- Cognizant (Lynchburg, VA)
- …(likely a Jenkins CI/CD pipeline) to run scheduled triggered and/or on-demand web application security (WAS) scans. The vulnerability scanner will likely be ... security vulnerability scans like Nessus. + Experience with static application security testing (SAST) + Experience with tools such as VersionOne Confluence… more
- Insight Global (Waller, TX)
- …expertise in manual exploitation, chaining vulnerabilities, and full-kill-chain assessments Strong application security knowledge aligned with OWASP Top 10 and ... experienced penetration testing expert with 10+ years in offensive security and secure software delivery. This senior role is...a reasonable accommodation due to a disability during the application or recruiting process, please send a request to… more
- Wolters Kluwer (Coppell, TX)
- …and expenses, and ensuring they align with the set goals or targets. * Application Security : The ability to protect applications from threats and attacks by ... responses to changes. * APIs: The ability to design, develop, and manage Application Programming Interfaces, which constitute the set of protocols and tools used for… more
- Mb Solutions, Inc. (Huntsville, AL)
- …CI/D pipelines (GitLab CI, GitHub Actions, Jenkins, etc.) * Experience with ** application security tools** (SAST, DAST, vulnerability scanning) * Familiarity ... Agile Software Development processes to support system design, architecture, application development, integration, deployment, and maintenance. * Create, develop,… more
- Trace Systems Inc (Shaw AFB, SC)
- …software and affiliated systems through the cloud implementation pipeline; + Perform application security patching, upgrades and enhancements; + Manage and ... virtual systems and applications in cloudenvironment; + Monitor virtual machines and application use and performance using automated tools; + Monitor system logs for… more
- Nightwing (Sterling, VA)
- …and third generation [nation-state sponsored]) - Knowledge of system and application security threats and vulnerabilities (eg, buffer overflow, mobile ... classes of attacks and attack stages - Understanding of system and application security threats and vulnerabilities - Understanding of proactive analysis… more
- University of Texas Rio Grande Valley (Edinburg, TX)
- …this at any time by selecting to edit your profile in the application . Security sensitive; conviction verification conducted on applicant selected. To apply ... redacting any confidential information from the documents you attach with your application . The confidential information includes the following: Date of Birth Social… more
- University of Texas Rio Grande Valley (Rio Grande, TX)
- …this at any time by selecting to edit your profile in the application . Security sensitive; conviction verification conducted on applicant selected. To apply ... redacting any confidential information from the documents you attach with your application . The confidential information includes the following: Date of Birth Social… more
- MetLife (Clarks Summit, PA)
- …Selenium, JUnit/Mockito. * Understanding of modern Identity and Access Management and application security (AppSec) practices. * Demonstrated ability to quickly ... * Build and maintain enterprise-grade applications and solutions with a focus on security and performance. * Integrate AI Capabilities (eg, GenAI APIs, ML models)… more
- University of Texas Rio Grande Valley (Rio Grande, TX)
- …may update this at any time by selecting to edit your profile in the application . Security sensitive; All UTRGV employees are required to have a criminal ... research experience in social media content creation and the application of AI technologies. They will be expected to...primarily in a general office environment. This position is security sensitive and thereby subject to the provisions of… more