Get new jobs by email
- ...Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques ● Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP...
- ...of a vulnerability exploitation chains post-exploitation activity (including any host and network IoCs and malware samples) threat actors exposed vulnerable instances publicly available proofs-of-concept and MITRE ATT&CK tactics and techniques Author Insikt Notes:...
- ...comprehensive writeups that focus on the following: New and emerging cyber threat trends (novel malware vulnerabilities or threat actor tactics techniques and procedures (TTPs)) Prominent cyber attacks or cyber-related events that are widely reported across news...
- ...timely and accurate threat coverage. • Analyze technical details including root causes, exploitation chains, IoCs, malware, threat actors, exposed systems, PoCs, and relevant MITRE ATT&CK techniques. • Write high-quality TTP Instance (Insikt Notes) reports that...
- ...overseeing a team size of ~ 200-250 employees. Leverages Amazon industry-leading infrastructure, and develop new points of control bad actors with minimal disruption of good selling activity. Accountable for independent discretion based decisions, involving trade-offs with...
- ...in the Philippines Preferred Demonstrated interest or experience in maritime security, including awareness of global threat actors and High-Risk Areas Familiarity with AIS data, vessel tracking systems, and maritime security frameworks (e.g., BMP5, IMB, IMO...
- ...including risk assessments, operational briefings, and post-incident reviews Conduct OSINT-based digital investigations into threat actors, online risks, and cyber indicators relevant to clients Assist in due diligence investigations covering digital footprints,...
- ...delgations areas of operations. Supports and advises field teams in developing competences and capacities on how to engage with these actors, so that it is integrated into their operational approach. Engages with Muslim religious circles, scholars and accademia on the...
- ...offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively strengthen their defenses. This role involves delivering...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...proficiency in English, written and spoken Demonstrated interest or experience in maritime security, including awareness of global threat actors and High Risk Areas An understanding of security and risk management principles based on best practice standards Excellent...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...You'll be responsible for the following: Conduct in-depth threat analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection,...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...of the proposal development team (PDT). Identify and collaborate with key donors, strategic partnership with other humanitarian actors that would best increase WVDF's work and funding in humanitarian and emergency response, DRR and DM. Liaise regularly with WV Support...
- ...Responsibilities: Conduct in-depth analysis and research to attribute cyber threats and attacks, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the...
- ...within the exchange ecosystem Insider & Threat Intelligence Analysis Monitor dark web marketplaces, criminal forums, and threat actor communications for indicators targeting cryptocurrency businesses Conduct tactical, operational, and strategic threat assessments...
- ...Conduct red team operations including penetration testing, social engineering, and physical security assessments. Emulate threat actor behavior to test the effectiveness of GCash's detection and response capabilities. Collaborate with blue teams to refine defensive...
- ...effective, proactive, and analytical responses to cybersecurity-related incidents to prevent QBE from becoming compromised by threat actors and techniques. The successful candidate will be a technical advisor for the Regional GSOC Lead/Managers, Divisional Cybersecurity...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
- ...Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs...
