- Bank of America (Addison, TX)
- …the power to make a difference. Join us! **Job Description:** Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of ... to assess the security resilience of the bank's applications to malicious hacking activity. This senior technical role is responsible performing and leading ethical… more
- Bank of America (Addison, TX)
- …the power to make a difference. Join us! **Job Description:** Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of ... to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application… more
- Stephen F. Austin State University (Nacogdoches, TX)
- …a technical position responsible for assisting with efforts to defend against hacking and other malicious attempts to penetrate the university's network. Responsible ... a technical position responsible for coordinating efforts to defend against hacking and other malicious attempts to penetrate the university's network. Responsible… more
- Moss Adams LLP (Dallas, TX)
- …or external cybersecurity role, or similar \(eg, threat/penetration testing, ethical hacking , OWASP top 10, AppScan\) + Collaborative and able to effectively ... communicate with a team. + Required Certification: Offensive Security Certified Professional \(OSCP\)Preferred Certifications: GPEN: GIAC Certified Penetration Tester, OffSec Web Assessor \(OSWA\), OffSec Web Expert \(OSWE\), API Security Certified… more
- Aramco Services Company (Houston, TX)
- …Investigate suspected attacks, such as man-in-the-middle attacks, sniffing, DoS, etc., hacking activities, and breaches of Information security policies. + Analyze ... security events generated by various network and host-based security appliances, such as firewalls, NIDS, HIDS, and event logs. Determine appropriate remediation actions and escalation paths to address identified security issues. + Document findings, create… more
- Charles Schwab (Southlake, TX)
- …degree in Cybersecurity a plus + Web application penetration testing, ethical hacking , red/blue teaming, or capture-the-flag experience a plus In addition to the ... salary range, this role is also eligible for bonus or incentive opportunities. **What's in it for you** At Schwab, we're committed to empowering our employees' personal and professional success. Our purpose-driven, supportive culture, and focus on your… more
- Omnicell (Austin, TX)
- …in a lean startup environment, starting with problems to be solved and hacking together prototypes for customer validation. + Engage with customers to gather ... feedback and iterate on solutions. + Push the envelope in engineering solutions, with a focus on disruptive and innovative approaches. **Required Skills:** + Bachelor's degree in Engineering, Computer Science, or a related field. + 6+ years of experience in… more
- Central Texas College (Killeen, TX)
- …C#, and JAVA Information Technology Security to include cybersecurity, ethical hacking , and IT security auditing. + Network/Systems Administration to include server ... and client implementation and maintenance and server cloud services Posting Detail Information Other Information Open to the public Continuous posting Perform other duties assigned more
- BMO Financial Group (Irving, TX)
- …Prior experience in 2 or more other security domains, eg, ethical hacking , cloud security, security architecture domains (eg, Application, Network, Platform) is ... preferred. + Industry certifications such as CISM, CISSP, GIAC + Post-secondary degree in Computer Science, Engineering, or Information System **Salary:** $122,400.00 - $228,000.00 **Pay Type:** Salaried The above represents BMO Financial Group's pay range and… more
- Robert Half Technology (Dallas, TX)
- …+ Scripting and automation skills such as Python and Bash + Ethical Hacking exposure or experience Preferred Qualifications: + Bachelor's or Master's degree in ... Computer Science, Cybersecurity, or a related field. + Relevant Certifications such as CISSP, CEH, OSCP, or equivalent. + Exposure to DevSecOps methodologies and CI/CD integration. + Cloud platforms (AWS, Azure, GCP). + Container security tools and platforms… more