- Carnival Cruise Line (Fort Lauderdale, FL)
- …measurable improvements in conversion rates, site speed, and user experience. + Security & Compliance: + Troubleshoot and resolve complex technical issues in ... protection standards. + Implement secure coding practices and conduct regular vulnerability assessments. + Collaborate with InfoSec teams to safeguard customer and… more
- Black & Veatch (Cary, NC)
- …Quality and Security Reviews** + Participate in code scanning and vulnerability assessments using tools like Snyk, integrated into Bitbucket Pipelines, as part ... Currently pursuing a Bachelor's or Master's degree in Data Science, Computer Science, Management Information Systems , Statistics, Mathematics, Data Analytics… more
- Lentech, Inc (Hanover, MD)
- Are you interested in tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team ... specifications, data flow diagrams, other accepted design techniques and Computer -Aided Software Engineering (CASE) tools. Estimates software development costs and… more
- Callen-Lorde Community Health Center (New York, NY)
- …vendor strategy, budgeting, and long-term modernization planning to ensure systems are secure, resilient, scalable, and aligned with organizational needs. ... the organization's cybersecurity program, including policies, controls, incident response, vulnerability management, and regulatory compliance (HIPAA, HITECH, OMNIBUS). +… more
- MUFG (Jersey City, NJ)
- …Lead with 10+ years of platform experience to drive architecture, security , governance, implementation, support and capability maturity across multiple ServiceNow ... integration architecture with third-party tools (eg, Flexera, cloud platforms, monitoring systems ) using REST/SOAP APIs, IntegrationHub, and MID Server. + Champion… more
- CACI International (Aurora, CO)
- …for industry, infrastructure, technology, country, geographic area, biographic and targeted vulnerability + Prepare assessments of current events based on the ... business processes + Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified… more
- CACI International (Chantilly, VA)
- …person should have a wide range knowledge and skills, such as computer forensics/mobile device forensics, data recovery, reverse engineering intrusion analysis and ... methodologies, intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity...programs with peers who are dedicated to advancing national security . Participate in fun team outings and team building… more
Recent Jobs
-
MMS R&D Engineering Intern
- BD (Becton, Dickinson and Company) (San Diego, CA)
-
Principal Software Engineer
- Microsoft Corporation (Mountain View, CA)
-
Project Manager
- TEKsystems (Los Angeles, CA)
-
Lead Operator HSE - Fire Officer
- Lilly (Indianapolis, IN)