• Sr. Staff Security Engineer, Product Security…

    Palo Alto Networks (Santa Clara, CA)
    …internal and external audiences. + Stay up-to-date on emerging threats, exploitation techniques, and security research trends to proactively strengthen product ... fields, with significant hands-on experience in vulnerability investigation and exploitation analysis. + Strong expertise in reverse engineering, debugging, and… more
    Palo Alto Networks (10/03/25)
    - Related Jobs
  • Senior Cyber Security Specialist, Threat Hunt

    Southern California Edison (Rosemead, CA)
    …hunt for those across the SCE environment. + Use understanding of Vulnerability Exploitation to Hunt for Evidence of exploitation of emerging vulnerabilities. + ... Through hunting efforts, proactively identify and document logging gaps, architectural gaps, visibility gaps, misconfigurations and control gaps, and other observations to aid in the maturation SCE's cyber posture. + Articulate hunt findings and advise on… more
    Southern California Edison (10/03/25)
    - Related Jobs
  • Principal / Sr. Principal Signal / Image…

    Northrop Grumman (Los Angeles, CA)
    …Engineer** with a current/active Top Secret clearance to support sensor exploitation activities in the Artificial Intelligence and Analytics department. In this ... include: + Introducing and developing new algorithm components for the exploitation of signal and image data + Applying classical signal/image processing… more
    Northrop Grumman (10/03/25)
    - Related Jobs
  • Senior Linux System Administrator

    BAE Systems (San Diego, CA)
    …You will primarily support the GXP Program. BAE Systems Geospatial eXploitation ( _GXP_ ) develops industry-leading geospatial intelligence _software_ for data ... management, image exploitation , and reporting. **Position Summary:** This position requires a seasoned IT professional with expertise in managing complex, air-gapped… more
    BAE Systems (09/18/25)
    - Related Jobs
  • Sr. Security Consultant - Offensive Security

    SHI (Sacramento, CA)
    …with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation , post- exploitation , lateral movement, and data exfiltration, ... along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific… more
    SHI (09/09/25)
    - Related Jobs
  • Global Security - Vulnerable Adult Investigations…

    JPMorgan Chase (San Francisco, CA)
    …be responsible for performing investigations of elder/vulnerable adult financial exploitation while complying with various reporting requirements, policies, and ... conducts external investigations related to vulnerable adult and elder financial exploitation issues as part of the Vulnerable Adult Investigations Team. +… more
    JPMorgan Chase (09/06/25)
    - Related Jobs
  • Children's Social Worker II

    The County of Los Angeles (Los Angeles, CA)
    …placement of minors in need of protective services due to abuse, neglect, or exploitation , or perform social work services involved in adoption in planning with a ... Job Functions 1. Investigates referrals alleging child abuse, neglect, and/or exploitation by observing the child's well-being and living environment (eg, body… more
    The County of Los Angeles (09/03/25)
    - Related Jobs
  • Data Collectors

    Plan International USA (Monrovia, CA)
    …information from applicants previous employers about any findings of sexual exploitation , sexual abuse and/or sexual harassment during employment, or incidents under ... investigation when the applicant left employment. By submitting an application, the job applicant confirms their understanding of these recruitment procedures. Please note that Plan International will never send unsolicited emails requesting payment from… more
    Plan International USA (10/14/25)
    - Related Jobs
  • Principal Engineer, Security & Access Management…

    DataRobot (San Francisco, CA)
    …multi-agent systems to identify and mitigate risks such as prompt injection, model exploitation , and data poisoning. + Design and implement security controls for the ... entire AI model lifecycle, from data ingress to model deployment and inferencing. + Design and implement adversarial testing strategies and solutions for DataRobot's AI platform. + **Standards & Compliance:** + Actively participate in the security community,… more
    DataRobot (10/13/25)
    - Related Jobs
  • Principal Engineer - Cyber Security Operations

    Wells Fargo (San Francisco, CA)
    …Wireless Professional (OSWP), Offensive Security Certified Expert (OSCE), Offensive Security Exploitation Expert (OSEE), or Offensive Security Web Expert (OSWE) + ... Ability to execute in a fast paced, high demand, environment while balancing multiple priorities + Experience working in a large enterprise environment + Knowledge and understanding of banking or financial services industry **Job Expectations:** + Ability to… more
    Wells Fargo (10/11/25)
    - Related Jobs