United, Pennsylvania, United States Hybrid / WFH Options
United Airlines
embed cybersecurity into the DNA of United Airlines by reducing business risk through implementation of strong cybersecurity standards. Job overview and responsibilities The Principal Engineer for Data Protection & Insider Threat will play a critical role in leading and enabling a team of analysts through the implementation of advanced technology solutions aimed at preventing, detecting, and responding to Insider Threats. … who is passionate about reducing cyber threats and enabling teams to achieve their mission through innovative solutions. Team Enablement: Collaborate with analysts to implement technology solutions that enhance Insider Threat prevention, detection, and response capabilities Program Development: Enable solutions that support a successful Data Loss Prevention (DLP) program and Insider Threatdetection and response initiatives Strategic … Partnership: Work closely with Data Protection and Insider Threat Sr Analysts to define and execute technology strategies for mitigating risks associated with open egress vectors Risk Reduction: Leverage technical expertise and interpersonal skills to influence tool and process decisions that reduce cyber threat risks and attack surfaces across the enterprise Roadmap Management: Partner with lead analysts to identify More ❯
Chicago, Illinois, United States Hybrid / WFH Options
United Airlines
embed cybersecurity into the DNA of United Airlines by reducing business risk through implementation of strong cybersecurity standards. Job overview and responsibilities The Principal Engineer for Data Protection & Insider Threat will play a critical role in leading and enabling a team of analysts through the implementation of advanced technology solutions aimed at preventing, detecting, and responding to Insider Threats. … who is passionate about reducing cyber threats and enabling teams to achieve their mission through innovative solutions. Team Enablement: Collaborate with analysts to implement technology solutions that enhance Insider Threat prevention, detection, and response capabilities Program Development: Enable solutions that support a successful Data Loss Prevention (DLP) program and Insider Threatdetection and response initiatives Strategic … Partnership: Work closely with Data Protection and Insider Threat Sr Analysts to define and execute technology strategies for mitigating risks associated with open egress vectors Risk Reduction: Leverage technical expertise and interpersonal skills to influence tool and process decisions that reduce cyber threat risks and attack surfaces across the enterprise Roadmap Management: Partner with lead analysts to identify More ❯
and experience: - Experience designing a Security Operations Centre (SOC) within a secure environment Experience implementing a target operating model for a Security Operations Centre Expertise in security monitoring design, threatdetection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience … in risk and threat modelling within a high-threat government environment To apply, please submit your latest CV for review More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
and experience: - Experience designing a Security Operations Centre (SOC) within a secure environment Experience implementing a target operating model for a Security Operations Centre Expertise in security monitoring design, threatdetection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience … in risk and threat modelling within a high-threat government environment To apply, please submit your latest CV for review More ❯
re a builder with a passion for people and AI-driven innovation, we want to talk to you. What Are The Responsibilities? Architect and implement AI-powered features for threatdetection, pattern recognition, and automated intelligence gathering Design and build scalable data pipelines that process billions of data points using AI/ML models for entity extraction and … relationship mapping Lead the integration of Large Language Models (LLMs) for natural language processing of intelligence data Develop robust APIs and microservices that handle real-time threat analysis at scale Implement computer vision systems for image and video analysis in OSINT investigations Build and optimize vector databases for semantic search across massive intelligence datasets Establish best practices for AI … Docker, Kubernetes) Experience with infrastructure as code (Terraform, CloudFormation) Expertise in building real-time streaming architectures Experience building production AI systems handling sensitive data Knowledge of AI safety, bias detection, and ethical AI practices Familiarity with computer vision and NLP techniques for OSINT Understanding of adversarial AI and security implications Proven track record of leading complex technical projects Ability More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Metronome LLC
Cyber Hunt Analyst with Data Science experience to apply strong cyber security, Defensive Cyber Operations (DCO) and networking domain knowledge to support cyber analytics product development and model development, threat analysis, and direct customer mission support. Work is performed mostly on customer site in Colorado Springs, CO. Must be open to some travel as well. Required Skills Security Clearance … related fields and a Bachelors in related field or 3 years experience with Masters; or High School Diploma and 9 years experience. Knowledge of Defensive Cyber Operations (DCO), including threat hunting methodologies. Technical experience with cyber data analysis to include continuous monitoring, intelligence, and reporting. Proficient in various query languages (SQL, KQL (Kusto). Python experience, and bonus for … experience using Jupyter notebooks. Experience with dashboarding/visualizations (Power-Bi, Superset, Kibana). Ability to abstract threat hunting concepts to look at the 'big picture' and discover threats that aren't captured by traditional methods (e.g. SIEMs). Experience in big data hunting analysis and reporting. Developing and deploying threatdetection signatures. Detecting host and network More ❯
