- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Celestica (Austin, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- IT Concepts (Springfield, VA)
- …Experience with PHP, Python, C#, C++. + Experience using NGA computer systems , non-cloud web servers, AWS cloud, security , and familiarity with the ... Identity and Access Management integration. + Support information assurance vulnerability alerts and manage relational databases. + Enhance customer service… more
- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Hologic (Newark, DE)
- …to enhance product safety and effectiveness. + Awareness of software security principles, including threat modeling, vulnerability assessments, and penetration ... software development for both Software as a Medical Device (SaMD) and embedded systems (SiMD). In this role, you'll lead design controls, risk management processes,… more
- Belay Technologies (Fort Meade, MD)
- …+ Experience with SW development methodologies + Knowledge of application and security testing, vulnerability management and tracking + Understanding of Risk ... type, and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems , Engineering Science, Engineering Management, or… more
- Lentech, Inc (Hanover, MD)
- Are you interested in tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team ... Engineer develops, maintains, and enhances complex and diverse software systems (eg, processing-intensive analytics, novel algorithm development, manipulation of… more
- Oracle (Augusta, ME)
- …and building secure, complaint and scalable architectures for safety-critical systems is a must. **Responsibilities** **Responsibilities:** As a Principal Member ... implementation of secure-by-design principles across all device software, ensuring vulnerability management and cybersecurity compliance with FDA and global… more
- Nightwing (Sterling, VA)
- …**Requirements** **Current TS/SCI with Poly Clearance** **Bachelor's degree in computer science, information systems , engineering mathematics, and six ... Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers'… more