Get new jobs by email
- Are you an experienced Hungarian voice actor eager to shape the future of AI Large-scale language models and speech technologies are evolving rapidly, moving beyond simple interactions into expressive, human-like communication. With high-quality training data, tomorrow'...
- ...incident management, and forensic personnel to develop a broader understanding of the intent, objectives, and activities of cyber threat actors and support the cyber defense program. REQUIRED QUALIFICATIONS / CERTIFICATIONS • Minimum 3-5 years related work experience...
- ...teams in finding answers through data: Provide data support for investigations to understand the modus operandi and profile fraudulent actors. Conduct deep-dive data investigations for major cases: Perform impact analysis, root cause analysis, and post-mortem reviews to...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...in the Philippines Preferred Demonstrated interest or experience in maritime security, including awareness of global threat actors and High-Risk Areas Familiarity with AIS data, vessel tracking systems, and maritime security frameworks (e.g., BMP5, IMB, IMO...
- ...followed through. This role will also lead the enablement of Globe's Process Community composed of 300+ process leads, architects and actors through process standards, taxonomy, tools and programs that will advocate for grass roots process simplification that will yield...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...with donor requirements and IIRR quality standards. Expand IIRR's partnerships with NGOs, academic institutions, private sector actors, and government bodies. 6. External Representation and Strategic Partnerships Serve as the primary liaison with national and local...
- ...The role will include identification and classification of content containing core risks such as hateful and abusive chatter bad actor profiles and sector specific risk as well as reviewing imagery video and audio to assess content type and narrative. Accuracy is...
- ...timely and effective manner. the threat landscape and analyze emerging threats, trends and patterns to stay ahead of the threat actors. and maintain threat intelligence reports, dashboards, and other information dissemination methods to provide stakeholders with...
- ...including risk assessments, operational briefings, and post-incident reviews Conduct OSINT-based digital investigations into threat actors, online risks, and cyber indicators relevant to clients Assist in due diligence investigations covering digital footprints,...
- ...delgations areas of operations. Supports and advises field teams in developing competences and capacities on how to engage with these actors, so that it is integrated into their operational approach. Engages with Muslim religious circles, scholars and accademia on the...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...conducting threat hunts, ingesting threat intelligence, providing remediation recommendations, and assessing the impact of potential threat actors to Concentrix and its clientele. This role will advise on new and emerging threats, search and determine gaps within configurations...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...You'll be responsible for the following: Conduct in-depth threat analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection,...
- ...You'll Do Build and maintain iOS applications using Swift Create interfaces in UIKit and/or SwiftUI Work with async/await, actors, and Combine to handle data and app flow Integrate APIs (REST, GraphQL, WebSockets) using URLSession and Codable Manage local...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...all sizes to proactively identify and properly eliminate security vulnerabilities before they can be exploited by malicious threat actors and become an even more expensive problem. We are looking for experienced and certified security engineers with an offensive security...
- ...Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques ● Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP...
- ...timely and effective manner. the threat landscape and analyze emerging threats, trends and patterns to stay ahead of the threat actors. Maintain threat intelligence reports, dashboards, and other information dissemination methods to provide stakeholders with up-to...
- ...Coordinate process improvement projects for the CA&NCI processes at EMEA level to enhance efficiency and drive productivity ~ Be a key actor in reporting and operations measuring method development. ~ Be the first backup for Sr. Manager ~ Support new leaders in...
- ...and co-ordinate with local administration, security and law enforcement authorities, communities, UN/NGO security staff and other actors, to facilitate access for safe programme delivery and to mitigate potential risks against staff and other resources. Conduct field...
- ...efficacy validation and detection content optimization Job Responsibilities/Description consist of: Conducting threat actor TTP research and sharing products of that research with Cybersecurity Operations Assessing whether effective detections exist for...
- ...process improvement projects for the CA&NCI processes at EMEA level to enhance efficiency and drive productivity ~ Be a key actor in reporting and operations measuring method development ~ Be the first back up for Sr. Manager ~ Support new leaders in...Remote job
- ...transparency. Together with the professionals and institutions we serve we help uphold the rule of law turn the wheels of commerce catch bad actors report the facts and provide trusted unbiased information to people all over the world. About Us Thomson Reuters...
- ...of the proposal development team (PDT). Identify and collaborate with key donors, strategic partnership with other humanitarian actors that would best increase WVDF's work and funding in humanitarian and emergency response, DRR and DM. Liaise regularly with WV Support...
- ...SIEM, EDR, Log Aggregators, and Incident Response Management solutions. Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.) Moderate knowledge of security related technologies and their functions (IDS, IPS, EDR, IRP, FW, WAF, SIEM...