Threat Intelligence Jobs


"Threat intelligence is knowledge that allows you to prevent or mitigate cyberattacks. Rooted in data, threat intelligence gives you context that helps you make informed decisions about your security by answering questions like who is attacking you, what their motivations and capabilities are, and what indicators of compromise in your systems to look for."
- Recorded Future

Teradata

Information Security Analyst

San Diego, CA
SOC / Threat Intel
FULL-TIME
Nov 6
Premier

Considering COVID-19, we are still hiring but conducting virtual interviews to keep our candidates and employees safe. Many roles will be temporarily remote or work from home to comply with current safety regulations. These roles will be required to be in the office once it is safe or restrictions are lifted. Read more on our response here: Teradata Response to COVID-19 

With all the investments made in analytics, it’s time to stop buying into partial solutions that overpromise and underdeliver. It’s time to invest in answers. Only Teradata leverages all of the data, all of the time, so that customers can analyze anything, deploy anywhere, and deliver analytics that matter most to them. And we do it at scale, on-premises, in the Cloud, or anywhere in between.

We call this Pervasive Data Intelligence. It’s the answer to the complexity, cost, and inadequacy of today’s analytics. And it's the way Teradata transforms how businesses work and people live through the power of data throughout the world. Join us and help create the era of Pervasive Data Intelligence.

The Information Security Analyst will be tasked not only with identifying and responding to potential threats, but also proactively hunting and eliminating them. The ideal candidate will have highly technical skills and should possess an understanding across a broad range of security technologies and will take a proactive approach to network intrusions. You should have several years of experience working within a SOC environment and should have hands-on experience in creating and executing cyber hunting missions. The candidate must be a world-class problem-solver with the ability to handle challenges under pressure. This is a global role with responsibility for Teradata security technologies for all business units.

The ideal candidate will have experience and a proven track record of finding and responding to threats found from various tools DLP, SIEM. Security Analytics, Behavior Analysis etc. As a key member of the security team, flexibility and a broad knowledge of security processes, along with strong communication and collaboration skills, will result in a successful candidate.

Key Areas of Responsibility

Direct hands-on expertise in the following areas of information security

  • Threat intelligence/threat hunting
  • SIEM
  • Fireeye, Sourcefire, Snort, Suricata, Kibana
  • Security Analytics
  • Network Security, network access control, network monitoring tools
  • Vulnerability identification, anti-virus, malware detection/analysis
  • Programming Tools Java, Ruby, C/C++, PHP, Perl, Python
  • DLP, encryption, email security, HIDS/NIDS
  • Develop, maintain and report on security operation metrics
  • Participate in the review and analysis of internal projects and external requirements that may have an impact on security
  • Be aware of the IT security requirements for the business and implement measures to satisfy those requirements in the most efficient manner
  • Keep abreast of emerging security technologies and make appropriate recommendations regarding their implementation

Qualifications

  • BS degree in related field preferred. Equivalent experience/certification acceptable.
  • 3+ years of demonstrated experience in information security roles
  • 2+ years managing security technologies
  • Industry certifications such as CISSP, CCSP, CEH, PMP, GCIH, GSEC
  • Extensive Experience in
    • IT security industry trends and direction
    • Network and internet security
    • Emerging technologies
    • IT standards, procedures, policy
    • Information security management
    • Information security technologies

 

  • Excellent analytical, troubleshooting & interpersonal skills
  • Strong verbal and written communication skills
  • Self-motivated and able to work independently
  • Effective communication skills to translate technical risks and exposures to a business perspective - formal reports and/or presentations
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Palo Alto Networks

Intern – Information Security

Santa Clara, CA
SOC / Threat Intel
FULL-TIME
Nov 5
Premier

Our Mission

At Palo Alto Networks® everything starts and ends with our mission: 

Being the cybersecurity partner of choice, protecting our digital way of life. 

We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are. 

Your Career

You will join an Information Security (InfoSec) team that will give you the opportunity to make a global impact. One that protects our way of life in the digital age by preventing successful cyberattacks. A team looking for engineers who are passionate about technology, have an interest in cyber security, and also want to make a positive difference in the world that we live in. The projects our interns are assigned will give real hands-on experience working on securing Palo Alto Networks. The Information Security team’s mission is to protect the company's brand integrity, confidentiality, infrastructure, and assets from internal and external threats. They enable business outcomes everywhere while securing the user, product, infrastructure and data, built on a foundation of threat detection and response.

Our top Technical Internship roles we hire for are :

  • Security Architect

  • DevOps Engineer 

  • Security Operations Center (SOC) Engineer

  • Red Team Engineer

  • Risk & Compliance Analyst

  • Vulnerability Engineer 

Your Impact

  • Collaborate and execute alongside experienced engineers and security professionals.

  • Help us disrupt the cybersecurity industry using the latest and greatest technologies.

  • Write code that meaningfully improves our products and services

  • Learn about the cybersecurity industry from the world's leading security experts.

Your Experience

  • Completing a BS/MS/PhD degree in Computer Science, Computer Engineering or other related STEM field

  • Strong programming skills

  • An understanding of the fundamentals of Computer Science & Computer Security

  • Exemplify strong initiative and ability to work independently with limited direction

  • Ability to work cross functionally with other engineers, researchers and Product Managers

  • Excellent communications skills

The Team

Our Information Security team is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating — challenging the way we, and the industry, think about cybersecurity. Our engineers don’t shy away from building products to solve the problems no one has pursued before. 

We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment. 

