Description: The Threat Intelligence Analyst is responsible for ensuring the ... enhance cybersecurity measures. The Threat Intelligence Analyst actively supports threat hunting activities and provides ...
2 days ago
Description: Top Skills' Details 1.) Threat Intelligence Analysis/ Cybersecurity Threat Hunting/ Incident Response/Regulatory Compliance ... (2-3 Years) 3.) Experience tapping into various threat intelligence sources 4.) Collaborating with different IT ...
3 days ago
... : 6-12+Months JD: The GSOC Intelligence Analyst plays a crucial role in protecting ... threats in real time. This position requires expertise in open-source intelligence ... personnel, facilities, and reputation. The analyst will work collaboratively across corpor
4 days ago
... Global Security Operations Center GSOC Intelligence Analyst is a critical member of the ... of global security threats and trends. The GSOC Intelligence Analyst will support all ...
a day ago
... advisor on advanced threat hunting operations, proactively identifying threats, insider misconduct, and ... .Lead hunt missions by leveraging threat intelligence, multi-source data, and brainstorming ...
3 days ago
$73,939
a year
... specific to the General Intelligence (Gen Intel) ... All-Source Intelligence Analyst, Geospatial-intelligence Imagery Analyst, GEOINT Targeting Analyst, or ... All Source Intelligence Analyst, Geospatial-Intelligence Imagery Analyst, GEOINT Targeting Analyst, or ...
17 days ago
... Employment Type: ContractDescription: * As a Business Intelligence Analyst, you will support project teams ...
20 days ago
$114,331
a year
... CONUS; AND conducting intelligence operational and specific issue ... intelligence analysis and/or production, intelligence collection and/or operations, counterintelligence, or threat ... demonstrate: Knowledge of intelligence processes, cycle and organizations ...
9 days ago
... closing the loop by integrating intelligence into the operations of the ... the full spectrum of Business Intelligence.Job Description: The Transportation Security ...
19 days ago
... and proactive Cybersecurity Program Manager / Analyst to protect our organization s ... infrastructure, and data from cyber threats. This individual will be responsible ... for identifying assessing our threat landscape, identifying gaps, developing ...
4 days ago
Description: Job Title: Cybersecurity Analyst Location: DFW Airport, TX 75261 ( ... Cybersecurity Analyst to join our team. This role focuses on threat mitigation ... to protect against evolving cyber threats. The ideal candidate will be ...
12 days ago
$124,531
a year
... : Serve as a Supervisory Procurement Analyst for the 418th Contracting Support ... authorities. Current Army Defense Civilian Intelligence Personnel System (DCIPS) Employee ... . Basic Requirement for Supervisory Procurement Analyst: Degree: Bachelor's degree (or ...
27 days ago
... exciting opportunity for a Business Intelligence (BI) Analyst based in San Antonio, Texas ... and initiatives. Responsibilities: Utilize business intelligence tools to create accessible and ...
7 days ago
Description: Title: AI Governance Analyst Location: Houston, TX 77002 (hybrid) ... is seeking an Artificial Intelligence Data Governance Analyst for one of its ...
6 days ago
Description: Business Intelligence (BI) Analyst Accounting Focus Location: Downtown Houston ( ... :We re looking for a BI Analyst with a strong accounting foundation to ...
24 days ago
... client is currently seeking a Data Analyst Why you'll love this ... Reporting Team within the Customer Intelligence Division.Responsible for liaising with ...
5 days ago
$106,932
a year
... to serve as Leaming Environment Analyst in the Directorate of Plans ... operation of the Directorate of Intelligence, Analysis, and Innovation at Air ...
20 days ago
... Description: This Cybersecurity Training & Awareness Analyst will work as part of ... team members about key cyber threats with the goal of reducing ...
3 days ago
... transition Description The Data Security Analyst is responsible for implementing and ... unauthorized access, breaches, and cyber threats.
5 days ago
... project by applying information security threat intelligence to identify and exploit vulnerabilities ...
6 days ago
- 1
- 2