- Lumen (Sacramento, CA)
- …identify and design solutions for issues involving: new features, interoperability, vulnerability , system limits and constraints facing the platforms and products. ... In addition, engineers are responsible to evaluate current capabilities and predict future needs, then work with internal stakeholders, vendors and peers to anticipate, define, and pursue these capabilities. A successful engineer is a strong communicator and… more
- Broadcom (Palo Alto, CA)
- …security requirements including data encryption, authentication, access control, and vulnerability management. + Work closely with product managers, architects, and ... other stakeholders to define security requirements and ensure the security of the VCF platform. + Identify security risks in the platform and create innovative, scalable solutions to mitigate those risks. + Collaborate with security and compliance teams to… more
- Sony Pictures Entertainment (Culver City, CA)
- …(IAM), AI Security, Product Security, Threat modeling, GPDR and privacy, vulnerability assessment techniques, DevSecOps, Secure Coding Principles and Practices. + ... Application Security Expertise: Demonstrated experience with Full Stack WebApp/API, firewalls (WAFs), secure software development lifecycles (S-SDLCs), DevSecOps, IaC, Docker/Container Security, Data Security, static/dynamic application security testing… more
- Baylor Scott & White Health (Sacramento, CA)
- …and maintain security controls to protect payment card data. + Conduct vulnerability scans, penetration testing, and security monitoring activities. + Analyze system ... and network configurations to identify compliance gaps and security risks. + Provide technical guidance on PCI DSS remediation efforts, working closely with IT and security teams. + Develop and maintain security policies, procedures, and documentation related… more
- RTX Corporation (Goleta, CA)
- …+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, ... Tenable, ACAS, HBSS, etc. + Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry. + Experience in the execution of the Assessment… more
- SpaceX (Hawthorne, CA)
- …Secure/Authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an inter-planetary scale,… more
- Mission Support and Test Services (Goleta, CA)
- …and at least 9 years' relevant experience. + Knowledge of EW/CYBER vulnerability systems is desired. + Ability to exercise discretion and independent judgment ... regarding how principles and methods are selected and applied to work is required. + Working knowledge of Operational Technology (OT) and Industrial Control Systems (ICS) systems used in the Power Sector is desired. + Demonstrated experience to write technical… more
- US Tech Solutions (Mountain View, CA)
- …such as access management, business continuity, pen testing, and vulnerability management. **Preferred Certifications:** + PMP or equivalent Project Management ... certification. + CISA, CISSP, or ISO 27001 Lead Implementer. **Education:** + Bachelor's degree or equivalent industry experience. **About US Tech Solutions:** US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and… more
- Broadcom (Palo Alto, CA)
- …vulnerabilities, developing PoC exploits, utilizing exploit kits, providing vulnerability mitigations, virtual patches, workarounds and fix recommendations. They ... achieve this by performing feature security reviews, baseline security tests, fuzzing, reviewing/writing code, security tool development/integration, security architecture and other techniques. In the first 6mths, you will be expected to become intimately… more
- Northrop Grumman (Redondo Beach, CA)
- …Exchange** , **SCCM** or similar update service, and experience working with vulnerability scanning tools. + Must have experience maintaining Cohesity or similar ... **Backup Appliances** + Must have a DOD 8570 IAT Level II, or higher, certification (example: Security+ CE); maintaining the required certification will be a condition of continued employment + Candidates must have a current DOD Top Secret level security… more