- Leidos (San Antonio, TX)
- …is tasked with driving the implementation and adoption of new tools, research , capabilities, frameworks, and methodologies while ensuring those already in use are ... triage of events, cyber incident handling, trend analysis, metric development, vulnerability information dissemination, and the DoD Cyber Security Service Provider… more
- Leidos (San Antonio, TX)
- …operations. + Utilize experience conducting intelligence nodal analysis and critical vulnerability assessments of enemy networks to identify and nominate key nodes ... authorities subject matter expertise and integration of lessons learned to support senior leader decision making. + Develop, validate, coordinate, and integrate IW/… more
- Amazon (Austin, TX)
- …Engineers are both visionary leaders and hands-on builders. As Amazon's most senior individual contributors, Principal Engineers work on our hardest problems. While ... customers protected by adversary threats, and how do we continue to research and modernized our efforts against these potential coercions." Basic Qualifications 10… more
- Chevron Corporation (Houston, TX)
- …controls. * Co-facilitate a cyber tabletop, risk assessment, and/or vulnerability assessment. * Understand the underlying architecture and technical components ... for PCN architectures. * Participate in the research , development, and testing of emerging OT technologies. *...a four-year college or university and classified as a senior or graduate student with anticipation of receiving a… more
- Huntington Ingalls Industries (San Antonio, TX)
- …capabilities that produce cyberspace effects in and throughout cyberspace operations via vulnerability analysis and software research and development. + Designs, ... Anticipated Salary Range: - $193,700.00 Security Clearance: TS/SCI Level of Experience: Senior This opportunity resides with Warfare Systems (WS), a business group… more
- JPMorgan Chase (Plano, TX)
- …vision that delivers value to customers. + Manages discovery efforts and market research to uncover customer solutions and integrate them into the product roadmap. + ... multiple security or risk management domains (eg, application security, vulnerability management, data protection, encryption, logging and monitoring, network… more