re a builder with a passion for people and AI-driven innovation, we want to talk to you. What Are The Responsibilities? Architect and implement AI-powered features for threatdetection, pattern recognition, and automated intelligence gathering Design and build scalable data pipelines that process billions of data points using AI/ML models for entity extraction and … relationship mapping Lead the integration of Large Language Models (LLMs) for natural language processing of intelligence data Develop robust APIs and microservices that handle real-time threat analysis at scale Implement computer vision systems for image and video analysis in OSINT investigations Build and optimize vector databases for semantic search across massive intelligence datasets Establish best practices for AI … Docker, Kubernetes) Experience with infrastructure as code (Terraform, CloudFormation) Expertise in building real-time streaming architectures Experience building production AI systems handling sensitive data Knowledge of AI safety, bias detection, and ethical AI practices Familiarity with computer vision and NLP techniques for OSINT Understanding of adversarial AI and security implications Proven track record of leading complex technical projects Ability More ❯
San Diego, California, United States Hybrid / WFH Options
Sony Interactive Entertainment
on various levels including Application, Database, Linux, Container, Networking, Storage, Access Control Nice to have Experience with hosting and CDN technologies like Akamai and Cloudflare Experience with Cyber Security, threatdetection and mitigation with Akamai Monitoring and Alerting solutions including Datadog, Prometheus and Grafana Logging and log aggregation solutions like Splunk, ElasticSearch and AWS CloudWatch Logs Tracing & debugging More ❯
United, Pennsylvania, United States Hybrid / WFH Options
Twilio
Twilio Join the team as our next Staff Security Engineer - Insider Risk Program About the job We are seeking a staff security engineer that will work within the Twilio ThreatDetection and Response group TDR . The Cyber Insider Risk Investigations Specialist will be responsible for investigating potential risks against Twilio and its workforce from internal and external More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
TEKsystems, Inc
optimise network infrastructure. Assist with firewall, routing, and switching configurations. Work collaboratively with security engineers and architects. Implement security policies and SIEM-related configurations. Assist in network monitoring and threat detection. Conduct vulnerability assessments and mitigation strategies. Design network architecture for SIEM integration. Advise on SIEM tool deployment strategy. Essential Skills SC clearance required (Desnez clearance preferred for immediate … . Experience in network engineering and security fundamentals. Strong knowledge of routing/switching and network troubleshooting. Experience with SIEM tools and security operations. Proficiency in firewall management and threat intelligence. Strong knowledge of network security principles. Extensive experience in network architecture design. Additional Skills & Qualifications Familiarity with SIEM integration is a plus. Security qualifications are desirable. Why Work More ❯
Id Who we are: The Cisco Talos Security Intelligence and Research Group is at the forefront of detecting and correlating threats in real-time, using the world's largest threatdetection network. We collaborate extensively across Cisco's security ecosystem, driving innovation in threatdetection technologies to safeguard the Internet from known and emerging cybersecurity threats. … working in a collaborative environment as a member of a multi-disciplinary team, providing domain expertise when needed, sharing ideas and knowledge. What you'll do Proactively analyze potential detection gaps, propose projects and ideas, and define and implement a plan to make them real. Analyze large datasets to extract complex data patterns. Monitor changes in the threat … from model selection and training, to optimization, deployment, and monitoring. You will be in contact with many different products and domains across Cisco's security product portfolio including malware detection, web and email classification. Keep yourself abreast of the latest research in security and machine learning and regularly present new techniques to the rest of the team. Publish internal More ❯
critical infrastructure. The Claroty Platform provides the deepest asset visibility and the broadest, built-for-CPS solution set in the market comprising exposure management, network protection, secure access, and threatdetection - whether in the cloud with Claroty xDome or on-premise with Claroty Continuous ThreatDetection (CTD). Backed by award-winning threat research and More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Accrete.AI
agencies to deliver advanced artificial intelligence solutions that enhance national security and defense operations. Our AI technology is designed to meet the unique challenges of government clients, from improving threatdetection and intelligence analysis to optimizing mission-critical workflows. By joining our team, you'll play a key role in developing and deploying AI tools that strengthen the More ❯
Annapolis, Maryland, United States Hybrid / WFH Options
Bowler Pons Solutions Consultants, LLC
