- Insight Global (Austin, TX)
- …reviews (RTL, firmware code) . Planning, coordination and execution of pre-silicon vulnerability analysis (VA) . Technical interface to customers and to the ... different business and product development teams . Certification support and technical interface with evaluators and certifiers Root cause analysis of security defects and vulnerabilities We are a company committed to creating inclusive environments where… more
- Cardinal Health (Austin, TX)
- …determining scope, urgency, and potential impact, identifying the specific vulnerability , and making recommendations that enable expeditious remediation. + Perform ... cyber defense trend analysis and reporting. + Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. + Coordinate with intelligence analysts to correlate threat assessment data. + Write and… more
- NPK International Inc. (Midland, TX)
- …a chance to shine **_S_** **-** **_Sincere_** **-** Authenticity starts with vulnerability **_E_** **-** **_Enterprising_** **-** Agility is the key to opportunity ... How To Apply Register to create an account then search for the vacancy. Click Apply to complete your application online. _We are an equal opportunity employer. NPK and its affiliates do not discriminate against applicants or employees on the basis of race,… more
- NPK International Inc. (Midland, TX)
- …Any moment is a chance to shine **S** - Sincere - Authenticity starts with vulnerability **E** - Enterprising - Agility is the key to opportunity How To Apply ... Register to create an account then search for the vacancy. Click Apply to complete your application online. _We are an equal opportunity employer. NPK and its affiliates do not discriminate against applicants or employees on the basis of race, color, age,… more
- Huntington National Bank (Addison, TX)
- …with tools like MITRE ATT&CK, AttackIQ or similar. + 2 years in threat management, vulnerability management + 2 years using SAST, DAST, IAST, MAST or SCA tools. + 2 ... years as a security engineer or architect. Preferred Qualifications: + Excellent communication skills required to negotiate internally, often at a senior level. + Some external communication may be necessary. + Understanding of FFIEC guidance, COBIT and NIST… more
- Cisco (Austin, TX)
- …principles, including concepts such as authentication, authorization, encryption, and vulnerability management, with a willingness to deepen expertise in cloud ... and application security **Preferred Qualifications** + Experience with SIEM solutions like Splunk. + Familiarity with XDR. + Experience with additional cloud platforms, such as GCP and Azure, including their service catalogs and security offerings. +… more
- Leidos (San Antonio, TX)
- …operations. + Utilize experience conducting intelligence nodal analysis and critical vulnerability assessments of enemy networks to identify and nominate key nodes ... for kinetic and non-kinetic options, thereby disrupting or eliminating enemy centers of gravity. + Provide IW, and Unconventional Warfare UW, OIE and intelligence doctrine, operations, policy, and authorities subject matter expertise and integration of lessons… more
- ISC2 (Austin, TX)
- …teams to ensure compliance with security policies, threat modeling, and vulnerability management. + Partner with business stakeholders to translate complex ... functional requirements into secure, scalable, and integrated solutions. + Provide technical leadership in configuration, development, and deployment using tools such as Salesforce DX, Git, Bitbucket, and automation pipelines. + Mentor and supervise developers… more
- Amazon (Austin, TX)
- …data structures and algorithms, software development, threat modeling, pen tests, or vulnerability assessments Amazon is an equal opportunity employer and does not ... discriminate on the basis of protected veteran status, disability, or other legally protected status. Los Angeles County applicants: Job duties for this position include: work safely and cooperatively with other employees, supervisors, and staff; adhere to… more
- Lockheed Martin (San Antonio, TX)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more