- Commvault (Fort Lauderdale, FL)
- …Commvault team members-including HR and leadership-via email or text. These bad actors may conduct fake interviews and ask for personal information, such as ... your social security number. **What to know:** + Commvault does _not_ conduct interviews by email or text. + We will never ask you to submit sensitive documents (including banking information, SSN, etc) before your first day. If you suspect a recruiting scam,… more
- ECMS - BASF Environmental Catalyst and Metal Solutions… (Huntsville, AL)
- …Maintenance (RCM), and Root Cause Failure Analysis (RCFA) to resolve Bad Actors . You will also manage the development and execution of comprehensive multi-year ... reliability plans and equipment inspections. In this role you will: + Expedite improvements, optimize costs, and improve overall asset effectiveness. + Drive strategic decisions for the business through the development of a multi-year reliability improvement… more
- Microsoft Corporation (Redmond, WA)
- …protection, detection, and response technologies, aiming to stay ahead of malicious actors and anticipating the threats of the future. This position provides the ... potential for tremendous personal and career growth across many dimensions. You'll have the opportunity to work across divisional boundaries and develop a broad understanding of Microsoft's business while making a meaningful impact on society. Microsoft's… more
- University of Utah (Salt Lake City, UT)
- …for learners across the health sciences, often using simulated participants (patient actors ). The lab consists of 23 outpatient examination rooms managed by an ... LMS that supports real-time digital audio and video recording. The Simulation Tech Specialist is the point person for setting up and running the cloud-based learning management system, ensuring functionality of the audio/video system during simulation… more
- Boston University (Boston, MA)
- …as supervision/guidance/training for conducting and organizing experiments. They will be key actors in the management of data produced and will be responsible for ... overseeing curation, storage, and distribution of biological samples within each lab. This person will help maintain and oversee shared lab resources, workspaces, and databases, and they will maintain laboratory safety compliance. The individual will provide… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …+ Contribute directly to cybersecurity efforts that protect against evolving threat actors + Collaborate with cyber experts who are redefining how intelligence ... powers national defense Why You Want to Be Here + Join a global leader with presence in over 100 locations worldwide + Be part of a tight-knit team at the forefront of cyber innovation + Know that your work protects freedoms and thwarts adversaries in real… more
- News Corp (New York, NY)
- …teams. + Conduct in-depth research into offensive cyber tools and cyber threat actors /APTs, translate TTPs per the MITRE ATT&CK taxonomy. + Help identify and provide ... information to the relevant teams to assist in the remediation of technical vulnerabilities and misconfigurations. + Demonstrate ownership of and accountability for relevant products and services. + Ability to plan, prioritize and complete your own work,… more
- Leidos (Washington, DC)
- …and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The selected ... candidate will be responsible for the following: + **Normal business hours will be defined as a schedule combination to include weekdays 2pm-10pm shift and weekends 6am-6pm shift. The candidate will have 2- 3 days off based on the schedule determined & the… more
- University of Utah (Salt Lake City, UT)
- …costumes for each production by pattern making, cutting, sewing, and fitting to actors . Climbs ladders, moves heavy scenery pieces, and works with a wide variety ... of power tools **Minimum Qualifications** **Preferences** Applicants demonstrate the potential ability to perform the essential functions of the job as outlined in the position description. **Special Instructions Summary** **Additional Information** The… more
- Microsoft Corporation (Redmond, WA)
- …assess, and track potential security and privacy risks exploitable by malicious actors , including Microsoft Red Team breach operators. As a Software Engineer II, ... you will work with the team to design, implement, and validate insights, analytics, and automation capabilities that enables breach risk analysis at scale. You will enable the red team breach operators to operate more efficiently by providing framework and… more