Skip to content
Become a part of our caring community and help us put health first Are you a transitioning military service member or a Military Spouse looking for an internship that supports the goal to put health first? During the period of this unpaid internship, you will work with The Learning Design team to help create dynamic and interactive training material for Humana Healthy Horizons (Medicaid program) utilizing experience, storytelling and skillsets acquired from the military experience and education. Work assignments are varied and frequently require creativity and independent determination of the... more ->
About this role Wells Fargo is seeking a Cyber Defense Senior Lead Business Execution Consultant. This role will lead key transformation initiatives for Wells Fargo enterprise Cyber Defense Management. This role will have program level responsibilities for ensuring the success of large, strategic programs in Data Loss Prevention, Threat Intelligence, Detection & Response, Threat Prevention that have organizational wide impact. These initiatives will require high executive engagement, strong organizational and communication skills, and the ability to lead broad transformative programs. In this... more ->
Introduction The Charlotte-Mecklenburg Police Department is a highly respected law enforcement agency, both in our community and nationally. Our progressive department provides exciting opportunities for law enforcement professionals to develop partnerships with our citizens in order to prevent the next crime, and to enhance the quality of life within our community always treating people with fairness and respect. The department employs nearly 2,000 sworn officers and over 500 civilians serving a jurisdiction with close to 1 million people. Our employees are men and women from diverse... more ->
Position Summary . What you'll do . Threat Analysis and Dynamic Defense Requires knowledge of Types of threats or malware; Patterns of common malware characteristics; Mechanism of malware; Various file formats of malicious threat types; Programming languages used to create malware; Types and usage of static, dynamic, and behavioral analysis tools; Industry developments and trends in threat analysis and defense; New and emerging techniques in threat analysis. To verify cyber threat analysis outcomes and reports. Recommends proactive steps to combat and mitigate malicious code, threats, and... more ->