains, strings, IP addresses, accounts) to deliver additional context to incident responders
Strong experience in leveraging existing threat intelligence to augment investigations during incident response
Cyber Threat Analyst Jobs
By IGA Talent Solutions At Washington DC-Baltimore Area, United States
To be considered you will need the following skills and experience:
Strong working knowledge of Splunk
Previous cybersecurity domain knowledge (cyber threat landscape, an understanding of network reconnaissance TTPs, malware, phishing, lateral movement, and data exfiltration)
Understanding of the cyber security threat landscape (reconnaissance, exploitation, malware, phishing, lateral movement, and data exfiltration),
Cyber Threat Analyst - $100-$140k
Sr. Manager - Insider Threat
By 3M At United States
Support daily operations for investigations, examinations, case management, alert development, responding to automated alerts as well as conducting in-depth analysis
Track and manage program metrics, KPIs, KRIs per leading industry benchmarks and demonstrate consistent risk management
Insider Threat Vulnerability Assessor and Program Manager Certifications, Carnegie Mellon University SEI CERT, or equivalent certification
Strong analytical skills, excellent communication skills and ability to effectively collaborate with cross-functional teams.
Experience with technical solutions that aid in detecting and mitigating insider threats
Knowledge of relevant legal/regulatory frameworks and standards, such as NIST, ISO, GDPR, CMMC, FedRamp, StateRamp
Cyber Security Threat Analyst
By BMC Software At ,
Coordinate and monitor, management of vulnerabilities reported by third-party pen-tests, third-party monitoring tools, and internal audits.
Bachelor’s/equivalent degree or higher in IT, CS, IS, with a focus in cybersecurity. Certifications a plus.
2+ years of experience in cybersecurity or information technology security role, with specialization in cyber threat intelligence.
Strong written, communication, and presentation skills along with the ability to work in a highly collaborative environment.
Understanding of the OWASP Top 10 vulnerabilities. Familiarity with 3rd party libraries and remediations.
Good deductive reasoning skills, creative thinker.
Cyber Threat Intelligence Internship
By Mastercard At , New York, 10011, Ny
Inter-team collaboration, educational presentations and projects will see the intern not just learn but also work closely with other business units
Volunteer and team building experiences
Assist in the research, analysis and composition of written threat intelligence reports for dissemination to Mastercard's customers
Networking sessions and leadership speakers series
Innovative thinking and thoughtful risk taking
Ability to partner across the organization
Manager, Competitive Intelligence Jobs
By Agenus At Lexington, MA, United States
Excellent project management, analytical, communication and research skills
Respond to ad hoc requests from senior management with expert analysis in a timely manner
Experience in a market intelligence role (in VCs / investment banks / biopharma / consulting firm or agency) preferred
Seasoned problem solver and able to manage multiple priorities
Agenus is Delighted to Provide you With a Comprehensive Benefits Plan, Including Some of the Following:
Liaise with internal teams to ensure development decisions integrate insights deduced from the external landscape changes
Cyber Threat Intelligence Analyst || **100% Remote
By Dice At United States
3-5 years of experience of active monitoring (SIEM or data aggregation systems), data analysis and cyber processes (monitoring, triage, escalations)
Knowledge of processes, procedures, and methods to research, analyze, and disseminate threat intelligence
Threat and Risk experience using industry best practices
Demonstrated critical thinking and problem-solving skills
Experience using proprietary and/or open-source tools to gather and analyze intelligence
Position : Cyber Threat Intelligence Analyst (100%Remote)
Cyber Threat Intelligence Intern
By Cowbell Cyber Inc. At , Pleasanton, 94566, Ca $30 an hour
Penetration testing experience and understanding of remediation techniques for common misconfigurations and vulnerabilities
Develop and maintain application scanning solutions to inform stakeholders of security weaknesses & vulnerabilities.
Review outstanding vulnerabilities with product teams and assist in remediation efforts to reduce risk
Help in developing the capability to automate triaging, validating, reporting and reproducing application vulnerabilities.
Detail-oriented student leader with problem solving, communication, and analytical skills.
On track to complete the requisite degree and a goal of successfully obtaining relevant certifications associated with your career field.
Cyber Threat Intelligence Analyst Ii (Remote)
By Home Depot / THD At , Atlanta, 30301, Ga $130,000 a year
Skilled at managing competing priorities.
Skilled at Key term Analysis.
Has a growth mindset and is looking to enhance their technical and soft skills.
Previous experience as an investigator in Law Enforcement, Military, or Government sectors
This Position typically reports to Manager or Sr. Manager
Minimum Years of Work Experience:
Cyber Threat Intelligence Analyst
By GEICO At , Chevy Chase, 20815, Md $70,000 - $185,000 a year
Assist in the coordination, validation, and management of all-source collection requirements.
Knowledge and experience working frame works such as Pyramid of Pain, Diamond Model, Kill Chain, and MITRE ATT&CK framework.
Bachelor’s degree in computer science, Information Systems, or equivalent education or work experience
Benefits may be different by location. Benefit eligibility requirements vary and may include length of service.
Produce timely notice of potential cyber attacks/threats or activities which may impact the business operations, objectives, resources, or capabilities.
Experience with creating and maturing intelligence reports and briefings.