Intern Program

Our global internship program trains the next-generation of cybersecurity talent across a range of specializations, from threat intelligence to information security, engineering, sales, and marketing. The program also features a combination of challenging projects with tangible impact, engaging social events, and networking opportunities. Interns and recent graduates can learn about the network security industry from leading thinkers, grow their professional networks, and be part of a career-defining experience.

The summer internship program features a combination of challenging projects with real impact, engaging social events, and networking opportunities:

  • 12-week program

  • Peers of elite students

  • One-on-one mentoring by industry leaders

  • Exposure to and support from Palo Alto Networks executives

  • Events that pique your intellectual curiosity and inspire new ideas

  • Opportunities to expand your knowledge and work in a fast-paced environment

Our Commitment

We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.

Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.

Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
St. Joseph’s Health

Information Security Analyst

Paterson, NJ
SOC / Threat Intel
FULL-TIME
Nov 1
Premier

Overview

St. Joseph’s Health is recognized for the expertise and compassion of its highly skilled and responsive staff. The combined efforts of the organization’s outstanding physicians, superb nurses, and dedicated clinical and professional staff have made us one of the most highly respected healthcare organizations in the state, the largest employer in Passaic County, and one of the nation’s “100 Best Places to Work in Health Care”.

Job Overview
Responsible for assessing security threats and risks involving the security and integrity of data within the St. Joseph Healthcare System. Responsible for the monitoring and analyzing of logs and alerts from a variety of technologies including networks, servers, workstations, firewalls, Intrusion detection and prevention systems (IDS/IPS) virtual private networks (VPNs), encryption, data loss prevention (DLP), and antivirus systems. Responsible for the creation of comprehensive security write-ups which articulate security issues, analysis and remediation techniques, troubleshooting and resolution of security issues.

Qualifications

Work requires the knowledge of theories, principles, and concepts acquired through completion of a Bachelor's degree in Computer Information Systems, Computer Science, MIS, Engineering or closely related field. A minimum of five years experience with desktop, server and/or network administration in a mixed computing environment required.  Two years  of direct information security experience preferred.  CompTIA Network+ Certification, CompTIA Security+ Certification and Microsoft MCP Certification preferred.  Understanding of Information Security concepts and business acumen. Strong working knowledge of Windows Server, Desktop, Active Directory and Exchange.  Experience using  security vulnerability assessment tools and techniques.  Experience of using Malware Remediation Tools.  Solid understanding of operating systems and platforms (Windows, iOS, Unix, Linux).  Experience with Directory Services and LDAP.  Knowledge of network infrastructures including firewalls, VPN's, Intrusion Detection Systems, vulnerability assessment strategies, web application and device security.  Knowledge of the security requirements for HIPAA, HITECH, ISO 27001/27002 and SOX regulations.  Requires analytical skills with the ability to exercise sound judgment, attention to detail and problem resolution.  Must possess strong customer service, communication, organizational & interpersonal skills.

Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
RiskIQ

Cyber Threat Intelligence Analyst

Remote
SOC / Threat Intel
FULL-TIME
Nov 1
Premier

RiskIQ is the leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners and MassMutual Ventures.

We are looking for a Senior Cyber Intelligence Analyst to join our i3 team. This position can be based at our office in Lenexa, KS or remotely. 

The Role
The Incident Investigations and Intelligence (i3) Program within RiskIQ is built to oversee managed services of the External Threats Product workspaces for clients and the Executive Guardian product workspaces for clients. Executive Guardian is designed to protect C-Suite and high net worth individuals from physical threats, exposures of Personally Identifiable Information (PII), and instances of social media account impersonation thereby safeguarding the individual, their reputation, family, and by extension, the company. External Threats protects clients from phishing attacks, domain infringement, mobile app impersonation, social & brand impersonation, and data leakage. The i3 Cyber Intelligence Analyst (SCIA) The i3 Cyber Threat Intelligence Analyst is a mid-level analytic role that will capitalize on an existing technical skillset to build and maintain complex technical logic to identify online threats to customers, manage client threat events, and take the appropriate action to suppress harmful content on the internet in order to protect our customers, their people, and their assets. i3 Cyber Threat Intelligence Analysts will also perform threat attribution research for the purposes of providing customers with finished and actionable intelligence products relevant to the safety and security of their assets and operations. The i3 Cyber Threat Intelligence Analyst is technically proficient, proactive, and is business-minded using both available open source and proprietary data sets to confidently support attribution of virtual threat actors with their actions.

Responsibilities

  • Configuration of technical details in the RiskIQ platform to identify sensitive data on the web for customers, including proprietary data and Personally Identifiable Information (PII)
  • Manage client workspaces to identify and mitigate threats such as phishing, domain infringement, brand infringement, social media impersonations, and mobile app fraudulent activity
  • Effectively conduct cyber investigations around events surfaced in the RiskIQ platform looking for relevant threat actor infrastructure, IOCs, and TTPS
  • Work with i3 colleagues and leadership to design solutions to improve collection within the External Threats and Executive Guardian platforms to improve the client experience
  • Respond to requests for customer support and escalate to Engineering as appropriate
  • Review and appropriately escalate detections based on the urgency of the discovered data/threat
  • Stand up Proofs-of-Concept (POC) workspaces and orchestrate effective and value-driven POCs for customers and prospective customers in support of sales opportunities
  • Monitor the RiskIQ platform and alert/support senior staff to conduct security/threat investigations into threat actors and their activities world-wide, using industry tools and proprietary information
  • Assist in the production of threat analysis for dissemination to consumers on the safety and security of customers, assets and operations, including impact assessment​ ​and mitigation recommendations
  • Identify opportunities to predict and prevent future security issues and/or incidents
  • Collaborate with client security teams digitally, via phone, or at times, in person to constantly improve analytic standards, workflows, and success metrics and develop/improve analytic products as appropriate
  • Collaborate with RiskIQ Legal and Engineering teams to ensure appropriate mitigation of identified risks
  • Work with sensitive and confidential information and maintain highest standards of data protection to ensure client confidentiality
  • Support the production of finished threat analysis for dissemination to consumers on the safety and security of customers, assets and operations, including impact assessment and mitigation recommendations
  • Effectively engage consultatively with customers to design workflows, provide training, and update and brief teams on performance, metrics, and workspace events/intelligence
  • Collaborate with senior i3 team members to constantly improve analytic standards,
  • workflows, and success metrics and develop/improve analytic products as appropriate

