Average salary: $129,642 /yearly
More statsSearch Results: 29 vacancies
...a Technical Product Manager to execute the product strategy for Match Group's integrated suite of services that share fraud and bad actor information across the portfolio.
The ideal candidate has the business acumen to evaluate and execute trust and safety priorities...
Suggested
Holiday work
Work experience placement
Remote job
Worldwide
Flexible hours
...threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
Minimum of 3 years; experience with Security Orchestration, Automation, and Response (SOAR)...
Suggested
Work experience placement
Local area
...Engineering and Architecture teams as to why Information Security is an important function to the business.
~ Ability to think like a bad actor and use that context to develop threat models.
~ Understanding and working experience with cloud / server / container /...
Suggested
Holiday work
Contract work
Work experience placement
Remote job
Worldwide
...work with clients across technology teams
Preferred Qualifications
In depth knowledge of cyber security including threat actor tactics, techniques and procedures
Experience with Windows Systems Management and Patch management Technologies (SCCM, MECM,...
Suggested
...background to support the security posture of our clients.
+ Leverage your understanding of the product development lifecycle and a threat actor mindset to conduct code review.
+ Use your cybersecurity knowledge to identify vulnerabilities and potential exploits known from...
Suggested
Work experience placement
Local area
...investigations and inform clients.
+ Performing analyses to assess complex fact patterns and attribute those patterns to activities, actors, or entities.
+ Applying analytical expertise, initiative, and innovative solutions to support complex cyber issues to including...
Suggested
Remote job
...effectiveness of the bank's security controls, incident response capabilities, and overall resilience.
Identify and track threat actor Tactics, Techniques, and Procedures (TTPs).
Use a variety of tools, techniques, and threat intelligence sources to analyze logs,...
Suggested
For contractors
Bank staff
...world’s number one burrito… of course) we are all different. We are foodies, musicians, runners, creators, activist, powerlifters, actors, and every other type of person. We celebrate diversity and are committed to creating an inclusive workforce. We are one family and...
Suggested
Holiday work
...development and performances
# Enhance business workflows by providing insightful analysis
# Create automated process of identifying bad actors
QUALIFICATIONS
Excellent understanding of machine learning techniques and algorithms, such as gradient boosting...
Suggested
...world’s number one burrito… of course) we are all different. We are foodies, musicians, runners, creators, activist, powerlifters, actors, and every other type of person. We are one family and one TRIBE!
WHAT WE GIVE:
Competitive wages + quarterly bonuses
Paid...
Suggested
Holiday work
...Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and...
Suggested
Holiday work
Local area
Remote job
Worldwide
...leadership to present information and influence change
What we are looking for
Proven track record of mitigating with advanced threat actors and nation state threats
Expert technical understanding of SOCs from the ground up
In depth knowledge of SOC architecture and...
Suggested
...understanding of cyber threat vectors, how they are used to exploit an information system and techniques and tools used by malicious actors to violate the confidentiality, integrity and availability of information systems. Datasets support is required for numerous...
Suggested
Remote job
...leadership role, Head of Global System Integrator (GSI) Alliances, to lead our business development and partnership with these important actors in the global technology sector. As the publisher of Ubuntu and the leading provider of open source to major technology firms...
Suggested
Holiday work
Remote job
Work from home
$140k
...detect and manage cyber threats. The Cybersecurity Engineer will identify, monitor, assess, and counter the threats posed by cyber actors against our information systems. You will provide strategic assessment, tactical analysis, and recommendations for risk reduction operations...
Suggested
Full time
Work experience placement
Local area
Immediate start
Remote job
2 days per week
$55 - $60 per hour
...to engage the applications and planning some clean re-build or bare metal restore events.
An application gets affected by a bad actor and recovery environment/back up environment is impacted so the plan would be to rebuild the application from scratch and doing this...
Contract work
Temporary work
Work experience placement
Worldwide
Flexible hours
...detect and manage cyber threats. The Cyber Security Analyst will identify, monitor, assess, and counter the threat posed by cyber actors against our information systems. You will provide strategic assessment, tactical analysis and recommendations for risk reduction operations...
Full time
Work experience placement
Remote job
Monday to Friday
...Competencies: Cyber Security Digital : Threat Hunting
Experience (Years): 46
Essential Skills: Deep understanding of cyber threat actor attacker techniques and tools (such as malware common attack types) including evasion techniques reconnaissance scanning...
....
Engage the applications and planning some clean re-build or bare metal restore events. An application gets affected by a bad actor and recovery environment/back up environment is impacted - so would be to rebuild the application from scratch with the critical applications...
Contract work
3 days per week
...to engage the applications and planning some clean re-build or bare metal restore events.
An application gets affected by a bad actor and recovery environment/back up environment is impacted so the plan would be to rebuild the application from scratch and doing this...
Contract work
Remote job