3,992 Threat Analysis jobs in the United States
CI Cyber Threat Analysis
Posted 1 day ago
Job Viewed
Job Description
In a world of possibilities, pursue one with endless opportunities. Imagine Next!
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
Job Description:
Parsons is looking for an amazingly talented CI Cyber Threat Analysis to join our team!
Overall Assignment Description: To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
Duties may include:
-
Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
-
Threat data collected and reported by NGA Cyber CI team and network security personnel.
-
Intelligence reported by the Intelligence Community.
-
Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
-
Imagery when available.
-
Information that can be used to inform cyber security decisions.
-
Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
-
Compilation of data collected and reported in weekly products.
-
Intelligence reported by the Intelligence Community.
-
Fused All Source threat analysis derived from multiple INT's.
-
Imagery when available.
-
Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
-
Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
-
Compilation of data collected and reported in weekly and monthly products.
-
Intelligence reported by the Intelligence Community.
-
Fused all source threat analysis derived from multiple INT's.
-
Include imagery when available.
-
Depiction of cyber threat (s) to NGA to inform cyber security decisions.
-
Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
-
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
-
Raw and finished Intelligence reported by the Intelligence Community.
-
Fused all source threat analysis derived from multiple INT's.
-
Include imagery when available.
-
Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
-
Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
-
Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
-
Cross referencing local information reporting with Intelligence Community reporting.
-
Clear and concise writing to briefly convey threat.
-
Responsiveness to Intelligence Community priority collections requirements.
-
Timeliness.
-
Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
-
Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
-
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
-
Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
-
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
-
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
-
Demonstrate current subject matter expertise on cyber issues, threats and trends.
-
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
-
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
-
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Skills and Experience:
Required:
-
Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
-
5+ years of related CI cyber analytic or CI cyber investigations experience.
-
Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
Desired:
- Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
Security Clearance Requirement:
An active Top Secret security clearance is required for this position?
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
CI Cyber Threat Analysis

Posted 10 days ago
Job Viewed
Job Description
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
**Job Description:**
Parsons is looking for an amazingly talented **CI Cyber Threat Analysis** to join our team!
**Overall Assignment Description:** To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
**Duties may include:**
+ Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Threats reports will include:
+ Threat data collected and reported by NGA Cyber CI team and network security personnel.
+ Intelligence reported by the Intelligence Community.
+ Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
+ Imagery when available.
+ Information that can be used to inform cyber security decisions.
+ Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly products.
+ Intelligence reported by the Intelligence Community.
+ Fused All Source threat analysis derived from multiple INT's.
+ Imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
+ Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
+ Compilation of data collected and reported in weekly and monthly products.
+ Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Depiction of cyber threat (s) to NGA to inform cyber security decisions.
+ Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
+ Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
+ Raw and finished Intelligence reported by the Intelligence Community.
+ Fused all source threat analysis derived from multiple INT's.
+ Include imagery when available.
+ Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
+ Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
+ Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
+ Cross referencing local information reporting with Intelligence Community reporting.
+ Clear and concise writing to briefly convey threat.
+ Responsiveness to Intelligence Community priority collections requirements.
+ Timeliness.
+ Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
+ Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
+ Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
+ Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
+ Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
+ Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
+ Demonstrate current subject matter expertise on cyber issues, threats and trends.
+ Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
+ Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
+ Display an ability to collaborate with internal NGA and external IC/Cyber community members.
**Skills and Experience:**
**Required:**
+ Bachelor's Degree in Computer Science, Engineering, or a related technical discipline.
+ 5+ years of related CI cyber analytic or CI cyber investigations experience.
+ Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
**Desired:**
+ Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
**Security Clearance Requirement:**
An active Top Secret security clearance is required for this position?
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
Senior Analyst - Intelligence & Threat Analysis
Posted today
Job Viewed
Job Description
Investigation Consulting
**Travel Required** **:**
None
**Clearance Required** **:**
Active Top Secret SCI (TS/SCI)
**What You Will Do** **:**
+ Perform advanced data analysis to develop actionable intelligence and assess alternative solutions.
+ Project data trends and estimate probabilities based on current and historical program knowledge.
+ Communicate clearly and effectively in both oral and written formats.
+ Prepare comprehensive reports, briefings, charts, tables, and other analytical products.
+ Identify the impacts and implications of findings and provide strategic recommendations.
