- RTX Corporation (San Jose, CA)
- …such as Ansible, Terraform, PowerShell, or Bash. + Familiarity with vulnerability scanning tools, STIG compliance, Security Content Automation Protocol (SCAP), and ... security event information management (SIEM). + Certified at DoD 8570/8140 IAM/IAT Level I or equivalent (Sec+, etc.) or ability to achieve certification within six months. + Active and transferable **TS/SCI** US government issued security clearance is… more
- Deloitte (San Francisco, CA)
- …encompassing data governance, content filtering, access management, code scanning, vulnerability detection, and intellectual property protection + Designing and ... building secure Continuous Integration/Continuous Delivery (CI/CD) pipelines specifically tailored for the training, tuning, and deployment of Machine Learning and Generative AI models, ensuring security is embedded throughout the MLOps lifecycle +… more
- SpaceX (Hawthorne, CA)
- …Secure/Authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an inter-planetary scale,… more
- NVIDIA (Santa Clara, CA)
- …components. Extensive experience working with Open Source Software and vulnerability management across components. + Excellent technical collaboration skills, ... ability to lead across teams spread globally. Passion for extending your technical knowledge into new areas strong analytical skills and proven success in problem-solving and achieving performance objectives. + Hands-on -- you actively develop high-quality… more
- Zscaler (San Jose, CA)
- …AI Copilot to be utilized by IT administrators, cybersecurity operations, and vulnerability management teams, focusing on both efficiency and user experience + ... Conducting in-depth research on the latest advancements in GenAI technologies and applying these cutting-edge techniques to build AI Copilot use cases + Designing, building, and deploying distributed micro-services, ensuring scalability and robustness +… more
- Trustmark (Sacramento, CA)
- …systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + ... Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to… more
- SOLUTE Careers (San Diego, CA)
- …key security measures such as firewalls, IDS, and ACLs. + Perform vulnerability assessments and lead remediation efforts to protect network integrity. Operations & ... Maintenance + Utilize monitoring tools to maintain network performance and minimize downtime. + Lead incident response and troubleshooting efforts, while executing testing and validation for hardware and software updates. Strategic Upgrades + Evaluate and… more
- Arup (Oakland, CA)
- …to apply them in the built environment + Understanding of a threat, vulnerability and risk assessment (TVRA) process + Use of construction administration software, ... such as PlanGrid, Procore, FacilityGrid, and BIM360 + Strong client engagement skills, including the ability to lead multidisciplinary and client meetings through the development of security objectives, communicate risks, and development of controls. Please… more
- Northrop Grumman (San Diego, CA)
- …Threats to US Military Operations + Analysis at the Survivability, Lethality, Vulnerability , Engagement, and/or Mission Level + Vehicle performance analysis + Air ... vehicle survivability analysis + Modeling and Simulation of Radars, Missiles, Integrated Air Defense Systems (IADS), Air and/or Space platforms + Electronic Attack (EA), Electronic Protection (EP), Electronic Countermeasures + Red and/or Blue CONOPs and TTPs +… more
- Trellix (Sacramento, CA)
- …routines, WFP, and driver development). + Hands-on experience with vulnerability research, including fuzzing, binary diffing, mitigation bypass, and exploitation. ... + Demonstrated experience designing and delivering detection logic across multiple OSs (Windows/macOS/Linux) in a production EDR context. + Experience with applying machine learning techniques to cybersecurity problems. + Experience leading complex… more