- Google (Sunnyvale, CA)
- …role. + Experience developing accessible technologies. + Experience with vulnerability testing. Google's software engineers develop the next-generation technologies ... that change how billions of users connect, explore, and interact with information and one another. Our products need to handle information at massive scale, and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas,… more
- NVIDIA (Santa Clara, CA)
- …hardware and software vulnerabilities, developing PoC, and tools for automation in vulnerability research? Are you creative and devious in your offensive approach? ... We want to hear from you! You should demonstrate ability to excel in an environment with innovative and fast paced development on the worlds most powerful integrated software and hardware computing platform. What you'll be doing: + Core job duties will… more
- Coinbase (Sacramento, CA)
- …guidance on secure product development, secure vendor product integration, and vulnerability remediation. * Evaluate and recommend new security technologies and ... solutions to enhance the company's security posture. * Participate in incident response activities, providing architectural insights and recommendations for containment and remediation. * Mentor and guide junior security engineers and security champions on… more
- GovCIO (Sacramento, CA)
- …deployment + Experience implementing logging solutions + Experience with vulnerability remediation + Experience in creating software/scripts to automate production ... systems with fluency in at least one of the following: Bash, Perl, Ruby, Python - appropriate use of built-in functions and libraries + Advanced Linux System Administration, Configuration, and System Security + Advanced systems troubleshooting skills +… more
- Vera Therapeutics (Brisbane, CA)
- …issues/concerns within the company as well as potential areas of compliance vulnerability and risk; work collaboratively with the relevant business function(s) to ... implement corrective action plans for resolution of problematic issues; and provide guidance on how to prevent or address similar situations in the future. * Provide compliance expertise for global healthcare-related initiatives, as may be required. * Manage… more
- Northrop Grumman (Manhattan Beach, CA)
- …+ Knowledge with Cyber products for systems to include logging, vulnerability scanning, intrusion detection mechanisms, patching systems, anti-virus and related ... processes + Knowledge of Risk Management Framework (RMF), Security Technical Implementation Guide (STIG), and requirements development from control listings + Knowledge all areas of network and software interconnections and interfacing, such as routers,… more
- Antech Diagnostics (Fountain Valley, CA)
- …Response and security teams. + Conducts and coordinate risk assessments, vulnerability scanning, and penetration testing for network security. + Implement and ... enforce network security policies, access controls and encryption. + Work with the Mars SOC team to assist in investigating security incidents to support forensic investigation and analysis. Further assist with integration of managing Security Incident Event… more
- Northrop Grumman (Manhattan Beach, CA)
- …+ Knowledge with Cyber products for systems to include logging, vulnerability scanning, intrusion detection mechanisms, patching systems, anti-virus and related ... processes + Expert knowledge of Risk Management Framework (RMF), Security Technical Implementation Guide (STIG), and requirements development from control listings + Expert knowledge all areas of network and software interconnections and interfacing, such as… more
- Southern California Edison (Pomona, CA)
- …in support of regulatory proceedings (eg, Climate Adaptation and Vulnerability Assessments, HIGH Distribution Energy Resources Order Instituting Rulemaking) + ... Lead grid assessment to support SCE's Grid Strategy workstreams, including location identification, forecasting, analysis, and solution optimization. + Provide recommendations on tool development and process enhancements to improve the efficiency and… more
- Google (Mountain View, CA)
- …months with human experts struggling to keep up with the long log of vulnerability reports. The danger is exacerbated by open-source models who are becoming more ... capable at cyberattack and are more readily available by malicious actors. The goal of our project is to leverage AI for the defense: (1) automatically fix discovered vulnerabilities and (2) harden code either through checked annotations or through… more