+ Manage and prioritize multiple projects simultaneously in a fast-paced environment.
+ Assist in the development and delivery of presentations to internal and external stakeholders.
+ Conduct large-scale data analysis, including the creation of query techniques, prototype programs, and algorithms.
+ Prepare and submit detailed studies and reports, ensuring alignment with organizational goals.
+ Mentor and guide less senior personnel, communicating policies, objectives, and best practices.
+ Present briefings to designated personnel as required by program leadership.
**What You Will Need** **:**
+ An ACTIVE and MAINTAINED "TOP SECRET/SCI (TS/SCI)" Federal or DoD security clearance.
+ Once onboard with Guidehouse, new hire MUST be able to OBTAIN and MAINTAIN TS/SCI Federal or DoD security clearance with a COUNTERINTELLIGENCE (CI) polygraph.
+ Bachelor's degree; FOUR (4) years of additional experience of military or federal experience in a similar program may be substituted in lieu if Bachelor's degree.
+ EIGHT (8) or more years of experience performing administrative, analytical, and research functions in national security or operational security-related matters.
**What Would Be Nice To Have** **:**
+ An ACTIVE and MAINTAINED TS/SCI Federal or DoD security clearance with a COUNTERINTELLIGENCE (CI) polygraph.
+ Proficiency in Microsoft Office Suite (Word, Excel, PowerPoint) and Google Chrome.
+ Strong interpersonal and communication skills, with the ability to convey complex information to diverse audiences.
+ Demonstrated ability to evaluate and develop methods to meet performance and mission objectives.
+ Proven experience in managing competing priorities and delivering high-quality analytical outputs.
**What We Offer** **:**
Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.
Benefits include:
+ Medical, Rx, Dental & Vision Insurance
+ Personal and Family Sick Time & Company Paid Holidays
+ Position may be eligible for a discretionary variable incentive bonus
+ Parental Leave and Adoption Assistance
+ 401(k) Retirement Plan
+ Basic Life & Supplemental Life
+ Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts
+ Short-Term & Long-Term Disability
+ Student Loan PayDown
+ Tuition Reimbursement, Personal Development & Learning Opportunities
+ Skills Development & Certifications
+ Employee Referral Program
+ Corporate Sponsored Events & Community Outreach
+ Emergency Back-Up Childcare Program
+ Mobility Stipend
**About Guidehouse**
Guidehouse is an Equal Opportunity Employer-Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation.
Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco.
If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.
All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or . Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process.
If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse's Ethics Hotline. If you want to check the validity of correspondence you have received, please contact . Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant's dealings with unauthorized third parties.
_Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee._
Associate Director, Risk and Threat Analysis
Posted 16 days ago
Job Viewed
Job Description
Associate Director, Risk and Threat Analysis Join to apply for the Associate Director, Risk and Threat Analysis role at Columbia University Facilities & Operations Continue with Google Continue with Google Associate Director, Risk and Threat Analysis 2 days ago Be among the first 25 applicants Join to apply for the Associate Director, Risk and Threat Analysis role at Columbia University Facilities & Operations Job Type: Officer of Administration Regular/Temporary: Regular Hours Per Week: 35 Salary Range: $135,000 - $45,000 The salary of the finalist selected for this role will be set based on a variety of factors, including but not limited to departmental budgets, qualifications, experience, education, licenses, specialty, and training. The above hiring range represents the University's good faith and reasonable estimate of the range of possible compensation at the time of posting. Position Summary The Associate Director, Risk and Threat Analysis is responsible for overseeing the monitoring, assessment, and mitigation of potential threats to campus safety, security, and reputation identified through open-source intelligence and other sources. Reporting to the Deputy Vice President for Operations and Investigations, this role will lead a team in tracking and analyzing digital threats, supporting emergency response efforts, and ensuring proactive risk management strategies are in place. The supervisor will collaborate with university leadership, law enforcement, IT Security, Public Relations, and Student Affairs to address real-time and emerging risks affecting the institution. Responsibilities Leadership & Team Management Supervise and provide guidance to the Risk Analyst and any additional staff assigned to threat intelligence. Develop protocols and standard operating procedures for risk monitoring using open-source intelligence and other sources and response. Ensure compliance with university policies and applicable laws and regulations. Provide ongoing training and professional development