- Leidos (Chambersburg, PA)
- …relevant experience may be considered in lieu of degree. + Understanding of security architecture, system hardening, vulnerability management , and intrusion ... continuous monitoring program for a large organization. + Demonstrated proficiency in security architecture, system hardening, vulnerability management , and… more
- Vanguard (Malvern, PA)
- …resilience. + Lead Vendor & Vulnerability Management : Oversee vulnerability mitigation strategies and vendor security assessments to protect our ... What You'll Do + Lead Security Assessments: Take ownership of evaluating security...Lead Security Assessments: Take ownership of evaluating security controls across applications, networks, and architectures. Identify vulnerabilities… more
- Lockheed Martin (King Of Prussia, PA)
- …Linux operating systems * Experience with Active Directory \(AD\) * Experience with vulnerability remediation and security management \(system hardening, log ... Imaging, Hardware Modernization, Performance Monitoring, etc\.\) * Knowledge of Risk Management Framework \(RMF\) and Security Technical Implementation Guide… more
- Lockheed Martin (King Of Prussia, PA)
- …System administration * Experience with Active Directory \(AD\) * Experience with vulnerability remediation and security management \(system hardening, log ... Imaging, Hardware Modernization, Performance Monitoring, etc\.\) * Knowledge of Risk Management Framework \(RMF\) and Security Technical Implementation Guide… more
- Geisinger (Danville, PA)
- …to associate level personnel for identifying and reporting on specific threat and vulnerability topics. + Participates on the Security Incident Response Team as ... effective countermeasures. Participates on cross-functional, multi-departmental teams to implement security -in-design solutions that effectively prevent, detect and respond to… more
- ASM Research, An Accenture Federal Services Company (Harrisburg, PA)
- …and analysis in order to mitigate and eliminate data and cyber security risks. Develops acceptance criteria for cybersecurity architecture. + Monitor network traffic ... for suspicious activities and potential security incidents. + Investigate any incidents and implement necessary...is up to standard. + Conduct risk assessments and vulnerability scans to identify weaknesses in the system and… more
- Vanguard (Malvern, PA)
- …Set the Standard: Define best practices for risk assessments, vulnerability management , and secure development processes. Update security standards and close ... What You'll Do + Lead Advanced Security Assessments: Drive comprehensive evaluations of security...that make an impact. + Harness AI for Risk Management : Use advanced AI tools to continuously monitor, track,… more
- Highmark Health (Pittsburgh, PA)
- …risk across second line of defense functions (ie, privacy, compliance, information security , quality, legal) and supporting a broad range of frameworks including ... monitoring activities pertaining to known issues as well as threat and vulnerability scan reporting on applications, networks, operating systems, etc. to identify… more
- TekSynap (Philadelphia, PA)
- …& Qualifications** **RESPONSIBILITIES** + Ensure the stability, functionality, and security of in-house computer software systems and network connections across ... load balancing, fault tolerance, and system failover strategies. + Conduct vulnerability assessments and apply appropriate mitigation strategies to maintain system… more
Recent Searches
- director service provider partner (United States)
- Program Manager Operations Excellence (Massachusetts)
- Value Based Programs Business (Alaska)
Recent Jobs
-
Delivery Architect Director-SAP A&D Engagement Manager/ Delivery Architect
- Capgemini (Atlanta, GA)