who thrive in a dynamic and forward-looking environment. JOB RESPONSIBILITIES: Develop, document, test, debug, integrate, and maintain application software, systems, and hardware solutions as part of a comprehensive threatdetection and response suite. MINIMUM REQUIRED QUALIFICATIONS: US citizenship and the ability to obtain a security clearance as needed BA or BS degree in Software Engineering/Development More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Accrete.AI
agencies to deliver advanced artificial intelligence solutions that enhance national security and defense operations. Our AI technology is designed to meet the unique challenges of government clients, from improving threatdetection and intelligence analysis to optimizing mission-critical workflows. By joining our team, you'll play a key role in developing and deploying AI tools that strengthen the More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
Experience with DoD testing standards, including STIG compliance and RMF accreditation. Familiarity with network testing tools such as Wireshark, Nessus, ACAS, and Splunk. Hands-on experience with AI-driven threatdetection and predictive analytics tools for network security validation. Understanding of Zero Trust security principles and how they impact testing strategies. Familiarity with NEN, ONE-NET, NMCI, or More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
key role in strengthening their global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act as the escalation point for Security Operations, driving swift resolution of advanced threats and … solutions to protect high-value assets. Manage and fine-tune security tools to ensure optimal performance and coverage. Provide expert-level, second-line support to Security Operations for complex threat scenarios. Conduct thorough threat modeling and risk assessments to uncover vulnerabilities and drive proactive defenses. Oversee the relationship with our Managed Detection & Response (MDR) partner to ensure … top-tier threatdetection and response. Drive execution of the security roadmap, aligning with evolving business goals and threat landscapes. Partner with cross-functional teams to promote security best practices and embed security into daily operations. Requirements: 5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
key role in strengthening their global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act as the escalation point for Security Operations, driving swift resolution of advanced threats and … solutions to protect high-value assets. Manage and fine-tune security tools to ensure optimal performance and coverage. Provide expert-level, second-line support to Security Operations for complex threat scenarios. Conduct thorough threat modeling and risk assessments to uncover vulnerabilities and drive proactive defenses. Oversee the relationship with our Managed Detection & Response (MDR) partner to ensure … top-tier threatdetection and response. Drive execution of the security roadmap, aligning with evolving business goals and threat landscapes. Partner with cross-functional teams to promote security best practices and embed security into daily operations. Requirements: 5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
MAG DS Corp dba MAG Aerospace
fabrication, test and evaluation and materials integration of complex systems for a variety of Soldier platforms Integrate solutions to protect against threats such as environmental, chemical, biological, flame, and threatdetection Resolve complex problems associated with protection, survivability, and lethality in various environments Conduct and coordinate material system investigations and analyses to determine feasibility of advanced technologies, evaluate More ❯
position is key to shaping the strategic direction of the wider Cybersecurity division and directly impacts Jisc's overall service delivery. You will take responsibility for the continuous monitoring, threatdetection, reporting, and analysis of critical infrastructure and its associated services, ensuring resilience, reliability, and security across the organisation. Responsibilities will include: Maintenance and development of platforms and More ❯
Investigator Department: Research & Investigations Employment Type: Full Time Location: London, UK Description Do you want to be on the front lines of fighting crypto crime and stopping nation-state threat actors? Are you excited by the challenge of tracing stolen and laundered digital assets across the most complex blockchain environments? Are you looking to join a mission-driven team … is critical to Elliptic's mission of safeguarding the integrity of the global crypto ecosystem. As a Senior Investigator, you will be a key member of our elite Investigations & Threat Intelligence team, working closely with government agencies, the Crypto Industry, and strategic partners across the EMEA region. Your expertise in tracing complex, state-sponsored activity and uncovering the TTPs … of nation-state and highly sophisticated threat actors will directly inform mitigation operations, in-depth research, and policy decisions. Through deep collaboration with law enforcement, regulators, and analytic partners, your work will help disrupt illicit financial networks, strengthen crypto-related threatdetection, and reinforce Elliptic's position as a trusted partner to those on the front lines More ❯
Hemel Hempstead, Hertfordshire, United Kingdom Hybrid / WFH Options
Techwaka
My client is a world leader in its field, and part of a globally successful UK-based business. They design, manufacture, sell and support a range of highly advanced threatdetection and security products for global markets in commercial, aviation, defence and security sectors. The products range from small hand-held devices through to large systems, and are More ❯