Threat Analyst Jobs
By Google At Virginia, United States
2 years of experience leading investigations into and generating novel leads on espionage activity.
Experience writing and presenting on various topics and assessments for an audience with mixed backgrounds.
Experience correlating and attributing malicious activity based on technical and geopolitical factors.
Experience tracking adversaries via network infrastructure and malicious artifacts.
Experience identifying and prioritizing cyber threats for investigation.
Experience mentoring and supervising analysts.
Insider Threat Analyst Jobs
By USAJOBS At Washington, DC, United States
DHS does not offer any additional benefits beyond that which the Federal employee is already receiving.
Must be a current permanent Federal employee
Must have supervisory approval to apply to the Joint Duty Assignment. DHS 250-2 Application Form under "required documents" section.
Must NOT have any pending/outstanding disciplinary actions
Must have achieved a minimum of "meet expectations/proficiency" on latest performance appraisal/evaluation
Must be currently at the grade level of the detail. *No Temporary Promotion Opportunity*
Threat Analyst (Us Remote)
By Sophos At ,
Experience with enterprise information security data management - SIEM experience
Programming and scripting skills - proficient knowledge of Powershell
Acknowledge and satisfy inbound customer requests and interact with customers through various mediums
Actively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers
Excellent troubleshooting and analytical skills, with proven ability to think outside the box
Customer service-oriented with strong written and verbal communication skills
Threat Monitoring Analyst Jobs
By Verizon At , Temple Terrace $77,000 - $143,000 a year
Experience with network, TCP/IP and endpoint skills.
Coordinating with Senior Analysts and/or Duty Manager for high priority incidents.
Associate's degree or two or more years of work experience.
Three or more years of relevant work experience.
Two or more years of experience with security incident monitoring and threat investigations.
SANS or other Security industry certifications such as GCIA, GCIH, GREM, or GPEN ITIL Foundations training / certification.
Sr. Security Engineer - Insider Threat ** Remote - Cincinnati, Oh
By U.S. Bank National Association At , Remote $92,480 - $119,680 a year
Identify, define and document system security requirements and recommend solutions to management.
Two or more years of experience in IT infrastructure management, application architecture, risk management, middleware technology, and IT project management
Participating in the change management process.
Ability to work cooperatively and professionally with co-workers, customers and management
Bachelor's degree in Engineering or Science, or equivalent work experience
Five or more years of experience in information security
Threat Analyst 1 Jobs
By Aperio Global, LLC At Fort Meade, MD, United States
Stay up to date with emerging threat trends and technological advancements to enhance threat assessment capabilities
Conduct in-depth research and analysis of adversarial threats targeting various systems, technologies, operations, or missions
Utilize diverse intelligence sources to gather relevant threat data and contribute to comprehensive threat profiles
Collaborate with multidisciplinary teams to assess the likelihood of potential threats and their potential impacts
Assist in the development of threat assessment reports and contribute insights for informed decision-making
Threat Response Analyst (Remote)
By CrowdStrike At , Remote $90,000 - $150,000 a year
Two (2) or more years of significant client-facing experience
Managed or enterprise information security services
Bonus points for experience with big-data processing tools such as Splunk, Humio, Logstash, Kibana, etc.
Strong written and verbal communication skills
Strong understanding of MITRE ATT&CK techniques / sub-techniques and ability to articulate TTPs to customers of varying technical abilities
Comprehensive and inclusive health benefits
Consultant, Threat Analyst Jobs
By Crisis24 At Boca Raton, FL, United States
Time management skills, including the ability to keep to tight deadlines
Delivery of support to Crisis24 Management for the provision of Crisis Response and Security Risk Management services
A strong understanding on Security and Risk Management principles based on best practise standards
Work to the Operations Manager to coordinate activities between the Operational Support Team
International Relations (or similar) at a master’s level qualification is preferable
3+ years relevant industry specific experience
Threat Analyst (Us Remote)
By Sophos At United States
Experience with enterprise information security data management - SIEM experience
Programming and scripting skills - proficient knowledge of Powershell
Acknowledge and satisfy inbound customer requests and interact with customers through various mediums
Actively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers
Excellent troubleshooting and analytical skills, with proven ability to think outside the box
Customer service-oriented with strong written and verbal communication skills
Insider Threat Analyst Jobs
By Akraya, Inc. At San Jose, CA, United States
Bachelor's degree or equivalent experience
Excellent written and oral communication skills
Conduct tactical analysis of information streams to detect potential indications of insider threats for referral to appropriate investigators.
Develop and execute effective and efficient workflows to review the information for leads.
Conduct statistical analysis of alerts to identify patterns and develop mitigation strategies.
Prepare and deliver briefings to stakeholders about insider events and trends.
All-Source Threat Analyst Jobs
By Take2 Consulting, LLC At Chantilly, VA, United States

Preferred: Experience/knowledge with crypto currency, SIGNT, and HUMINT.

Top Secret Clearance Require with the ability to obtain a CI Poly

Pizza Maker/Restaurant Insider (East)
By Toppers Pizza, LLC At Waukesha, WI, United States

Whether you have prior restaurant experience or none at all, Topper’s is always on the looking for motivated Team Members. As a Toppers Insider, you have the opportunity to work in a FUN atmosphere ...

Insider Threat Analyst Jobs
By General Motors At Roswell, GA, United States
Knowledge of industry best practices and standards related to insider threat management.
Experience in analyzing and investigating insider threat incidents, identifying vulnerabilities, and recommending security measures.
Document and develop requirements for onboarding of use cases, log data sources and detections
At least 3-5 years of experience working in cybersecurity, with a focus on insider threat detection and mitigation.
Identify , Deter, Detect, & Mitigate actions by employees who may represent a threat or risk to GM
Apply lessons learned methodologies from previous cases to new detection methods
Insider / Pizza Maker Jobs
By Domino's At Acton, MA, United States

Job Description We're looking for outgoing, courteous, and hard-working candidates who are excited to assist customers in finding the perfect pizza-topping combination. This is a FULL-TIME and ...

