Average salary: $122,500 /yearly
More statsSearch Results: 2,680 vacancies
...facilitate mitigations oncustomer systems
Perform daily cyber threat research and present findings to the organization to maintain... ...PhD
Certified Ethical Hacker (CEH)
GIAC Certified Intrusion Analyst (GCIA)
Possess DoD 8570.01-M Information Assurance Technician...
Suggested
...Threat Detection Engineer
Full-Time, Exempt
Location: Scottsdale, AZ; On-site
Salary: Competitive Base + Options!
Lumifi... ...First-hand security operations center (SOC) experience performing analyst/security engineer duties.
Deep understanding of how...
Suggested
Holiday work
Full time
Temporary work
...PREFERRED QUALIFICATIONS
~ Certified Ethical Hacker (CEH), GIAC Certified Intrusion Analyst (GCIA), and IAT Level II Baseline Certification
We are seeking a Senior Threat Analyst (DCO) to join our Global Cyber Center team. This position is contingent upon contract...
Suggested
Holiday work
Full time
Contract work
Temporary work
For contractors
Weekend work
Day shift
Afternoon shift
Monday to Friday
...what they’re doing!
We’re committed to bringing passion and customer focus to the business.
The Role
As a Proofpoint Threat Researcher, you will perform malware analysis, campaign analysis, and hunting through Proofpoint data to make threat information meaningful...
Suggested
Local area
Remote job
Work from home
Flexible hours
...bringing passion and customer focus to the business.
This role is responsible for creating detections rules for our Emerging Threats Pro IDS ruleset and as well as static detections for email-based threats. You’ll research an ever-changing landscape of phishing,...
Suggested
Worldwide
Flexible hours
...Duration: 12+ Months
Position: Information Security Analyst
Location: Irving TX/Chandler AZ/Charlotte NC/ Dallas TX... ...Azure, Google or AWS.
~ Understanding of information security threats, trends and industry best practices and security tools.
~ Finance...
Suggested
Hourly pay
Contract work
Temporary work
Work experience placement
Immediate start
Worldwide
Flexible hours
...We are seeking a detail-oriented and analytical Device Fraud Analyst to join our dedicated team. In this role, you will play a crucial... ...techniques, and technologies, and proactively identify new fraud threats and vulnerabilities
Provide support and expertise to...
Suggested
Flexible hours
Overview:
We’re on the lookout for an Automotive Cybersecurity Threat Hunter - Intern . We are looking for a self-motivated individual with a passion for cybersecurity . Somebody who will proactively advocate with stakeholders across engineering and manufacturing...
Suggested
Internship
...Employee must pass initial and periodic short notice drug testing. Illegal drug use by employees in sensitive positions presents a clear threat to the mission of the Air Force, national security, and public safety. In order to qualify, you must meet the specialized...
Suggested
Temporary work
Part time
Work experience placement
...Sev1Tech is looking for the Cyber Threat Hunter to play a role on a very large program involving network, cybersecurity, and cloud operations... ...At least four (4) years of experience serving as a SOC Analyst and/or Incident Responder Ability to work independently with minimal...
Suggested
Full time
Contract work
Local area
Immediate start
...drug use by employees in sensitive positions presents a clear threat to the mission of the Air Force, national security, and public... ...Ability to plan, organize, and negotiate effectively with senior analysts and management to accept and implement recommendations, where proposals...
Suggested
Holiday work
Permanent employment
Full time
Temporary work
Part time
Work experience placement
Local area
Afternoon shift
Job Description
Job Description
Are you a person who excels at establishing and maintaining standards of quality and accuracy?
Do you enjoy working in a pace that is faster than average but still maintains a high level of quality?
Do you like sharing ideas and...
Suggested
Full time
Work from home
Home office
Shift work
- Expert-level incident analysis responsible for providing guidance to the other SOC analysts
-Perform threat hunting and investigations into potential threats based on log data and provide the results of the analysis to management
-Provide recommendations to improve...
Suggested
Local area
2626 W Beryl Ave Phoenix Arizona, 85021,
Position Description :
Maintains thorough familiarity with applicable Human Resources (HR) systems, taking initiative to consistently look for ways to make HR systems more efficient and effective. Researches issues and enhancement...
Suggested
Holiday work
Work experience placement
Immediate start
Shift work
...supervise the SOC team, providing guidance, support, and mentorship to analysts.
-Manage day-to-day operations, ensuring optimal performance and adherence to established procedures.
-Perform threat hunting and investigations into potential threats based on log data...
Suggested
...immediate opening for an Intermediate level Applications Systems Analyst located in Ft. Huachuca, AZ. This position will support the... ...local law.
DVS has a zero-tolerance policy for harassment, threats, coercion, discrimination, and intimidation. Employees may file...
Holiday work
For contractors
Local area
Immediate start
Weekend work
Job Description The SMG Price Process and Compliance team defines the standardized processes, policies, and system business requirements across Intel's Direct and Distributor exception pricing and rebate environments. We are central to how exception pricing and rebates...
Local area
...Security Analyst (L1) - Swing
Full-Time, Exempt
Location: on-site, Scottsdale, AZ
We are looking for a Security Analyst to... ...contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments...
Holiday work
Full time
Temporary work
Afternoon shift
...talented, energetic, hands-on, and proactive Information Security Analyst to maintain and operate Deem's Information Security programs.... ...policies and driving processes based on a combination of threat intelligence and regulatory compliance.
Responsibilities...
...Primary City/State:
Phoenix, Arizona
Department Name:
IT Threat & Vulnerability Mgmt
Work Shift:
Day
Job Category:
Information Technology
Come do great work on behalf of better health!
POSITION SUMMARY
This position is responsible for implementation...
Shift work