for the risk analysis team. Threat Monitoring & Risk Mitigation Oversee real-time monitoring for security threats, reputational risks, and policy violations using open-source intelligence and other sources. Lead the assessment and prioritization of threats, determining appropriate action plans in coordination with Campus Safety and law enforcement. Utilize intelligence tools and analytics software to track trends and identify potential safety risks. Establish workflows for incident escalation and response, ensuring swift action on critical threats. Collaboration & Crisis Response Serve as the primary liaison between Public Safety, IT Security, Public Relations, and law enforcement regarding threats and crisis management. Provide intelligence reports to university leadership during emergencies or reputational crises. Work closely with Student Affairs to address concerns related to student safety, well-being, and misconduct. Support event security planning by identifying potential risks in advance of large campus gatherings and major campus activities. Reporting & Policy Development Develop and maintain dashboards and reports tracking risks and campus safety trends. Working closely with the Deputy Vice President, advise university leadership on best practices for online threat detection and mitigation. Draft policies related to risk and threat assessment and management. Maintain detailed records of incidents, responses, and intelligence findings for institutional, investigative and legal purposes. Minimum Qualifications Bachelor’s degree required in Criminal Justice, Intelligence Studies, Cybersecurity, Risk Management, Communications, or a related field. Minimum 5 years of experience in risk and threat intelligence, law enforcement, or campus security. Proven experience in threat assessment and risk analysis, particularly in a university or government setting. Strong leadership and team management skills. Proficiency in relevant analytics and intelligence-gathering tools (e.g., Brandwatch, Meltwater, Sprinklr, Talkwalker). Knowledge of emergency management, public safety, and digital forensics. Excellent communication, crisis response, and decision-making skills. Preferred Qualifications Master’s degree in a relevant field. Law enforcement, military, or intelligence agency background. Familiarity with higher education regulations such as the Clery Act, FERPA, and Title IX. Experience collaborating with cybersecurity teams on digital threat mitigation. Other Requirements Requires flexibility to respond to urgent threats outside of normal business hours, including evenings, weekends and holidays as necessary. Equal Opportunity Employer / Disability / Veteran Columbia University is committed to the hiring of qualified local residents. Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job function Job function Finance and Sales Industries Higher Education Referrals increase your chances of interviewing at Columbia University Facilities & Operations by 2x Sign in to set job alerts for “Risk Director” roles. Continue with Google Continue with Google Continue with Google Continue with Google New York City Metropolitan Area 2 days ago Consultant- Chief Risk Officer - Operations (Fractional/Contract Role) New York City Metropolitan Area 5 days ago Consultant - Chief Risk Officer, Investments (Fractional/Contract Role) New York City Metropolitan Area $250,000 00 - 300,000.00 1 month ago New York, NY 175,000.00 - 225,000.00 2 weeks ago New York, NY 80,000.00 - 155,000.00 4 days ago Credit Risk Management - Strategy Vice President New York, NY 136,500.00 - 300,000.00 15 hours ago New York, NY 188,000.00 - 323,950.00 1 month ago New York, NY 150,000.00 - 180,000.00 1 week ago Vice President, Head of Governance, Model Risk Management New York, NY 185,000.00 - 275,000.00 6 days ago New York City Metropolitan Area 175,000.00 - 250,000.00 1 week ago New York, NY 225,000.00 - 250,000.00 2 weeks ago New York, NY 120,000.00 - 160,000.00 1 day ago Director – Liquidity Risk (Investment Banking) New York City Metropolitan Area 3 weeks ago New York, NY $1 6,500.00 - 300,000.00 3 days ago Director, Digital Assets Risk and Controls New York, NY 127,000.00 - 250,000.00 6 days ago Director – North America Credit Settlement Risk Management New York, NY $1 5,400.00 - 234,200.00 1 week ago Risk Management & Compliance - Portfolio Management - Vice President New York City Metropolitan Area 175,000.00 - 250,000.00 1 week ago New York City Metropolitan Area 1 week ago Head of Risk – Electronic & Algorithmic Trading New York City Metropolitan Area 5 days ago New York, NY $2 5,000 - 275,000 1 week ago New York, NY 143,400 - 285,450 1 day ago Ice Cream Regional Insurance & Risk Manager - Americas Englewood Cliffs, NJ 99,760 - 149,640 5 days ago Risk Management - Credit Risk Vice President - Real Estate New York, NY 120,000 - 205,000 2 months ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr
Security Engineer, AI Security Threat Analysis and Reporting
Posted 1 day ago
Job Viewed
Job Description
Summary:
