- Amentum (Austin, TX)
- …internal and external clients. + Perform cybersecurity vulnerability assessments and penetration testing **Position has no physical requirements for geographical ... and logical architecture diagrams for design and as-built submittals. Develop acceptance testing procedures and user manuals as needed. + Provide professional OT and… more
- JPMorgan Chase (Plano, TX)
- …Lifecycle methodology + Extensive experience with threat modeling, discovery, vulnerability, and penetration testing + Ability to tackle design and functionality ... business technology drivers + Performs deployment, administration, management, configuration, testing , document, operations and integration tasks related to the… more
- Robert Half (Dallas, TX)
- …as well as modern technology advancements in Internet of Things (IoT) penetration testing and quantum computing, transforming our clients' capabilities in ... Privacy team builds partnerships by conducting risk assessments and technical testing , identifying security weaknesses in client systems, and providing strategic… more
- Insight Global (Houston, TX)
- …management (SIEM) solutions. Vulnerability Management: Conduct vulnerability assessments and penetration testing to identify and address security vulnerabilities ... in systems and applications. Collaborate with system administrators and developers to remediate vulnerabilities and ensure timely patch management. Security Auditing and Compliance: Perform security audits, assess compliance with industry standards and… more
- Microsoft Corporation (Houston, TX)
- …of the following: + Security operations, Threat Intelligence, Cyber Incident Response or Penetration Testing /Red Teaming and understanding on the role of AI in ... advancing cyber defense methodologies. + Regenerative AI and/or related technologies in the field of cybersecurity. + Operating system internals, OS Security migrations and challenges in Windows, Linux, Mac, Android and iOS platforms + Security Information and… more
- Google (TX)
- …such as encryption, identity management, access control, attack vectors, and penetration testing . + Experience prospecting, building and maintaining customer ... relationships from scratch, with excitement for building out Greenfield territories. When leading companies choose Google Cloud, it's a huge win for spreading the power of cloud computing globally. Once educational institutions, government agencies, and other… more
- Microsoft Corporation (Austin, TX)
- …interfaces. OS primitives, memory management, scheduling, interrupts, threading. + Experience with Penetration testing also a plus Firmware Engineering IC4 - The ... typical base pay range for this role across the US is USD $106,400 - $203,600 per year. There is a different range applicable to specific work locations, within the San Francisco Bay area and New York City metropolitan area, and the base pay range for this… more
- Insight Global (Dallas, TX)
- …systems Assess and remediate system security vulnerabilities through techniques like penetration testing Implement and integrate Red Hat enterprise solutions ... (IdM, RHV, Satellite, RHDS, Ceph) Support identity management platforms (IBM TIM/TAM) and enterprise server hardware (Dell, HP) Hybrid Role: This is a hybrid role 3 days a week onsite We are a company committed to creating inclusive environments where people… more
- Huntington Ingalls Industries (El Paso, TX)
- …and leveraging Zero Trust principles to ensure comprehensive protection. + Conducts penetration testing to identify potential threats. Configures and manages ... Cloud-based systems, applying best practices to secure data and infrastructure. + Collaborates with stakeholders to address vulnerabilities and adapt countermeasures for dynamic threat landscapes. + Designs and evaluates security controls, integrating Zero… more
- JPMorgan Chase (Plano, TX)
- …cybersecurity organization practices in some of the following: vulnerability management, penetration testing , incident response, endpoint protection, data loss ... prevention, email security, SIEM, DDoS, public cloud security configuration best practices, etc. + Ability to understand complex technical systems, the business processes they support, assess the inherent risks, and recommend mitigating security controls +… more