- Amazon (Austin, TX)
- …join the Amazon Cyber Threat Intelligence (ACTI) team as a Cyber Threat Exploitation Engineer where you will leverage your in-depth knowledge and analysis of ... teams, partners, and both internal and external customers. In the Cyber Threat Exploitation Engineer role you will formulate new analytic techniques and work across… more
- JPMorgan Chase (Plano, TX)
- …Red Team/Purple Team operations, application security assessments, and network exploitation operations. Candidate should have the ability to perform targeted, ... covert penetration tests with vulnerability identification, exploitation , and post- exploitation activities with no or minimal use of automated tools + Strong… more
- Lockheed Martin (Grand Prairie, TX)
- …in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers across Lockheed Martin ... MFC to develop new exploitation software tools, and maintain current capabilities\. Your responsibilities...team\-oriented approach to interface with team members\. * Support exploitation testing to improve integrity and security of weapon… more
- Veterans Affairs, Veterans Health Administration (Denton, TX)
- …and practicable. Assesses for signs, symptoms, and behaviors of abuse, neglect, exploitation and/or intimate partner violence when providing services to Veterans and ... caregivers and serves as a consultant regarding abuse, neglect, exploitation , and intimate partner violence to multidisciplinary team members. Actively participates… more
- JPMorgan Chase (Plano, TX)
- …Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for ... reconnaissance, scanning, exploitation , and post exploitation (eg Cobalt Strike, Metasploit, Burp Suite); networking fundamentals (all OSI layers, protocols);… more
- Charles Schwab (Southlake, TX)
- …crypto dust, and more. + Knowledge of fraud or elder financial exploitation policies, regulatory requirements, red flags and trends within brokerage and banking ... and/or AML industries, fraud investigation and prevention, elder financial exploitation Preferred Qualifications: + Financial Crimes Certifications and FINRA… more
- US Air Force - Agency Wide (Fort Bliss, TX)
- …the Intelligence Cycle (Planning and Direction, Collection, Processing and Exploitation , Production, Dissemination and Integration, and Evaluation) and the ... tolls analysis, matrix analysis, traffic pattern and trend analysis, document exploitation , and database manipulation. 3. Knowledge of joint operations, current… more
- Summit School Services (Mckinney, TX)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... conduct that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. Summit School… more
- SHI (Austin, TX)
- …with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation , post- exploitation , lateral movement, and data exfiltration, ... along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific… more
- WestCare Foundation (San Antonio, TX)
- …district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains ... district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains… more