1/ MissionProtect Meta and its community by measuring and mitigating AI-driven cybersecurity risks, and harnessing AI to drive innovation in cybersecurity.2/ VisionEvaluate: CyberSecEval is the leading and preferred system for assessing cybersecurity risks in Large Language Models and LLM enabled applications, and enables timely evaluation and safe release of all of Meta's LLMs.Defend: Detect and reduce security risks across 100% of Meta GenAI experiences.Deploy: Meta Central Security is equipped with efficient and effective AI applications that are also open sourced, further cementing Meta and the Llama brand at the forefront of industry use of AI to solve cybersecurity challenges.3/ StrategyEmpower the ecosystem with defensive tools (such as voice-based scam detection) to enable responsible OSS release of new models.Expand the conversation from the current narrow focus on Attacker uplift to include Defender uplift, by expanding CyberSecEval and releasing Defender use cases.Defend Meta from the highest impact insecure LLM interactions that are:currently being conductednecessary to be in place for secure and timely release of upcoming AI experiencesPrototype and experiment with applications of LLMs throughout X-Sec, working within X-Sec partner teams to productionize and scale highest impact solutions, and open source solutions that are applicable to security use cases outside of Meta.Partner with industry organizations to (a) co-develop solutions in the above areas and/or (b) explicitly adopt the solutions Meta releases.External description1/ MissionEnsure the safe adoption of LLMs by continuously measuring and mitigating their cybersecurity risks.2/ VisionLlamaFirewall: A foundational system designed to detect and prevent insecure LLM inputs and outputs and which we will maintain and grow over time as the AI landscape evolves.CyberSecEval: A foundational system for assessing cybersecurity risks in LLMs which we will also build upon and adapt to the dynamic and growing AI risk environment.
Required Skills:
Security Engineer, AI Security Threat Analysis and Reporting Responsibilities:
-
Work directly with product managers and technical leads on threat models and reporting for Meta's AI products
-
Develop quarterly AI threat modeling reports delivered to Meta AI leadership
-
Provide guidance and education to developers that help deter and prevent threats
-
Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
-
Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
Minimum Qualifications:
Minimum Qualifications:
-
Bachelor of Science or Master of Science in Computer Science or related field, or equivalent experience
-
5+ years of work experience in Security Threat Detection and Investigation Engineering in a large, regulated organization
-
In-depth subject-matter knowledge in technical and process regarding Security Operations and Threat Reporting
-
Experience developing and delivering information on threat intelligence reports and program status for leadership
-
Experience analyzing both external and insider threats
-
Coding/scripting experience in one or more general purpose languages
Public Compensation:
$147,000/year to $208,000/year + bonus + equity + benefits
Industry: Internet
Equal Opportunity:
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at
Security Engineer, AI Security Threat Analysis and Reporting
Posted 1 day ago
Job Viewed
Job Description
Summary:
1/ MissionProtect Meta and its community by measuring and mitigating AI-driven cybersecurity risks, and harnessing AI to drive innovation in cybersecurity.2/ VisionEvaluate: CyberSecEval is the leading and preferred system for assessing cybersecurity risks in Large Language Models and LLM enabled applications, and enables timely evaluation and safe release of all of Meta's LLMs.Defend: Detect and reduce security risks across 100% of Meta GenAI experiences.Deploy: Meta Central Security is equipped with efficient and effective AI applications that are also open sourced, further cementing Meta and the Llama brand at the forefront of industry use of AI to solve cybersecurity challenges.3/ StrategyEmpower the ecosystem with defensive tools (such as voice-based scam detection) to enable responsible OSS release of new models.Expand the conversation from the current narrow focus on Attacker uplift to include Defender uplift, by expanding CyberSecEval and releasing Defender use cases.Defend Meta from the highest impact insecure LLM interactions that are:currently being conductednecessary to be in place for secure and timely release of upcoming AI experiencesPrototype and experiment with applications of LLMs throughout X-Sec, working within X-Sec partner teams to productionize and scale highest impact solutions, and open source solutions that are applicable to security use cases outside of Meta.Partner with industry organizations to (a) co-develop solutions in the above areas and/or (b) explicitly adopt the solutions Meta releases.External description1/ MissionEnsure the safe adoption of LLMs by continuously measuring and mitigating their cybersecurity risks.2/ VisionLlamaFirewall: A foundational system designed to detect and prevent insecure LLM inputs and outputs and which we will maintain and grow over time as the AI landscape evolves.CyberSecEval: A foundational system for assessing cybersecurity risks in LLMs which we will also build upon and adapt to the dynamic and growing AI risk environment.
