- US Tech Solutions (Charlotte, NC)
- …on-premises CyberArk to CyberArk SaaS Privilege Cloud, while also assisting in cyber threat detection, forensic investigations, and access governance across IT ... systems. + This role will serve as a key technical contributor on the Information Security team, ensuring seamless...Operations:** + Monitor networks and systems to detect potential cyber threats or anomalies + Analyze security logs, IDS/IPS… more
- Guidehouse (Washington, DC)
- **Job Family** **:** Cyber Consulting **Travel Required** **:** Up to 10% **Clearance Required** **:** Active Top Secret SCI (TS/SCI) **What You Will Do** **:** + ... focused risk assessment and mitigation plans. + Conduct vulnerability and threat assessments of suppliers, software, hardware, and overall supply chain processes… more
- GE HealthCare (Waukesha, WI)
- …for hunting, detecting and responding to digital security threats. Demonstrates technical leadership abilities and strong comprehension of malware, emerging threats ... into specific engineering * Create and track meaningful metrics around product cyber risk and compensating controls * Consult, architect on security requirements and… more
- CACI International (Reston, VA)
- …defensive cyber applications. + Working knowledge of USSOCOM, Inter Agency/ Intelligence Community and the DOD Sensitive Activities enterprise. + Experience and ... Sensitive Activities Advisor Job Category: Intelligence Time Type: Full time Minimum Clearance Required...to identify, characterize and counter WMD and Irregular Warfare threat networks capable of threatening US National Security and… more
- GliaCell Technologies (Annapolis Junction, MD)
- …GliaCell Technologies focuses on Software & System Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software ... by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat .... We Offer: + Long term job security + Competitive salaries & bonus opportunities + Challenging work you… more
- GliaCell Technologies (Annapolis Junction, MD)
- …GliaCell Technologies focuses on Software & System Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software ... by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat .... We Offer: + Long term job security + Competitive salaries & bonus opportunities + Challenging work you… more
- GliaCell Technologies (MD)
- …GliaCell Technologies focuses on Software & System Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software ... by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat .... We Offer: + Long term job security + Competitive salaries & bonus opportunities + Challenging work you… more
- SHI (Austin, TX)
- …candidate will have a solid background in software engineering, GitHub Actions, CI /CD pipelines, and strong scripting skills in Groovy, Python, PowerShell, and Shell ... TX HQ or Somerset, NJ HQ. Role Description * Design, implement, and manage CI /CD pipelines. * Develop and maintain Infrastructure as Code (IaC) using Terraform. *… more
- First Horizon Bank (Metairie, LA)
- …in application security, secure development practices, and automation within CI /CD environments. To leverage deep expertise in application security testing, ... and collaborate with developers to implement effective remediations. + Work with CI /CD pipelines to integrate security testing into DevOps workflows. + As-needed,… more
- Amentum (Falls Church, VA)
- …clear and concise briefings + Strong knowledge of foreign adversaries' intelligence capabilities including cyber / technical , information operations, and ... HUMINT + Understanding of offensive and defensive counter- intelligence methods + Familiarity with the concepts involved... methods + Familiarity with the concepts involved in CI risk analysis including insider threat detection… more