Sort by:  relevance | date

Game Master / Game Actor

Off The Couch, Inc. - Santa Clara, CA

... , guide, an actor, and a problem solver. You will interact with our guests and host our live adventure ... room where you will be responsible for hosting each group throughout their adventure. This will ...

Cyber Hunt and Threat Analysis

Apex Systems, Inc. - Martinsburg, WV

... u003EDevelop and execute custom scripts to identify host-based indicators of compromise.\u003C/li\u003E ... /li\u003E\n\u003Cli\u003EProfile and track APT actors that pose a threat in coordination with ...

Apply directly to this job

Set your alert for this search:

Set up your FREE JOB ALERT at Granted.com
and be the first one to know when a position is opened.

Director - App Development

Ameriprise Financial, Inc. - Minneapolis, MN

... Object Oriented, Concurrent Programming and Actor Oriented Programming paradigms. - Strong ... stacks and frameworks. - Knowledge of hosting topologies and architectures (Virtualization, Cloud Computing ...

Apply directly to this job

Animals in Entertainment Campaign Coordinator

People for the Ethical Treatment of Animals - PETA - Norfolk, VA

Position Objective: Animals aren't actors, spectacles to imprison and gawk at, or ... individuals or groups not to use, sponsor, or host animals in photo shoots, traveling shows, and other scheduled ...

Principal DFIR Analyst (Remote US Available)

Splunk, Inc. - Seattle, WA

... packet capture Advanced knowledge of detecting threat actors across the entire cyber kill chain Demonstrated ... vary by location however we believe in hosting amenities and fun activities to fuel our ...

Mid - level Cyber Security Threat Intelligence Analyst

Boeing - Bellevue, WA

... or assets are of value to threat actors and how organizations are breached. Experience ... , security operations, or forensics Understanding of host security logging (Windows and Linux) Understanding ...

Wyndham Destinations Licensed Sales - Windsor, CA

Wyndham Hotels & Resorts, LLC - Windsor, CA

... inside sales, actor, actress, marketing, sales agent, marketing representative, host, trade-show/ ... , jewelry, restaurant, business development, actor, escrow, timeshare, vacation ownership, in-house ...

Experienced Cyber Security Threat Intelligence Analyst

Boeing - Bellevue, WA

... tools, and threat actor tactics, techniques and procedures to characterize threat actors’ technical methods for ... chain stages, and ATT&CK Understanding of host security logging (Windows and Linux) Some ...

Sr Lead Security Engineer - Penetration Tester

CenturyLink, Inc - New Century, KS

... big data analytics, managed security services, hosting, cloud, and IT consulting services. The ... as sanctioned attacks utilizing real malicious actor methods to determine the defensive capabilities ...

Information Security Threat Hunter Lead

Total System Services, Inc. - Columbus, GA

... analysis of the environment from a threat actor's perspective, including the skill to conduct prioritized ... Strong experience with Digital forensics on host or network from malware perspective, ability ...

SOC / Cyber Security Analyst

Tech Tammina - Washington, DC

... detectionprevention systems (IDSIPS), network- and host-based firewalls, network access control (NAC ... IOCsIOAs, hacking tools, vulnerabilities, threat actor TTPs) derived from open-source resources ...

Cyber Hunt and Threat Analysis

Apex Systems LLC - Martinsburg, WV

... Develop and execute custom scripts to identify host-based indicators of compromise. Implement new ... advanced analytic capabilities. Profile and track APT actors that pose a threat in coordination with ...

Sr Lead Security Engineer - Penetration Tester

CenturyLink, Inc - Broomfield, CO

... big data analytics, managed security services, hosting, cloud, and IT consulting services. The ... as sanctioned attacks utilizing real malicious actor methods to determine the defensive capabilities ...

CYBER THREAT INTEL ANALYST III

COFENSE - Leesburg, VA

... and procedures used by cyber threat actors in phishing attacks. * Use different ... engineering, incident response, threat intelligence, and host and network-based security. * Excellent organizational ...

Apply directly to this job

12345next >  

Save jobs and view them from any computer.
You must sign in to save jobs:
Sign in - Create account (it's free)
Close