with HPE level 3 support and engineering teams to diagnose complex issues and implement resolution actions Interact with third parties involved in the overall HPC solution: Red Hat, AMD, Intel, Nvidia, SchedMD, Collaborate with the Customer sysadmin and support teams Manage the customer relationship, including verbal & written communication We are looking for an experienced IT professional: With expert level More ❯
Senior System Engineer needed in Ft. Belvoir area to support: General description: -Familiarity with DCSG-A and intel data types -TS/SCI -experience with test and integration of intelligence systems and data -system engineering background in intelligence community Onyx offers a competitive compensation including medical and dental benefits and a 401K More ❯
Primary Job Duties and Required Work Experience: 1. Working in a fast-paced, dynamic environment supporting the development of Artificial Intelligence (AI) engineering and capabilities. 2. Working closely with Intel government customers and IT developers to create artifacts for AI architecture and AI security based on experience and real-world considerations. 3. Expert in the field of AI with More ❯
Big Picture has provided technical sales and training teams to the IT and electronics industry worldwide since 1996. Clients have included Dell, Intel, Microsoft, Canon, Amazon, and Lenovo, working across all segments and verticals. Big Picture's award-winning teams work with direct sales, channel partners, and customers to drive adoption of new technologies and innovative solutions to a More ❯
stability, mission-critical work, and the opportunity to advance your cleared career in a fast-paced environment. Current High-Priority Needs: • Intelligence Analysts - Located in Hawaii, supporting national-level intel operations from Junior to Senior levels! • Systems & Infrastructure Engineers - Located in Miami, North Carolina, and Virginia, focused on enterprise infrastructure, administration, and engineering support at all levels of experience More ❯
18+ months customer success experience for a business intelligence platform? Do you have experience of upselling and rebooking subscriptions clients? Want to work for a dynamic and growing business intel and events business? Like the idea of onboarding, training and retaining finance sector clients? If yes, please read on The Company The company delivers data-driven insights, analytics, advisory More ❯
with an 80% retention rate) as well as a number of launch events and you will be primarily selling to tech clients, including the likes of Microsoft, NVidia, ARM, Intel and similar. Since there are a high number of launch events planned in the next 12 months you will likely spend 70% of your time focused on winning new More ❯
caged • Needs work between jobs • Is transitioning out of the military • Someone seeking to relocate to the area needing income while looking for other jobs! • Is targeting less-intensive intel position _ Exact compensation may vary based on several factors, including skills, experience, and education. Employees in this role will enjoy a comprehensive benefits package starting on day one of More ❯
Headquarters Ops and Intel Support, Intelligence, Surveillance, and Reconnaissance Technical Portfolio Manager The Ascendancy Group's Mission To be the unequaled provider of special operations forces (SOF) and Intelligence Community focused technical, service, and training-based solutions. Overview As a TAG ISR Technical Portfolio Manager, you will provide support to Headquarters Operations Intelligence Support, and the Mission Support Center More ❯
Headquarters Ops and Intel Support, Intelligence, Surveillance, and Reconnaissance Technical Portfolio Manager The Ascendancy Group's Mission To be the unequaled provider of special operations forces (SOF) and Intelligence Community focused technical, service, and training-based solutions. Overview As a TAG ISR Technical Portfolio Manager, you will provide support to Headquarters Operations Intelligence Support, and the Mission Support Center More ❯
Microsoft Sentinel for threat hunting within Microsoft Azure; Tenable Nessus and SYN/ACK for vulnerability management; NetScout for analyzing network traffic flow; SPUR.us enrichment of addresses Mandiant Threat intel feeds Must be able to work 80% (Monday thru Thursday) onsite at AOUSC office in Washington, DC Desired Qualifications include: One of the following certifications: GIAC Certified Intrusion Analyst More ❯
studies. Share insights with Product that inform continuous product and feature improvements. Market & Competitive Analysis Stay on top of industry trends, competitive landscape, and customer needs. Keep a competitive intel repository to track features, pricing, and positioning moves from direct and indirect competitors. Use these insights to influence product roadmap decisions and suggest feature differentiators or areas where the More ❯
out threat detection and incident response. Carries out vulnerability management and remediation. Collaborates as needed with third-party security vendors for expert advice and issue resolution. Carries out threat intel research and recommends security improvements. Qualifications Extensive knowledge of cyber security with a strong technical background. Detailed understanding of application security along with experience of working alongside software development More ❯
on new creative and smarter ways of doing things. We are growing rapidly with a client portfolio of the worlds' leading brands including the likes of Warner Music Group, Intel, P&G, Uber Eats, McDonalds and more. Job Title: Head of Finance Location: AUH, UAE Reports To: Founders (CEO & CTO) About Audiomob We have an exciting opportunity for a More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Bede Gaming
Principal Data Engineer Department: Intel Employment Type: Permanent Location: Newcastle-upon-Tyne Reporting To: Head of Data Description We're looking for a Principal Data Engineer to join the team responsible for delivering trusted, high-quality data products that power decisions across Bede. Reporting to the Head of Data, you'll be a respected technical authority, owning the design More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
to-day role to management. How You'll Do It Maintains an in-depth knowledge of security trends, attacker techniques, and relevant threat actors Use data analysis and threat intel to detect, disrupt, and eradicate threat actors. Proactively detects advanced threats and adversaries that evade traditional security controls. Develops hunt scenarios, translate them into iterative processes, and leverage findings More ❯
that automatically regenerates real-time Live Event Briefs as events unfold. Learn more here . Agentic AI : we recently launched our Agentic AI capability, what we're calling our Intel Agents, that autonomously generates critical context for our clients on real-time events, threats, and risks allowing them to see the clearest, most accurate view of what's happening More ❯
depending on experience and skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews, vendor assessments, and internal audits More ❯