Required Skills:
Security Engineer, AI Security Threat Analysis and Reporting Responsibilities:
-
Work directly with product managers and technical leads on threat models and reporting for Meta's AI products
-
Develop quarterly AI threat modeling reports delivered to Meta AI leadership
-
Provide guidance and education to developers that help deter and prevent threats
-
Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
-
Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
Minimum Qualifications:
Minimum Qualifications:
-
Bachelor of Science or Master of Science in Computer Science or related field, or equivalent experience
-
5+ years of work experience in Security Threat Detection and Investigation Engineering in a large, regulated organization
-
In-depth subject-matter knowledge in technical and process regarding Security Operations and Threat Reporting
-
Experience developing and delivering information on threat intelligence reports and program status for leadership
-
Experience analyzing both external and insider threats
-
Coding/scripting experience in one or more general purpose languages
Public Compensation:
$147,000/year to $208,000/year + bonus + equity + benefits
Industry: Internet
Equal Opportunity:
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at
Security Engineer, AI Security Threat Analysis and Reporting

Posted today
Job Viewed
Job Description
1/ MissionProtect Meta and its community by measuring and mitigating AI-driven cybersecurity risks, and harnessing AI to drive innovation in cybersecurity.2/ VisionEvaluate: CyberSecEval is the leading and preferred system for assessing cybersecurity risks in Large Language Models and LLM enabled applications, and enables timely evaluation and safe release of all of Meta's LLMs.Defend: Detect and reduce security risks across 100% of Meta GenAI experiences.Deploy: Meta Central Security is equipped with efficient and effective AI applications that are also open sourced, further cementing Meta and the Llama brand at the forefront of industry use of AI to solve cybersecurity challenges.3/ StrategyEmpower the ecosystem with defensive tools (such as voice-based scam detection) to enable responsible OSS release of new models.Expand the conversation from the current narrow focus on Attacker uplift to include Defender uplift, by expanding CyberSecEval and releasing Defender use cases.Defend Meta from the highest impact insecure LLM interactions that are:currently being conductednecessary to be in place for secure and timely release of upcoming AI experiencesPrototype and experiment with applications of LLMs throughout X-Sec, working within X-Sec partner teams to productionize and scale highest impact solutions, and open source solutions that are applicable to security use cases outside of Meta.Partner with industry organizations to (a) co-develop solutions in the above areas and/or (b) explicitly adopt the solutions Meta releases.External description1/ MissionEnsure the safe adoption of LLMs by continuously measuring and mitigating their cybersecurity risks.2/ VisionLlamaFirewall: A foundational system designed to detect and prevent insecure LLM inputs and outputs and which we will maintain and grow over time as the AI landscape evolves.CyberSecEval: A foundational system for assessing cybersecurity risks in LLMs which we will also build upon and adapt to the dynamic and growing AI risk environment.
**Required Skills:**
Security Engineer, AI Security Threat Analysis and Reporting Responsibilities:
1. Work directly with product managers and technical leads on threat models and reporting for Meta's AI products
2. Develop quarterly AI threat modeling reports delivered to Meta AI leadership
3. Provide guidance and education to developers that help deter and prevent threats
4. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
5. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
6. Bachelor of Science or Master of Science in Computer Science or related field, or equivalent experience
7. 5+ years of work experience in Security Threat Detection and Investigation Engineering in a large, regulated organization
8. In-depth subject-matter knowledge in technical and process regarding Security Operations and Threat Reporting
9. Experience developing and delivering information on threat intelligence reports and program status for leadership
10. Experience analyzing both external and insider threats
11. Coding/scripting experience in one or more general purpose languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at
Be The First To Know
About the latest Threat analysis Jobs in United States !
