- Lockheed Martin (Grand Prairie, TX)
- …troubleshooting, basic interpretation, and test results analysis * Experience with vulnerability characterization * Knowledge of E3 effects on military vehicles, ... fire control systems, missile systems, and munitions, including grounding, bonding, and shielding methods, designs to minimize radiated emissions and susceptibility, HIRF, HERO, and lightning effects, electromagnetic field coupling * TEMPEST knowledge &… more
- Lockheed Martin (Fort Worth, TX)
- …tools, including IronFOSS and IronMiner, to manage SBOMs and collect software vulnerability data\. Ensure these tools meet high standards of quality and ... effectiveness\. Collaboration: Collaborate with cross\-functional teams, including software development, engineering, and IT, to integrate security measures seamlessly into the software development life cycle\. Implement AppSec practices across multiple lines… more
- Charles Schwab (Westlake, TX)
- …Designer platform. + Experience with Identity and Access, Endpoint, Vulnerability managementand other cybersecurity automation workflows. + Experience with AI ... enabled automation workflows. + Experience with Agile methodology and Atlassian tools including JIRA and Confluence. + Communicating with various audiences, including business leaders, engineers, clients, and team members, with excellent ability to convey… more
- Caterpillar, Inc. (Irving, TX)
- …risk analysis, and technology management. **What You Will Do:** + ** Vulnerability Analysis and Reduction:** Conduct thorough risk assessments to identify potential ... vulnerabilities and work with business to implement strategies to mitigate risks. + **Onboarding and Offboarding of Applications** : Manage the secure integration and removal of applications within the organization's IT environment. + **Firewall Management:**… more
- Robert Half Technology (Houston, TX)
- …and administer SASE and Zero Trust solutions. + Lead incident response, vulnerability management, and endpoint protection. + Enforce RBAC and identity governance via ... Microsoft Entra ID. + Ensure compliance with SOX and NIST CSF 2.0; maintain audit readiness. + Respond to infrastructure escalations and ITSM tickets. Requirements + 7+ years in cybersecurity/infrastructure, with 3+ in a senior or leadership role. + Deep… more
- DEFTEC (San Antonio, TX)
- …handheld IT devices to include physical preventive maintenance, vulnerability /patch management, Security Technical Implementation Guides (STIG) reviews/audits, and ... license management of software in use. + Maintain electronic software libraries and physical software media in accordance with current government guidance. + Support the government's equipment custodian in managing hardware on the 502 CS IT Hardware Inventory.… more
- TEKsystems (Plano, TX)
- …with how to build new infrastructure environments They will also help with vulnerability management, security issues, etc. Pay and Benefits The pay range for this ... position is $55.00 - $72.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible,… more
- Rubrik (Austin, TX)
- …and aid investigation when needed; + Support controlled changes and vulnerability remediation activities; and + Work collaboratively with Information Security in ... designing, implementing, assessing or enhancing system-specific security and privacy controls. **Position Risk Designation** **:** This position carries duties and responsibilities involving the US Federal Government's interests. The selected incumbent may be… more
- ServiceNow, Inc. (Addison, TX)
- …System Administrator + ServiceNow Certified Developer + ServiceNow Vulnerability Response Implementations Certification + ServiceNow Security Incident Response ... Certification **Work Personas** We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and… more
- ERCOT (Taylor, TX)
- …security assessments of simple-to-moderate complexity and review for evidence of vulnerability or compromise and assisting with the implementation of resolution + ... Escalate developing risks with impact to security leadership. + Use notification systems to draft and disseminate actionable information to company employees during increased threat, emergency or crisis situations. + Provide security assistance and risk… more