Pizza Maker/Restaurant Insider
By Toppers Pizza, LLC At Greater Indianapolis, United States
Rapid Advancement Opportunities (Manager & Supervisor in Training Programs)
Prepare our delicious food for our Toppers fanatics
Take orders in person and over the phone
Stock ingredients in the various work stations including the walk-in cooler
Clean equipment and the store
Visa Paycard for those that are unbanked
Threat Analyst Jobs
By Tesla At Fremont, CA, United States
BS/MS in Computer Science, Information Systems, Electrical Engineering, or the equivalent in experience and evidence of exceptional ability
Knowledge of security systems and deep understanding the life cycle of network attacks, threats, attack vectors, and methods of exploitation
Experience with manual analysis of malware, phishing kits, network captures, exploits etc.
Experience writing rules and signatures using frameworks such as YARA, Snort, and Sigma Experience using platforms like ELK or Splunk
Family-building, fertility, adoption and surrogacy benefits
401(k) with employer match, Employee Stock Purchase Plans, and other financial benefits
Threat Investigation Analyst Jobs
By Sentinel At Downers Grove, IL, United States
3+ years of experience in cybersecurity required
Experience in performing queries on a Splunk platform and the ability to analyze the data
Understanding of complex Enterprise networks (EDR, routing, switching, firewalls, proxies, etc.) including previous MSSP experience.
Demonstrated knowledge of common/emerging attack techniques
Craft, maintain, and document detection opportunities within our proprietary security platform
Perform necessary correlation and research to create useful, compelling, and context-rich alerts for our customers
Security Analyst (Threat Hunter)
By Motion Recruitment At Phoenix, AZ, United States
3+ years of managed detection and response experience in a security-focused role
Experience with scripting or automation in at least one common language
Bachelor’s degree in Information Security, a related field, or equivalent work experience
Prior expertise threat hunting with an EDR tool
Ability to work with clients and present results in a consultative, professional manner
401(k) {including match- if applicable}
Associate Analyst Ii, Threat Detection & Monitoring
By AbbVie At Waukegan, IL, United States
Assist with thoroughly documenting work and presenting analysis to management.
Education & Experience - Minimum of one of the following:
Demonstrated critical thinking, problem solving, and analytical skills
Foundational knowledge of security controls and concepts (e.g. anti-virus, EDR, IPS/IDS, DLP, vulnerability scanners, application security)
Foundational knowledge of major operating systems, common networking protocols, systems administration, and security technologies
Strong organization skills with attention to detail
Insider Threat Analyst Jobs
By U.S. Bank At Richfield, MN, United States
Technical knowledge and analytical capabilities to detect patterns and anomalies across data sets of technical and non-technical indicators.
Bachelor's degree or equivalent work experience
1+ year experience supporting an enterprise-wide Insider Threat program.
Experience writing queries with SQL or SPL.
Experience analyzing security events and activities with a variety of data analysis and visualization tools (such as: Splunk, Net Witness, Proofpoint).
Experience with NIST 800 series, NIST CSF, and ISO 27000 series frameworks.

Are you looking for an exciting opportunity to use your expertise in insider threat analysis to help protect a company's most valuable assets? We are seeking an experienced Insider Threat Analyst to join our team and help us identify and mitigate potential risks posed by malicious insiders. If you have a passion for security and a knack for uncovering hidden threats, this is the perfect job for you!

Overview An Insider Threat Analyst is a security professional who is responsible for identifying, analyzing, and responding to potential threats posed by insiders within an organization. They use a variety of methods, including data analysis, interviews, and investigations, to identify and mitigate potential threats. Detailed Job Description An Insider Threat Analyst is responsible for identifying, analyzing, and responding to potential threats posed by insiders within an organization. This includes monitoring and analyzing employee activities, identifying suspicious behavior, and responding to incidents. The analyst must be able to identify and assess potential threats, develop strategies to mitigate them, and communicate the results to management. The analyst must also be able to work with other departments to ensure that the organization is compliant with applicable laws and regulations. Job Skills Required
• Knowledge of security principles, policies, and procedures
• Knowledge of insider threat detection and prevention techniques
• Ability to analyze data and identify patterns
• Ability to identify and assess potential threats
• Ability to develop strategies to mitigate threats
• Ability to communicate effectively with management and other departments
• Ability to work independently and as part of a team
• Ability to work under pressure and meet deadlines
Job Qualifications
• Bachelor’s degree in computer science, information security, or a related field
• Relevant certifications such as CISSP, CISM, or CISA
• 3+ years of experience in information security or related field
• Knowledge of security principles, policies, and procedures
• Knowledge of insider threat detection and prevention techniques
• Experience with data analysis and pattern recognition
• Experience with incident response and investigation
Job Knowledge
• Knowledge of security principles, policies, and procedures
• Knowledge of insider threat detection and prevention techniques
• Knowledge of data analysis and pattern recognition
• Knowledge of incident response and investigation
• Knowledge of applicable laws and regulations
Job Experience
• 3+ years of experience in information security or related field
• Experience with data analysis and pattern recognition
• Experience with incident response and investigation
• Experience with developing strategies to mitigate threats
• Experience with communicating effectively with management and other departments
Job Responsibilities
• Monitor and analyze employee activities to identify suspicious behavior
• Identify and assess potential threats
• Develop strategies to mitigate threats
• Communicate results to management
• Work with other departments to ensure compliance with applicable laws and regulations
• Respond to incidents and investigate potential threats