- Honeywell (Houston, TX)
- …in Security Projects. + 3+ years of experience in Cybersecurity Vulnerability or Risk assessment . + Cisco Certified Network/Design/Security Professional ... Cyber Security certifications such as GRID, CISM, or CISA. + Proficient in vulnerability scanning and assessments using tools like Nessus and NMAP. + Proven… more
- Amazon (Austin, TX)
- …object-oriented design - Experience in penetration testing and exploitability-focused vulnerability assessment - Experience in platform-level security ... mitigations and hardening for Linux and Windows Preferred Qualifications - Knowledge of overall system architecture, scalability, reliability, and performance in a database environment - Experience with security in service-oriented architectures and web… more
- Optiv (Fort Worth, TX)
- …+ Responsible for the joint team effort to normalize data from vulnerability assessment , penetration test, incident response, and application security project ... deliverables. + Establish and maintain regular written and in-person communications with the organization's executives, other group heads regarding pertinent activities. + Develop and mentor staff through open communication, training and development… more
- Cisco (Dallas, TX)
- …related to securing containerized applications (eg, Docker, Kubernetes), including vulnerability assessment and mitigation strategies. + Hands-on experience ... writing and executing automated tests for Python applications using thepytestframework. **Why Cisco?** At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly… more
- Toyota (Plano, TX)
- …activities. + Strong understanding of security principles, attack methodologies, and vulnerability assessment techniques. + Experience with common penetration ... tooling platforms, such as Kali, etc. + Deep knowledge of common network protocols, operating systems, security tools, and how to exploit/circumvent them. + Excellent analytical, problem-solving, and decision-making skills. + Bachelor's degree in Computer… more
- JPMorgan Chase (Houston, TX)
- …on storage and file products. + Strong expertise in threat modeling, vulnerability assessment , and security configuration management. + Experience with drift ... detection tools and methodologies. + Deep understanding of file storage technologies (NAS, SAN, cloud file storage, etc.). + Familiarity with regulatory requirements and compliance frameworks (eg, SOX, PCI-DSS, GDPR). + Excellent analytical, problem-solving,… more
- Texas A&M University System (College Station, TX)
- …frameworks. + Working knowledge of OT/ICS/IIoT security, intrusion detection, and vulnerability assessment for critical infrastructures. + Proficiency in system ... modeling, cybersecurity, trustworthy ML/AI, adversarial ML/AI, reinforcement learning, graph-based modeling, learning on graphs, generative AI for cybersecurity, and experience with AI-driven anomaly detection via temporal and spatial analysis. + Foundational… more
- NTT America, Inc. (Plano, TX)
- …tools and practices including SELinux, iptables, auditd, and fail2ban. Experience with vulnerability assessment and patch management using tools like Qualys, ... OpenSCAP, or Lynis. Proficient in log analysis and system monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike and OSSEC. Strong knowledge of user… more
- Sysco (Houston, TX)
- **Job Summary** We are seeking a hands-on and strategic Vulnerability & Application Security Manager to lead and evolve our security posture across infrastructure ... scale our security programs. **Duties and Responsibilities** + Scanning, assessment , prioritization, remediation coordination, and tool management (eg, Tenable, Wiz,… more
- Oracle (Austin, TX)
- …a Technical Program Manager to lead a risk-driven, enterprise-scale vulnerability management program across cyber-physical security technologies. You will own ... strategy and execution for discovery, assessment , prioritization, and remediation of vulnerabilities impacting access control, video management, SOC platforms,… more