• Director, Protection Services Operations Center…

    Molina Healthcare (TX)
    …implementation of appropriate remediation measures to reduce risk of future exploitation . + Aligns and coordinates internal multidisciplinary security functions with ... global security objectives and initiatives. + Designs, implements, and oversees monitoring intelligence capabilities and activity supporting intelligence assessments to determine potential risks and threats to Molina people, property, or information + Serves… more
    Molina Healthcare (06/29/25)
    - Related Jobs
  • Data Analyst - INTL - Mexico or India

    Insight Global (Plano, TX)
    …data (strong attention to details) - experience / appetitive in the leverage/ exploitation /development of systems - Good communicator and a good people person given ... the need to collaborate effectively across teams and people of diverse backgrounds - Ability to operate autonomously and proactively, managing multiple deliverables at a single time in a fast-paced, results-oriented environment - Familiar with Data Factory -… more
    Insight Global (06/28/25)
    - Related Jobs
  • Sr. Dir., Marketing Analytics

    ServiceNow, Inc. (Addison, TX)
    …security, integration, analysis and reporting. + Build a best-in-class team for the exploitation of data, using cloud and social era tools and techniques for data ... analytics, mining, and visualization. Build multiple successors and a team that meets the business needs of the future. + Partner with peer leaders in the Analytics organization (Sales Analytics, Finance Analytics, Marketing Analytics, Customer, and Talent… more
    ServiceNow, Inc. (06/27/25)
    - Related Jobs
  • Assistant United States Attorney (Criminal-Asset…

    Executive Office for US Attorneys and the Office of the US… (Houston, TX)
    …trafficking, fraud, corruption, immigration violations, import/export violations, and child exploitation in order to deter crime and dismantle sophisticated criminal ... enterprises. Asset Recovery Unit AUSAs also work to pursue collection of criminal restitution debts owed to victims of federal crimes and civil debts owed to the United States. Asset Recovery Unit AUSAs will generally have opportunities to handle matters… more
    Executive Office for US Attorneys and the Office of the US Attorneys (06/18/25)
    - Related Jobs
  • Sr Staff Security Researcher - EDR

    Trellix (Austin, TX)
    …vulnerability research, including fuzzing, binary diffing, mitigation bypass, and exploitation . + Demonstrated experience designing and delivering detection logic ... across multiple OSs (Windows/macOS/Linux) in a production EDR context. + Experience with applying machine learning techniques to cybersecurity problems. + Experience leading complex cross-functional security initiatives or projects. + Proven ability to mentor… more
    Trellix (06/17/25)
    - Related Jobs
  • Consultant - Enterprise Incident Management…

    Optiv (Fort Worth, TX)
    …of a team to perform digital investigations including: Zero Day Exploitation , Business Email Compromise, Unauthorized Access, Sensitive Data Exposure, Insider ... Threat, Malware Analysis, and Threat Hunting. An EIM Consultant also contributes to the development and continuous improvement of the EIM practice through various team and industry contributions. **How you'll make an impact:** + Ability to combine multiple… more
    Optiv (06/13/25)
    - Related Jobs
  • Senior Red Team Developer - Adaptive Threat…

    Bank of America (Addison, TX)
    …+ Experience with designing and developing custom implants, loaders, and post- exploitation tools for red team engagements. + Comprehensive knowledge of ... command-and-control frameworks like Cobalt Strike, Mythic, Havoc, and Sliver. + Experience with researching and implementing EDR evasion techniques, including userland and kernel-level bypasses, in-memory execution, and telemetry disruption. + Must demonstrate… more
    Bank of America (06/03/25)
    - Related Jobs
  • Sr. Security Engineer (AI VM), AWS Vulnerability…

    Amazon (Austin, TX)
    …in vulnerability management, including the evaluation of software vulnerabilities, exploitation probability prediction systems, the calculation of risk posed by ... vulnerabilities in complex software deployments such as container orchestration - Experience in assessing security risks for AI/ML systems, including model supply chain security, vulnerability analysis of large language models, and implementing security… more
    Amazon (05/21/25)
    - Related Jobs