- Amazon (Austin, TX)
- …utilized throughout Amazon and AWS. Beyond direct technical work on exploits, vulnerability research , and threat intelligence, the Cyber Threat Exploitation ... drive effective technical countermeasures. Key job responsibilities * Identify, research , and analyze novel vulnerabilities discovered in threat intelligence data,… more
- JPMorgan Chase (Plano, TX)
- …delivering solutions built to stop adversaries and strengthen our operations. Your research and work will ensure stability, capacity and resiliency of our products ... that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best… more
- Bank of America (Addison, TX)
- …and emerging threats. Key responsibilities include leading and performing research , understanding the bank's security policies, working with appropriate partners ... assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of… more
- Deloitte (Houston, TX)
- …security awareness and operational protocols. + Conduct comprehensive vulnerability assessments, actively exploiting identified weaknesses to demonstrate real-world ... latest attacker methodologies, vulnerabilities, and security technologies through ongoing research and continuous professional development. The Team Deloitte's Government… more
- Meta (Austin, TX)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software… more
- JPMorgan Chase (Plano, TX)
- …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best ... of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security… more