Requirements

  • Bachelor's degree required
  • Experience researching and collecting intelligence from within social media, deep web forums, and the dark web
  • Technical proficiency with open source intelligence (OSINT) research tools; familiarity with Regex, JavaScript, SQL, and Python a strong plus
  • Familiarity with Threat Models such as ​MITRE ATT&CK® ​, Diamond Model and Cyber Kill Chain®; Incident Response Investigations experience highly desired
  • Technical skill familiarization in network communications (TCP/IP, OSI Model), malware analysis(communication/installation/behavior) and computer network defense operations
  • Previous experience with anti-phishing and online fraud identification and remediation
  • Strong written and verbal communication skills
  • Ability to effectively interface with and lead communication with customers; previous cybersecurity consulting experience a strong plus
  • Experience managing multiple projects, and the ability to flex quickly as required evolving corporate priorities
  • Ability to work independently and with minimal supervision
  • Basic understanding of investigative analysis, and communicating findings to consumers
  • Approximately 10-25% global travel required
  • Ability to obtain a US Top Secret security clearance
 
 

Why work at RiskIQ?

  • Fascinating work - Welcome to the dark underbelly of the Internet. RiskIQ’s ability to help organizations map and monitor their attack surface, detect internet-scale threats, and investigate adversaries led to skyrocketing adoption by security teams around the world. It is the golden age of internet crime, and we are at the forefront of defensive efforts to stem the tide. Internet security is a global growth industry, and the knowledge you acquire here will be a marketable skill for decades to come.
  • We’re a company on the forefront of a burgeoning industry - RiskIQ experienced explosive growth in 2018, including a 362.5 percent increase in net new product sales due to the steady adoption of attack surface management across the world. We also experienced a 365 percent increase in registration for RiskIQ community, our freemium entry-level product, showing the increasing role of security outside the firewall to the growth of businesses.
  • Top Leadership - Our CEO is a renowned cybersecurity veteran known for his expertise. Our leadership group is poised and experienced with a track record in technology and cybersecurity.
  • Unbounded opportunity - We’re growing! At RiskIQ, you’ll be provided with as much responsibility as you can handle—new career development opportunities constantly arise given our rate of growth.
  • Flexibility - You’ll have a large workload, but also the freedom to accomplish it on your own terms.
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Dominion Energy

Associate Cyber Security Analyst

Richmond, VA
SOC / Threat Intel
FULL-TIME
Oct 31
Premier

At Dominion Energy we love our jobs.  That’s right.  Love.  Every day we go to work filled with passion to be excellent, to creatively problem solve and to innovate.  These are exciting days for energy companies, and Dominion Energy aims to shape the future of energy in America. We are looking at all of our work with fresh eyes, retooling everything we do, in every part of the company, to operate more sustainably and to deliver energy more reliably than ever.  We are looking for interesting, independent thinkers and doers who can help shape the culture of a forward-looking company that’s proud of its rich legacy. Are you a change agent?  Do you think differently?  Do you want to fall in love with your job? If you answered “yes,” then read on!

At this time, Dominion Energy cannot transfer nor sponsor a work visa for this position.

This position does not offer relocation assistance. 

Job Summary

Do you have what it takes?


This is not your typical cyber role. A cyber war is underway in the world today, with hostile nations seeking to disrupt and destroy critical infrastructure in the United States, all day, and every day. If you want to be on the front lines up against the best cyber criminals and nation state attackers in the world and prove you are better, then this is the place to be.

For our employees, this is a mission, not a job. We educate the company about cyber threats. We establish the standards for cyber security. We perform assessments to ensure proper protections are in place. We manage vulnerabilities and guide the development of defenses. It takes a high degree of skill and a commitment to that mission to be successful. Do you have what it takes? 


If this description sounds like you, let’s talk!
 

This posting is for two positions that will be filled at the level commensurate with the successful candidates’ education, experience, knowledge, skills and abilities.


Associate Cyber Security Analyst


This entry level cyber security position, under close supervision, performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Facilitates client requests to ensure critical business tasks continue uninterrupted. Performs assessments of cyber security risk and vulnerabilities, maintains security policies, and helps facilitate cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. May work with other staff to assess the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies a basic understanding of IT technologies and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security. 
 

Cyber Security Analyst
 

Under broad supervision, this intermediate role performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Coordinates organization cyber security response activities, and maintains situational awareness of the security posture of the enterprise. Performs assessment of cyber security risk and vulnerability analysis, creates and maintains security policies, and facilitates cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Evaluates the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies considerable understanding of IT technologies, evaluation of cyber security risks and attack vectors, and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security. Consults with subject matter experts and business representatives, as needed, to provide input on cyber security decisions, the establishment of cyber security policies, and to foster security awareness. 

