. Analyze logs from multiple sources (e.g., host logs, EDR, firewalls, intrusion detection systems, servers) to identify.... Coordinate and report incident information to the Cybersecurity and Infrastructure Security Agency (CISA). Collaborate...
cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure... are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are This role...
. Description THIS POSITION IS PENDING CONTRACT AWARD Mission Objectives The Information Systems Security Analyst advances the cybersecurity..., SAR, POA&M, etc.). Participate in cybersecurity meetings, provide technical consultation to leadership, and prepare...
malware, software vulnerabilities, and other anomalous activity. It uses advanced threat detection techniques, including...Lookout, Inc. is a globally recognized cybersecurity leader delivering advanced protection for the most vulnerable...
, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.... Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities...
the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection... company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry...
, threat detection, vulnerability management, and day-to-day security operations. In this role, you’ll work closely... guided threat-hunting queries to identify potential environmental risks Document security incidents, actions taken...
context of an organization’s threat environment Skill to apply cybersecurity and privacy principles to organizational... and configuration data. Ability to share meaningful insights about the context of an organization’s threat environment that improve its...
lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're... choice you want to make, then choose MITRE - and make a difference with us. Department Summary: The Cybersecurity Risk...
, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.... Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities...
Our cybersecurity and information security teams at IDEXX contribute to a more resilient, adaptable, and security-aware... enterprise prepared to navigate today’s evolving threat landscape. We have complex, multi-dimensional programs across the...
, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.... Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities...
network security monitoring and incident response tools Strong background in intrusion detection, threat analysis... deployments, managing projects, and serving as a key liaison between cybersecurity teams. The Deputy Lead will report directly...
, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.... Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities...
security validation to simulate real-world attack scenarios and validate the effectiveness of detection and response controls..., EDR, WAF, DLP, firewalls, VPN, CASB). - Strong understanding of threat modeling, risk assessment methodologies...
analysis, event data and threat intelligence. Differentiate between true positives, false positives, and benign events... to minimize unnecessary escalations. Work with Shift Leads to refine detection rules, reduce false positives, and develop new use...
, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection OR Master's Degree in Statistics..., large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection...
, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale.... Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities...
needed to support the identification of security controls, the detection of cybersecurity events and issues, and the prevention... on the Cybersecurity Services COE team, you will be responsible for support of the secure design and delivery of technology...
, Splunk SPL, SPL, Packet Capture, Wireshark, Wire Shark, Network Forensics, Threat Hunting, Intrusion Detection, Log Analysis... Platforms (TIP), Security Analytics, Insider Threat Detection...