• IBM Storage Scale/Storage Engineer III

    Truist (Plano, TX)
    …play a crucial part in the engineering, administration, configuration, patch and vulnerability remediation, and design of IBM Scale, block storage, fiber channel ... may change from time to time. + The role will support the research , testing, and implementation of storage solutions while participating in strategies for all… more
    Truist (10/29/25)
    - Related Jobs
  • Manager, Cyber Defense Operations

    7-Eleven (Irving, TX)
    …Data loss prevention . Email security . Security Orchestration and Automation . Threat research and creation of compensating controls . Act as point of contact for ... reviews. . Oversee team in performing cyber defense platform testing, vulnerability remediation, and operating system hardening to reduce attack surface. .… more
    7-Eleven (10/23/25)
    - Related Jobs
  • Product Security Engineer, AI

    Meta (Austin, TX)
    …10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software ... in C/C++ code 13. Contributions to the security community (public research , blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with… more
    Meta (10/23/25)
    - Related Jobs
  • Technical Manager - IGA Architect | Remote, USA

    Optiv (Fort Worth, TX)
    …industry groups, delivering talks, writing technical and industry specific blogs, vulnerability research , industry PR interviews, and/or contributing to security ... publications + Track and monitor current happenings within the security industry relative to the Identity and Access Management space. + Contribute to internal team building, knowledge transfer, and training activities within the Strategic Consulting team. +… more
    Optiv (10/23/25)
    - Related Jobs
  • FPGA Design Engineer

    Nightwing (San Antonio, TX)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. When we formed Nightwing, we brought a… more
    Nightwing (10/22/25)
    - Related Jobs
  • Operational Auditor

    Aramco Services Company (Houston, TX)
    …objectives, and general audit approach of each project. Upon completion of preliminary research , estimates time allowed for each phase of the audit. Based on this ... risk-based controls across functional IT areas including networks, firewalls, vulnerability management, systems development, information security, database management and… more
    Aramco Services Company (10/17/25)
    - Related Jobs
  • Manager, Information Technology (IT)

    AireSpring (Houston, TX)
    …Lead annual compliance audits. + Manage endpoint protection, MDM, MFA, and vulnerability management. + Work closely with 3rd party consultants and internal ... troubleshooting and system architecture. + Possess proven abilities to research , evaluate, and recommend new technologies. Technical Qualifications + Bachelor's… more
    AireSpring (10/14/25)
    - Related Jobs
  • Cloud Computing Specialist (CCS) SME

    ASM Research, An Accenture Federal Services Company (Austin, TX)
    …balance multiple tasks simultaneously. + Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and ... incident response and remediation. **Compensation Ranges** Compensation ranges for ASM Research positions vary depending on multiple factors; including but not… more
    ASM Research, An Accenture Federal Services Company (10/12/25)
    - Related Jobs
  • Assessments & Exercises Vice President - Offensive…

    JPMorgan Chase (Plano, TX)
    …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best ... of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security… more
    JPMorgan Chase (10/12/25)
    - Related Jobs