Required Knowledge, Skills, Abilities & Experience


Associate Cyber Security Analyst

Must possess 0-2 years of work experience in cyber security, or a cyber risk related role demonstrating a basic understanding regarding the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks.

Demonstrates a general understanding of cyber security and or data system protection principles and practices. A basic understand of industrial cyber security standards and risk are desired. Demonstrated good organization and planning skills. Demonstrates a questioning attitude, with basic analytical and investigative skills. Demonstrates verbal and written communication skills, with the ability to interact effectively with others. A willingness to learn new skills and methodologies, conduct research, and learn to maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under basic supervision in a fast-paced environment. Previous work experience or exposure to the security aspects governing software, communications, and network protocols is a plus.

Cyber Security Analyst

Three to five years of work experience in cyber security, or a cyber risk related role demonstrating a general knowledge in the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks.  (Note:  A Master's degree will count as one year of experience.  A partial year of six months or more will be rounded up to one year)

Demonstrates a working knowledge of cyber security best practices and frameworks. Possesses a solid understanding of industrial cyber security standards, frameworks and risk assess modeling. Demonstrated good organization and planning skills, to include time and project management skills. Demonstrates good analytical, troubleshooting, and problem solving skills, and has a questioning attitude. Demonstrates verbal and written communication skills, with the proven ability to present information to others. Ability to conduct research and apply, and under broad supervision, maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under minimal supervision in a fastpaced environment. Previous work experience in security aspects of multiple platforms, operating systems, software, communications, and network protocols is desired.

Note:  This position requires in office work.  You must be willing to report to Dominion Energy's corporate headquarters in Richmond, Virginia.
 

The company is actively seeking United States military veterans and service members who meet the qualifications outlined below.

  • Military service members and veterans with ranks from E3-E5, W1-W2, or O1-O3, plus appropriate equivalent combination of education and years of experience as outlined above.
Education Requirements

Bachelor Degree or will obtain a Bachelor's degree by December 2020.  Equivalent combination of education and demonstrated related experience may be accepted in lieu of preferred level of education

Preferred Disciplines:  IT Cyber Security or related specialization/track highly desirable

 

Other Preferred Disciplines: Information Systems, Computer Science, Computer Engineering
 

Other disciplines may be substituted for the preferred discipline(s) listed above.

Licenses, Certifications, or Quals Description
 
Working Conditions
Office Work Environment 76 -100%
Travel Up to 25%
Other Working Conditions
 
Test Description

No Testing Required

 

Export Control


Certain positions at Dominion Energy may involve access to information and technology subject to export controls under U.S. law.  Compliance with these export controls may result in Dominion Energy limiting its consideration of certain applicants.

 

Other Information


We offer excellent plans and programs for employees. Employees are rewarded with a competitive salary and comprehensive benefits package which may include: health benefits with coverage for families and domestic partners, vacation, retirement plans, paid holidays, tuition reimbursement, and much more.   To learn more about our benefits, click here dombenefits.com.

Dominion Energy is an equal opportunity employer and is committed to a diverse workforce. Qualified applicants will receive consideration for employment without regard to their protected veteran or disabled status.  

You can experience the excitement of our company – it's the difference between taking a job and starting a career.

Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
FireEye

Associate Security Consultant - Entry Level

New York, NY
SOC / Threat Intel
FULL-TIME
Oct 23
Premier

 

 

Associate Security Consultant - Entry Level 2021

Company Description

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 9,000 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

Job Description

Do you love the challenge of figuring out solutions to intricate technology puzzles? 

Do you like to help others solve their network and information security issues? 

If you answered YES, then consider a career at Mandiant as an Associate Consultant! 

We have the expertise and experience in information security. This is our focus.

You’re not just a number and you won’t get lost in the shuffle. 

You will be working on challenging technical projects that make an impact. You’ll be visible.

You’ll be exposed to many different environments and technologies.

You’ll learn from our best incident responders and red teamers.

We investigate breaches that make headlines (and many more that don’t), as well as break into applications and systems to identify security gaps for our clients.  We find evil and solve crime, and are seeking candidates who possess the ability to think like an attacker and stay one step ahead of the game. 

Find your niche among the cool projects you'll be involved with, such as:

  • Incident Response
  • Host and network forensics
  • Network traffic analysis
  • Malware analysis and reverse engineering
  • Penetration testing and Red Team
  • Network, web and mobile application security assessments
  • Source code reviews
  • And more...

Responsibilities:

  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
  • Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
  • Perform network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments and social engineering assessment
  • Build internal scripts, tools and methodologies to enhance our capabilities
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Work with security and IT operations at clients to implement remediation plans

Qualifications

Requirements:

  • Technical skills in at least two of the following areas: 
    • Strong knowledge of Windows OS and networking protocols
    • Basic knowledge of tools used for forensic collection and analysis
    • Knowledge of application testing and network security concepts
    • Experience with programming/scripting languages such as Python
  • A technical security-related internship or other professional experience
  • Must be able to travel 20-30%
  • Must be eligible to work in the US without sponsorship

Additional Qualifications:

  • Strong technical acumen and ability to quickly assimilate new information
  • Ability to successfully interface with clients (internal and external) and manage expectations of others
  • Ability to document and explain technical details in a concise, understandable manner

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to HR-Accommodations@FireEye.com.
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Blackbaud

Red Team Security Engineer

New York, NY
SOC / Threat Intel
FULL-TIME
Oct 23
Premier

The NYC Red Team Security Engineer reports to the Senior Manager of Information Security and is responsible for testing and validating all facets of information security controls including networks, servers and web applications. The Red Team Security Engineer carries out attacks and perform security assessments to uncover vulnerable areas of systems and applications and to test defensive security measures using common as well as unique methods and practices.

