- Molina Healthcare (TX)
- …implementation of appropriate remediation measures to reduce risk of future exploitation . + Aligns and coordinates internal multidisciplinary security functions with ... global security objectives and initiatives. + Designs, implements, and oversees monitoring intelligence capabilities and activity supporting intelligence assessments to determine potential risks and threats to Molina people, property, or information + Serves… more
- Insight Global (Plano, TX)
- …data (strong attention to details) - experience / appetitive in the leverage/ exploitation /development of systems - Good communicator and a good people person given ... the need to collaborate effectively across teams and people of diverse backgrounds - Ability to operate autonomously and proactively, managing multiple deliverables at a single time in a fast-paced, results-oriented environment - Familiar with Data Factory -… more
- ServiceNow, Inc. (Addison, TX)
- …security, integration, analysis and reporting. + Build a best-in-class team for the exploitation of data, using cloud and social era tools and techniques for data ... analytics, mining, and visualization. Build multiple successors and a team that meets the business needs of the future. + Partner with peer leaders in the Analytics organization (Sales Analytics, Finance Analytics, Marketing Analytics, Customer, and Talent… more
- Executive Office for US Attorneys and the Office of the US… (Houston, TX)
- …trafficking, fraud, corruption, immigration violations, import/export violations, and child exploitation in order to deter crime and dismantle sophisticated criminal ... enterprises. Asset Recovery Unit AUSAs also work to pursue collection of criminal restitution debts owed to victims of federal crimes and civil debts owed to the United States. Asset Recovery Unit AUSAs will generally have opportunities to handle matters… more
- Trellix (Austin, TX)
- …vulnerability research, including fuzzing, binary diffing, mitigation bypass, and exploitation . + Demonstrated experience designing and delivering detection logic ... across multiple OSs (Windows/macOS/Linux) in a production EDR context. + Experience with applying machine learning techniques to cybersecurity problems. + Experience leading complex cross-functional security initiatives or projects. + Proven ability to mentor… more
- Optiv (Fort Worth, TX)
- …of a team to perform digital investigations including: Zero Day Exploitation , Business Email Compromise, Unauthorized Access, Sensitive Data Exposure, Insider ... Threat, Malware Analysis, and Threat Hunting. An EIM Consultant also contributes to the development and continuous improvement of the EIM practice through various team and industry contributions. **How you'll make an impact:** + Ability to combine multiple… more
- Bank of America (Addison, TX)
- …+ Experience with designing and developing custom implants, loaders, and post- exploitation tools for red team engagements. + Comprehensive knowledge of ... command-and-control frameworks like Cobalt Strike, Mythic, Havoc, and Sliver. + Experience with researching and implementing EDR evasion techniques, including userland and kernel-level bypasses, in-memory execution, and telemetry disruption. + Must demonstrate… more
- Amazon (Austin, TX)
- …in vulnerability management, including the evaluation of software vulnerabilities, exploitation probability prediction systems, the calculation of risk posed by ... vulnerabilities in complex software deployments such as container orchestration - Experience in assessing security risks for AI/ML systems, including model supply chain security, vulnerability analysis of large language models, and implementing security… more