for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities: Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations Author, update, and maintain SOPs, playbooks, work instructions Utilize Threat Intelligence and Threat Models to create threat hypotheses Plan and scope Threat Hunt Missions to verify threat hypotheses Proactively and iteratively search through systems and networks to detect advanced threats Analyze host, network, and application logs in addition to malware and code Prepare and report … risk analysis and threat findings to appropriate stakeholders Lead cyber threat hunt missions with minimal supervision or guidance and recommend courses of action, best practices, and mitigating actions to improve security practices. Established ability to write clearly and concisely regarding technical and non-technical products based on more »
overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities: Will conduct cyber threatanalysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness . Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's IT operating environment. Identify , track and investigate , and write technical products … for dissemination to stakeholders regarding high priority threat campaigns, malicious actors , APTs , emerging threats, etc . Bring a comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cybersecurity posture of the organization's more »
Description Leidos is seeking a talented Cyber Threat Intelligence Analyst to join our team to support a federal customer within the customers Security Operations. The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following: Identify, track and investigate high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures). A comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cyber security posture of the organization's IT operating … least 5 years in incident detection and response and/or cyber intelligence analysis. Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable. Provide support to security more »
Bristol Area, South West, United Kingdom Hybrid / WFH Options
Electus Recruitment Solutions Limited
systems engineering principles It would be desirable for you to have one of the following as well: Knowledge of Integrated Air Defence Systems (IADS) Threatanalysis experience Knowledge of EW techniques and tactics Experience working with relevant government agencies, such as DSTL Key Information: Role: Electromagnetic Warfare and … Stevenage Hybrid Working: 2-3 Days a Week On-Site Key skills Electromagnetic warfare, EW, modelling and simulation, MATLAB, Simulink, systems engineering, systems and threatanalysis, requirements gathering, V&V, whole product lifecycle, defence, SC, IADS You will be successful in this role if you are an engineering more »
London, England, United Kingdom Hybrid / WFH Options
Electus Recruitment Solutions Limited
systems engineering principles It would be desirable for you to have one of the following as well: Knowledge of Integrated Air Defence Systems (IADS) Threatanalysis experience Knowledge of EW techniques and tactics Experience working with relevant government agencies, such as DSTL Key Information: Role: Electromagnetic Warfare and … Stevenage Hybrid Working: 2-3 Days a Week On-Site Key skills Electromagnetic warfare, EW, modelling and simulation, MATLAB, Simulink, systems engineering, systems and threatanalysis, requirements gathering, V&V, whole product lifecycle, defence, SC, IADS You will be successful in this role if you are an engineering more »
a skilled and experienced SOC Engineer to join our team on a contract basis. The ideal candidate will have a strong background in Cyber Analysis, with expertise in SOC environments, SIEM & Incident Management, Vulnerability Management, and Endpoints or Threat Analysis. Key Responsibilities: - Conduct thorough Cyber Analysis to … handle Incident Management, responding promptly to security alerts and breaches. - Implement and oversee Vulnerability Management processes to identify and mitigate potential security risks. - Conduct analysis of endpoints and threats to enhance overall security posture. Qualifications: - Proven experience in Cyber Analysis and Security Operations. - Proficiency in working with SOC … utilizing SIEM tools. - Strong knowledge of Incident Management processes and procedures. - Experience in Vulnerability Management to address potential security vulnerabilities. - Expertise in Endpoints or ThreatAnalysis to enhance threat detection and response. Requirements: - Bachelor's degree in Computer Science, Information Security, or related field. - Relevant certifications such more »
laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * ThreatAnalysis * Use of vulnerability management tools * Malware reverse engineering * Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive more »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »
for endpoint protection In-depth Experience utilizing and supporting Microsoft Defender, Entra ID, Intune Extensive experience working in a zero trust environment Configure advanced threat protection policies, conduct threatanalysis, and respond to security incidents. Monitor and analyze security logs, alerts, and reports to ensure effective threatmore »