What You’ll Do

  • Participate in Red/Blue Team exercises on a periodic basis so that management can assess effectiveness of security controls.
  • Conduct penetration testing for the red team which includes network, system, application, mobile, traditional web and wireless penetration testing.
  • Writing exploit code for local testing.
  • Perform thorough penetration testing that includes the identification, reporting, and recommendations for security vulnerabilities while adhering to management driven scope and deadlines.
  • Identify, prove, and report vulnerabilities that cannot be identified by scanners or tools
  • Develop, extend, or modify exploits, shellcode or exploit tools.
  • Develop applications in C#, ASP, .NET, ObjectiveC, Go, or Java (J2EE).
  • Reverse engineering malware, data obfuscators, or ciphers.
  • Source code review for control flow and security flaws.
  • Develop attack vectors, conduct reconnaissance, collect Open-source intelligence, enumeration, and foot printing of target networks and services, and develop exploit payloads and system backdoors.
  • Simulate malicious tactics of a motivated adversary with the intent of achieving a specific goal or access.
  • Develop on-going Technology Risk reporting, monitoring key trends and defining metrics to regularly measure control effectiveness for own area.
  • Influence behavior to reduce risk and foster a strong technology risk management culture throughout the enterprise.
  • Obtain threat intelligence from white hat sources and stay up to date on the latest exploits and security trends
  • Advise Incident Response on defensive and monitoring process design.
  • Deliver clear and coherent written reporting and remediation guidance.

What We’ll Want You To Have

  • College degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience.
  • 5+ years (in excess of degree requirements stated above) of experience with technical Cyber Security and 3+ years with Red Team or penetration testing experience.
  • Demonstrates broad subject matter expertise of web, network, and system security.
  • Certification in highly technical information security disciplines such as: CISM, CISSP, CCSP, CCNP, CCDE, CCIE Security, GIAC, CEH, GPEN, GWAPT, GXPN or OSCP certification(s)
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Palo Alto Networks

Security Systems Engineer - Intern

Santa Clara, CA
SOC / Threat Intel
INTERN
Sep 28
Premier

Your Career

As a Systems Engineer Intern, you will quickly ramp on Palo Alto Networks technology and will be assigned to multiple SEs. You will work together to complete critical work that supports customers in the pre-sales process. In this role, you will also work with sales on customer engagements and establish relationships with customers with the goal of helping them detect and prevent advanced cyberattacks and breaches. 

Upon completion of your summer internship, you will be required to do a final presentation on your contribution to getting a successful technical sell  (i.e. collect customer environment information, heat map, POC deployment, success criteria definition, recommended architecture/solution, and much more). 

Our global internship program trains the next generation of cybersecurity talent across a range of specializations, from threat intelligence to information security, engineering, and marketing. Interns and recent graduates can learn about the network security industry from leading thinkers, grow their professional networks, and be part of a career-defining experience.

Our Summer Internship Program from May-August or June-September provides you: 

  • 1:1 mentorship

  • Fun and engaging events that inspire your intellectual curiosity

  • The opportunity to expand your knowledge and work on challenging projects

  • Connections to other recent grads, and employees across the company as well as our leaders

Your Impact

  • Establish yourself as a trusted team member to SE leadership and colleagues and contribute to sales wins throughout the program 

  • Architect and propose solutions which address the identified cybersecurity problems in each customer’s unique environment 

  • Ensure ongoing customer happiness, support, and adoption of cybersecurity solutions

  • Act as the customer advocate for any issues that require technical assistance and follow up with the customer until the issue is resolved 

  • Continuous self-improvement and learning to maintain technical leadership of applicable technologies (data center, SDN, public cloud, security, networking, etc.) 

Your Experience

  • BS in Computer Science, technical cybersecurity or networking program

  • Experience with systems installation, UNIX/Linux, and Windows-based systems 

  • Experience with cloud networking services such as AWS, Azure, GCP is a plus – not required.

  • Understand and effectively present complex technical concepts to technical and non-technical audiences 

  • Strong analytical skills to evaluate complex problems and a systematic approach to create solutions

  • Mature and effective time-management skills

  • Knowledge and desire to learn of modern network threats and malware, network forensics, automation tools and technologies, and endpoint security technologies

Requirements – To apply, you must be pursuing a 4-year Undergraduate Degree with a GPA of 3.0 or above, a 2-year Master’s Degree or a Doctorate degree and returning to school in the fall. You must have the authorization to work within the United States.

Our Commitment

We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.

We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.

Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Varonis

Security Analyst

New York, NY
SOC / Threat Intel
FULL-TIME
Sep 7
Premier

Summary

The Varonis Security Analyst will develop solutions for customers and prospects to assist in gaining visibility into security events affecting their environment. They will have intimate knowledge of Varonis products and knowledge of other Security products, specifically SIEM products.  They will develop expertise in security domains to build new/develop existing integrations.  They will analyze and respond to threats, report on their impact, develop remediation capabilities, and educate both customers and employees. 

 

Responsibilities

  • Consult with customers to ensure that Varonis products are a major component in their Security Operations Center and Incident Response Methodologies.
  • Simultaneously drive revenue growth and the maturity of customer security programs
  • Integrate Varonis products with SIEM technologies.
  • Analyze both Varonis metadata streams and streams from other product for use in incident response.
  • Develop Security expertise in at least one domain (Network, Host, Windows, Cloud, Mobile, etc.)