Security Engineer, AI Security Threat Analysis and Reporting
Posted 3 days ago
Job Viewed
Job Description
1/ MissionProtect Meta and its community by measuring and mitigating AI-driven cybersecurity risks, and harnessing AI to drive innovation in cybersecurity.2/ VisionEvaluate: CyberSecEval is the leading and preferred system for assessing cybersecurity risks in Large Language Models and LLM enabled applications, and enables timely evaluation and safe release of all of Meta's LLMs.Defend: Detect and reduce security risks across 100% of Meta GenAI experiences.Deploy: Meta Central Security is equipped with efficient and effective AI applications that are also open sourced, further cementing Meta and the Llama brand at the forefront of industry use of AI to solve cybersecurity challenges.3/ StrategyEmpower the ecosystem with defensive tools (such as voice-based scam detection) to enable responsible OSS release of new models.Expand the conversation from the current narrow focus on Attacker uplift to include Defender uplift, by expanding CyberSecEval and releasing Defender use cases.Defend Meta from the highest impact insecure LLM interactions that are:currently being conductednecessary to be in place for secure and timely release of upcoming AI experiencesPrototype and experiment with applications of LLMs throughout X-Sec, working within X-Sec partner teams to productionize and scale highest impact solutions, and open source solutions that are applicable to security use cases outside of Meta.Partner with industry organizations to (a) co-develop solutions in the above areas and/or (b) explicitly adopt the solutions Meta releases.External description1/ MissionEnsure the safe adoption of LLMs by continuously measuring and mitigating their cybersecurity risks.2/ VisionLlamaFirewall: A foundational system designed to detect and prevent insecure LLM inputs and outputs and which we will maintain and grow over time as the AI landscape evolves.CyberSecEval: A foundational system for assessing cybersecurity risks in LLMs which we will also build upon and adapt to the dynamic and growing AI risk environment.
**Required Skills:**
Security Engineer, AI Security Threat Analysis and Reporting Responsibilities:
1. Work directly with product managers and technical leads on threat models and reporting for Meta's AI products
2. Develop quarterly AI threat modeling reports delivered to Meta AI leadership
3. Provide guidance and education to developers that help deter and prevent threats
4. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
5. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
6. Bachelor of Science or Master of Science in Computer Science or related field, or equivalent experience
7. 5+ years of work experience in Security Threat Detection and Investigation Engineering in a large, regulated organization
8. In-depth subject-matter knowledge in technical and process regarding Security Operations and Threat Reporting
9. Experience developing and delivering information on threat intelligence reports and program status for leadership
10. Experience analyzing both external and insider threats
11. Coding/scripting experience in one or more general purpose languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at
Security Engineer, AI Security Threat Analysis and Reporting
Posted 3 days ago
Job Viewed
Job Description
1/ MissionProtect Meta and its community by measuring and mitigating AI-driven cybersecurity risks, and harnessing AI to drive innovation in cybersecurity.2/ VisionEvaluate: CyberSecEval is the leading and preferred system for assessing cybersecurity risks in Large Language Models and LLM enabled applications, and enables timely evaluation and safe release of all of Meta's LLMs.Defend: Detect and reduce security risks across 100% of Meta GenAI experiences.Deploy: Meta Central Security is equipped with efficient and effective AI applications that are also open sourced, further cementing Meta and the Llama brand at the forefront of industry use of AI to solve cybersecurity challenges.3/ StrategyEmpower the ecosystem with defensive tools (such as voice-based scam detection) to enable responsible OSS release of new models.Expand the conversation from the current narrow focus on Attacker uplift to include Defender uplift, by expanding CyberSecEval and releasing Defender use cases.Defend Meta from the highest impact insecure LLM interactions that are:currently being conductednecessary to be in place for secure and timely release of upcoming AI experiencesPrototype and experiment with applications of LLMs throughout X-Sec, working within X-Sec partner teams to productionize and scale highest impact solutions, and open source solutions that are applicable to security use cases outside of Meta.Partner with industry organizations to (a) co-develop solutions in the above areas and/or (b) explicitly adopt the solutions Meta releases.External description1/ MissionEnsure the safe adoption of LLMs by continuously measuring and mitigating their cybersecurity risks.2/ VisionLlamaFirewall: A foundational system designed to detect and prevent insecure LLM inputs and outputs and which we will maintain and grow over time as the AI landscape evolves.CyberSecEval: A foundational system for assessing cybersecurity risks in LLMs which we will also build upon and adapt to the dynamic and growing AI risk environment.
