• ACTI Cyber Threat Exploitation Engineer…

    Amazon (Austin, TX)
    …join the Amazon Cyber Threat Intelligence (ACTI) team as a Cyber Threat Exploitation Engineer where you will leverage your in-depth knowledge and analysis of ... teams, partners, and both internal and external customers. In the Cyber Threat Exploitation Engineer role you will formulate new analytic techniques and work across… more
    Amazon (12/31/25)
    - Related Jobs
  • Assessments and Exercises Vice President-Purple…

    JPMorgan Chase (Plano, TX)
    …Red Team/Purple Team operations, application security assessments, and network exploitation operations. Candidate should have the ability to perform targeted, ... covert penetration tests with vulnerability identification, exploitation , and post- exploitation activities with no or minimal use of automated tools + Strong… more
    JPMorgan Chase (01/18/26)
    - Related Jobs
  • Cyber Software Engineer Sr (Embedded)

    Lockheed Martin (Grand Prairie, TX)
    …in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers across Lockheed Martin ... MFC to develop new exploitation software tools, and maintain current capabilities\. Your responsibilities...team\-oriented approach to interface with team members\. * Support exploitation testing to improve integrity and security of weapon… more
    Lockheed Martin (12/10/25)
    - Related Jobs
  • Social Worker

    Veterans Affairs, Veterans Health Administration (Denton, TX)
    …and practicable. Assesses for signs, symptoms, and behaviors of abuse, neglect, exploitation and/or intimate partner violence when providing services to Veterans and ... caregivers and serves as a consultant regarding abuse, neglect, exploitation , and intimate partner violence to multidisciplinary team members. Actively participates… more
    Veterans Affairs, Veterans Health Administration (01/15/26)
    - Related Jobs
  • Assessments & Exercises Vice President - Offensive…

    JPMorgan Chase (Plano, TX)
    …Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for ... reconnaissance, scanning, exploitation , and post exploitation (eg Cobalt Strike, Metasploit, Burp Suite); networking fundamentals (all OSI layers, protocols);… more
    JPMorgan Chase (01/11/26)
    - Related Jobs
  • Manager, Digital Assets Surveillance…

    Charles Schwab (Southlake, TX)
    …crypto dust, and more. + Knowledge of fraud or elder financial exploitation policies, regulatory requirements, red flags and trends within brokerage and banking ... and/or AML industries, fraud investigation and prevention, elder financial exploitation Preferred Qualifications: + Financial Crimes Certifications and FINRA… more
    Charles Schwab (01/18/26)
    - Related Jobs
  • Supervisory Intelligence Specialist

    US Air Force - Agency Wide (Fort Bliss, TX)
    …the Intelligence Cycle (Planning and Direction, Collection, Processing and Exploitation , Production, Dissemination and Integration, and Evaluation) and the ... tolls analysis, matrix analysis, traffic pattern and trend analysis, document exploitation , and database manipulation. 3. Knowledge of joint operations, current… more
    US Air Force - Agency Wide (01/09/26)
    - Related Jobs
  • School Bus Driver: No exp. needed- Training…

    Summit School Services (Mckinney, TX)
    …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... conduct that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. Summit School… more
    Summit School Services (12/27/25)
    - Related Jobs
  • Sr. Security Consultant - Penetration Testing

    SHI (Austin, TX)
    …with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation , post- exploitation , lateral movement, and data exfiltration, ... along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific… more
    SHI (12/09/25)
    - Related Jobs
  • Child Care Assistant

    WestCare Foundation (San Antonio, TX)
    …district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains ... district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains… more
    WestCare Foundation (11/11/25)
    - Related Jobs