 

Qualifications

  • 1+ Years of working with Varonis
  • Experience with SIEM tools performing deployment, configuration, and maintaining operations, content development.
  • Experience with security tool administration (e.g. firewalls, IDS, end-point protection, content filtering, IAM, DLP).
  • Experience with operational information security disciplines (e.g. incident response, security infrastructure management or monitoring services).
  • Proven experience in Cyber Security Operations (Monitoring, Detection, Incident Response, Forensics).
  • Experience with a diverse range of customers including financial, manufacturing, chemical, healthcare, and state and local government.
  • Proven success in contributing to a team-oriented environment.
  • Proven ability to work creatively and analytically in a problem-solving environment.
  • Excellent communication (written and oral) and interpersonal skills.

Requirements

  • Proven success in contributing to a team-oriented environment.
  • Sales oriented.
  • Proven ability to work creatively and analytically in a problem-solving environment.
  • Excellent communication (written and oral) and interpersonal skills.
  • Demonstrated leadership in professional setting; e
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Gieco

Cybersecurity Intern - Summer

Chevy Chase, MD
SOC / Threat Intel
INTERN
Sep 2
Premier

 During your paid 10-week internship, you will:

  • Have the unique opportunity to utilize your skills through individual assignments and team projects
  • Work on systems that defend GEICO, attend meetings, and give presentations to senior management
  • Receive mentoring and coaching from members of Cybersecurity management
  • Interact with associates at all levels of our cybersecurity organization-even our CISO!
  • Develop your technical, project management, communication, and leadership skills

GEICO's Cybersecurity teams have positioned our company as a leader amongst its peers in the Cybersecurity space.  Being a summer intern at GEICO has the potential to lead to a full-time IT career upon graduation.

 

Check out this video to see what it's like: GEICO’s IT Internship.

 

Required Candidate Qualifications

  • Currently pursuing a Bachelor's degree in Information Security, Cybersecurity, Computer Science, Computer Engineering, Business Information Technology, Information Systems, or a related major
  • Current junior or senior status (i.e., class of December 2020 or May 2021)
  • GPA of at least a 3.0 both overall and in major
  • Coursework or related work/internship experience using various Cybersecurity technologies.  Experience with programming and scripting languages like Python, Bash, Java, .NET, or C# technologies with well-rounded experiences outside of the classroom
  • Strong analytical, problem-solving, and communication skills
  • Preferred candidates will have demonstrated leadership potential
  • Ability to live and work in the Washington DC area

 

About GEICO 
 
For more than 75 years, GEICO has stood out from the rest of the insurance industry! We are one of the nation's largest and fastest-growing auto insurers thanks to our low rates, outstanding service and clever marketing. We're an industry leader employing thousands of dedicated and hard-working associates. As a wholly owned subsidiary of Berkshire Hathaway, we offer associates training and career advancement in a financially stable and rewarding workplace.

Our associates' quality of life is important to us. Full-time GEICO associates are offered a comprehensive Total Rewards Program*, including:

  • 401(k) and profit-sharing plans
  • Medical, dental, vision and life insurance
  • Paid vacation, holidays and leave programs
  • Tuition reimbursement
  • Associate assistance program
  • Flexible spending accounts
  • Business casual dress
  • Fitness and dining facilities (at most locations)
  • Associate clubs and sports teams
  • Volunteer opportunities
  • GEICO Federal Credit Union

* Benefit offerings for positions other than full-time may vary.

GEICO is an equal opportunity employer. GEICO conducts drug screens and background checks on applicants who accept employment offers.
 
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Home Depot

Cybersecurity Intern

Atlanta, GA
SOC / Threat Intel
INTERN
Sep 1
Premier

The goal of this 12-week summer internship program is to recruit and attract top talent to The Home Depot in order to provide a best-in-class experience for students of our company, our business and our culture. Our goal at the end of the internship is to extend full-time offers to top-performing interns upon receiving undergraduate and post-graduate degrees.

As part of the 12-week summer internship program, interns will have the opportunity to work on value-add business projects, have assigned managers, teams and mentors, learn from the executive leadership team during mentoring sessions, present to leadership on their project, gain exposure to the in-store environment, tour distribution facilities, and network with other Home Depot interns and associates through various social and business networking events.  

MAJOR TASKS, RESPONSIBILITIES AND KEY ACCOUNTABILITIES

  • Use strategic thinking to approach problems and create solutions
  • Responsible for the accuracy and quality of work performed
  • Develop and implement project plans; determine requirements, deliverables, resources, timing/milestones, and risks
  • Communicate findings and project status clearly and professionally through presentations
  • Make recommendations to upper management
  • Provide comprehensive report out to senior leaders on assignments and other related projects
  • Partner cross-functionally to achieve goals


NATURE AND SCOPE

  • Typically reports to Manager or Sr. Manager in the Home Depot PRO Organization
  • No direct responsibility for supervising others.

ENVIRONMENTAL JOB REQUIREMENTS
ENVIRONMENT: 
Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.
TRAVEL: 
Typically requires overnight travel less than 10% of the time.

MINIMUM QUALIFICATIONS

  • Must be eighteen years of age or older.
  • Must be legally permitted to work in the United States.

EDUCATION REQUIRED:
The knowledge, skills and abilities typically acquired through the completion of a high school diploma and/or GED.

YEARS OF RELEVANT WORK EXPERIENCE: 0 years

PHYSICAL REQUIREMENTS:
Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.