**Required Skills:**
Security Engineer, AI Security Threat Analysis and Reporting Responsibilities:
1. Work directly with product managers and technical leads on threat models and reporting for Meta's AI products
2. Develop quarterly AI threat modeling reports delivered to Meta AI leadership
3. Provide guidance and education to developers that help deter and prevent threats
4. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
5. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
6. Bachelor of Science or Master of Science in Computer Science or related field, or equivalent experience
7. 5+ years of work experience in Security Threat Detection and Investigation Engineering in a large, regulated organization
8. In-depth subject-matter knowledge in technical and process regarding Security Operations and Threat Reporting
9. Experience developing and delivering information on threat intelligence reports and program status for leadership
10. Experience analyzing both external and insider threats
11. Coding/scripting experience in one or more general purpose languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at
Risk Management
Posted 22 days ago
Job Viewed
Job Description
Duties: Drive the development of analytics tools to enhance the overall efficiency of the stress testing group. Partner with Risk, Finance, and Quantitative Research groups to assist in the enhancement of existing loan stress models. Collect data from various sources, synthesize the information, perform analysis, and interpret results to make recommendations that impact portfolio risk management. Run and review stress loss forecasting models to meet regulatory reporting requirements and ongoing portfolio monitoring. Support the production of the Comprehensive Capital and Analysis Review and Dodd-Frank Act Stress Tests (CCAR & DFAST) and quarterly Risk Appetite stress testing exercises. Collaborate with the Quantitative Research group to implement and maintain a new loss estimation framework. Prepare and present results to regulators and management teams in Risk and Finance. Support the development of complex sensitivity analysis and the extension of stress testing results for risk management purposes. Work with the Risk Identification team to align stress testing with risks identified across the portfolio.
QUALIFICATIONS:
Minimum education and experience required: Master's degree in Business Analytics, Data Analytics, Information Technology, Data Science, Economics, Finance, or related field of study plus three (3) years of experience in the job offered or as Risk Management, Business Intelligence Analyst, Quantitative Analyst, Software Engineer, Software Quality Analyst, or related occupation. The employer will alternatively accept a Bachelor's degree in Business Analytics, Data Analytics, Information Technology, Data Science, Economics, Finance, or related field of study plus five (5) years of experience in the job offered or as Risk Management, Business Intelligence Analyst, Quantitative Analyst, Software Engineer, Software Quality Analyst, or related occupation.
Skills Required: This position requires experience with the following: developing and maintaining Python-based code for data analysis and calculations; collaborating with various teams designing, developing, and deploying Python-based codebase; troubleshooting and debugging issues that arise in the Python-based codebase; manipulating, aggregating, and summarizing data and model results; creating visualizations in Tableau and Excel that support decision making; using Excel, PowerPoint, and Word applications for data analysis, documentation, and presentation purposes; creating dynamic reports using pivot tables in Excel; loss modelling; predictive analysis on loan defaults; defining requirements for reporting enhancements. Experience in the skills may be gained through professional work experience, graduate coursework experience, or internships.
Job Location: 8181 Communications Parkway, Plano, TX 75024.
JPMorganChase, one of the oldest financial institutions, offers innovative financial solutions to millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we are a leader in investment banking, consumer and small business banking, commercial banking, financial transaction processing and asset management.
We offer a competitive total rewards package including base salary determined based on the role, experience, skill set and location. Those in eligible roles may receive commission-based pay and/or discretionary incentive compensation, paid in the form of cash and/or forfeitable equity, awarded in recognition of individual achievements and contributions. We also offer a range of benefits and programs to meet employee needs, based on eligibility. These benefits include comprehensive health care coverage, on-site health and wellness centers, a retirement savings plan, backup childcare, tuition reimbursement, mental health support, financial coaching and more. Additional details about total compensation and benefits will be provided during the hiring process.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
JPMorgan Chase & Co. is an Equal Opportunity Employer, including Disability/Veterans