PREFERRED QUALIFICATIONS:

  • Strong analytical skills
  • Process/detail oriented
  • Excellent communication skills (written and verbal)
  • Time Management
  • Planning, organization
  • Ability to multi-task and prioritize in a fast paced environment
  • Proven leadership abilities
  • Currently pursuing a Bachelor’s degree in Cybersecurity, Engineering, Management Information Systems

KNOWLEDGE, SKILLS, ABILITIES AND COMPETENCIES:

  • Ability to communicate issues and recommend solutions in a timely manner.

Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
IBM

Cyber Security Apprentice, NYC

New York, NY
SOC / Threat Intel
FULL-TIME
Aug 29
Premier

Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Cyber Security Apprentice, you will be an advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest-growing enterprise security business in the world.


Your Role and Responsibilities
What is an Apprenticeship?
IBM Apprenticeship Program is an official registered apprenticeship recognized by the Department of Labor (DOL). Every graduate of a Registered Apprenticeship program receives a nationally-recognized credential from the DOL.

During the apprenticeship duration, you will be required to complete specific learning hours and on the job training that has been outlined to ensure you are developing the skills and competencies essential to the role. You will be able to learn and grow at your own pace, but we expect most apprentices will complete their learning within 12 months. Once you graduate and receive your certificate from our apprentice program, you will be eligible to apply to available full-time roles at IBM.

Who you are
An apprenticeship is about learning. We’re seeking candidates who have the following requirements, but we know you’re just getting your career started, and we’re committed to helping you learn and grow. If you’ve had some experience with data analysis or simply working in a team oriented environment in the past, you’re exactly the type of candidate we’re looking for.

To be successful, you need:

  • Drive and eagerness to learn
  • Ability to work independently, and in an efficient and organized manner
  • Ability to work collaboratively as part of a team
  • Strong verbal communication skills
  • Attention to detail
  • Strong troubleshooting
  • Knowledge or some experience in any one of the following:
    • Operating Systems like Windows, Linux
    • General networking and infrastructure fundamentals
    • Cyber security fundamentals
    • Perl, PHP, Python and/or other scripting languages
    • Ability to obtain and maintain a DoD Secret Clearance

What’s the experience?
As an apprentice, you'll join with other apprentices in a local cohort. You'll go through your first few weeks together, learning about IBM and the skills you'll be attaining throughout your apprenticeship. Then, you'll work with your managers and mentors to progress through your personal skills roadmap, learning and demonstrating new knowledge and competencies through hands-on application with your project teams.

No relocation is available for this position.


Required Technical and Professional Expertise

 
  • Willingness to complete the requirements of the apprenticeship program
  • Some knowledge or experience with any of the following:
    • Operating Systems like Windows, Linux
    • General networking and infrastructure fundamentals
    • Perl, PHP, Python and/or other scripting languages
    • Cyber security fundamentals
    • Ability to obtain and maintain a DoD Secret Clearance

Preferred Technical and Professional Expertise

  • Successful completion of an IBM Pre-Apprenticeship Program and/or approved equivalent prior to start date
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
EY

Cyber Threat Intelligence Analyst

New York, NY
SOC / Threat Intel
FULL-TIME
Aug 25
Premier
The opportunity
 As a CTI analyst in the Cyber Threat Intelligence team in Cyber Defense, the candidate will identify, research, and report on emerging threats to EY to strategically shape and guide the approach the firm takes to protect its people and assets.  The position offers a unique opportunity to inform and influence leadership with creative, thought provoking approaches to detect and defeat complex threats facing the firm. This position requires a balance of traditional analytical skills and developing technical skills to encourage the greatest potential for success for the candidate and the team.
 
Your key responsibilities
This role will be responsible for providing analytic expertise and critical feedback on team reporting to assure proper analytical tradecraft is applied. The analyst will conduct independent collection, analysis, and production of finished Cyber Threat Intelligence in support of EY Cyber Defense, EY Technology, and additional lines of business.  CTI analysts maintain awareness of the global threat landscape to influence a strong EY security posture.  The CTI analyst will review open source, third-party, and proprietary threat information and enrich it with contextual analysis that will result in finished strategic intelligence.  Significant time will be spent conducting strategic, predictive analysis around emerging trends and threat actor developments to aid senior decision makers.
 
Skills and attributes for success
  • Strong technical writing skills
  • Extensive experience with analytical tradecraft
  • Thorough understanding of cybersecurity principles
  • High degree of proficiency with Microsoft Excel and PowerBI
  • Expert use of estimative language
  • Attention to detail
  • Proofreading skills
  • Critical thinking skills 
To qualify for the role you must have
  • 7+ years of intelligence community experience collecting, analysing, proofing, and/or producing intelligence OR
  • 5+ years producing written products in a security related discipline.
  • A background in international relations with an emphasis in global economics.
  • Extensive experience conveying complex information in simple, succinct explanations.
  • Proven experience reviewing large data sets such as Intelligence Information Report repositories and enterprise-wide metrics to derive analytical conclusions.
  • A thorough understanding of the intelligence lifecycle.
  • An expert understanding of analytical bias.
  • An interest in conducting detailed trend analysis. 
Ideally, you’ll also have
  • Experience in Cyber Threat Intelligence.
  • Experience in Information Security.
  • Experience as a Reports Officer, Intelligence Officer, or Intelligence Analyst.
  • Exposure and understanding of the Diamond Threat Model. 
What we look for

We are looking for an experienced, self-driven analyst that can operate independently and improve the team as a whole.  The ideal candidate will seek to improve others while continuously learning and identifying ways to strengthen the team’s analytical tradecraft and advance our Cyber Threat Intelligence Program.

 
What working at EY offers
We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: 
  • Support, coaching and feedback from some of the most engaging colleagues around.
  • Opportunities to develop new skills and progress your career.
  • The freedom and flexibility to handle your role in a way that’s right for you. 
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
FireEye

Information Security Consultant

Remote
SOC / Threat Intel
FULL-TIME
Aug 24
Premier
Company DescriptionFireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 9,000 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

Job Description

FireEye is seeking a Senior Information Security Consultant to join our Mandiant Consulting team .  As part of the Mandiant Security Consulting Services team, you will ensures the long-term success of our clients by providing specialized security monitoring, threat intelligence, and incident management consulting expertise. We are looking for motivated and experienced consultants with great customer service skills to help customers assess, design, and build their own advanced threat detection capability and help to continually improve our own program methodology. The successful candidate will possess strong consulting skills, be adept in leading multiple projects under tight deadlines, and possess in-depth experience in security event monitoring, cyber threat intelligence, and/or computer incident response.

What You Will Do:

  • Provide guidance on building and/or maturing information security programs, detecting and responding to computer security incidents, and implementation of tools and technologies used for enterprise security
  • Evaluate client needs, coordinate design for a solution, and clearly communicate the value proposition of complex and highly technical subjects
  • Implement and/or assess existing security controls
  • Provide expert level knowledge of tools and technologies used for enterprise security
  • Interface with clients to address concerns, issues or escalations; track and drive to closure any issues that impact the service and its value to clients
  • Provide expert in-depth knowledge in collecting, analyzing, and escalating security events; responding to computer security incidents, and/or collecting, analyzing, and disseminating cyber threat intelligence
  • Quickly master, simplify, and communicate the value proposition of complex subjects to clients
  • Use formal project management skills in planning, tracking, and reporting on project progress
  • Codify customer needs across accounts and use them to drive FireEye Mandiant Strategic Solutions methodology

Qualifications

  • Experience with the critical tools used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations. 
  • Thorough understanding of cyber security operations, event monitoring, and SIEM tools
  • Fundamental understanding of network protocols
  • Familiarity with Unix and Windows operating systems and administrative tools
  • Understanding of security controls for common platforms and devices, including Windows, Unix, Linux, and network equipment
  • Minimum of three years of experience in information security
  • Must be eligible to work in the US without sponsorship
Additional Qualifications:
  • Ability to travel up to 50%
  • Provide expert level knowledge of tools and technologies used for enterprise security
  • Proven ability and understanding of the components that comprise a successful information security program
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.
Realogy

Remote Threat Analyst

Remote
SOC / Threat Intel
FULL-TIME
Aug 24
Premier
Position Summary:

We are currently seeking an Analyst, Threat & Vulnerability Management. This position will report to the Manager, Threat & Vulnerability Management of Realogy’s Cyber Security & Incident Response Team.
 
 
The Analyst, Threat & Vulnerability Management will ensure that vulnerabilities are properly and timely identified with the goal of keeping Realogy’s infrastructure secure. This includes monitoring Vulnerability Management processes for performance, coordinating scanning schedules, risk acceptances, and serving as an administrator of the Vulnerability Management tool.
 
 
Responsibilities: 
  • Understands and advises on enterprise policies and technical standards with specific regard to vulnerability management and secure configuration.
  • Able to successfully partner with other security and IT infrastructure professionals to assess potential impact from vulnerabilities specific to Realogy’s environment and determine appropriate mitigating controls.
  • Using a risk based approach, analyze Realogy’s vulnerability data against open / closed information sources to best prioritize vulnerability hygiene activities.
  • Identify and recommend appropriate measures to manage and remediate vulnerabilities with the focus on reducing potential impacts on information resources to a an acceptable level based upon Realogy’s policies and standards.
  • Understands basic network terminology and common protocols.
  • Assist the team with Application and Penetration Testing coordination.
  • Build strong partnerships with technical teams to promote best practices for managing vulnerabilities in an agile manner; across traditional infrastructure and in cloud environments.
  • Ability to fully understand business requirements and work with business partners to define appropriate solutions; meeting both security mandates and business needs.
  • Review and/or escalate exception requests submitted to the TVM team.
  • Develop and improve KPIs, metrics, and trend analysis for vulnerability management functions.
  • Assist the team to maintain appropriate documentation that defines the Threat & Vulnerability Management Program, policies, and procedures.
 
 
 
Qualifications:
  • B.S. in Computer Science or equivalent field.
  • CISSP, GCTI, or similar industry certification.
  • 3-5 years of experience in Vulnerability Management or related field.
  • Strong knowledge of Qualys, including configuration and maintenance, scan execution, cloud agent deployment and oversight.
  • Detailed knowledge of the Vulnerability Management process including vulnerability identification, false negative/positives identification & elimination.
  • Knowledge of industry standards relating to Vulnerability Management including Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS) and Open Web Application Security Project (OWASP).
  • Basic knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, HIPAA, PCI, GDPR, ISO 27001&27002).
  • Knowledge of technology and security topics including operating systems, network security, protocols, application security, infrastructure hardening and security baselines.
  • Knowledge of Cloud technologies such as AWS and Azure a plus.
  • Previous experience working in large scale environments with diverse technologies is a plus.
  • Knowledge of applicable scripting languages desired.
Apply Here
After clicking on the button to apply above, you will leave Cyberlinx and go to the job application page (outside the site) for that company. Cyberlinx accepts no liability or responsibility as a consequence of any reliance upon information on their (external sites) or here.