- Cisco (CA)
- …use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring ... a product security engineer you will lead security and vulnerability assessments in collaboration with...insecure design patterns and threats in Splunk's product, performing security design reviews of distributed systems , APIs,… more
- CACI International (College Park, MD)
- …implementing security best practices. . Implement and manage security technologies including firewalls, intrusion detection/prevention systems (IDS/IPS), ... information and event management (SIEM) tools. . Conduct vulnerability assessments, penetration testing, and regular security ...Conduct threat modeling and risk assessments to improve the security posture of systems and applications. .… more
- Qualtrics (Provo, UT)
- …and vulnerability management, allowing you to tackle increasingly complex security challenges within our product development lifecycle. + Leadership in ... of version control systems . + Familiarity with and have regularly conducted security reviews using application security frameworks (eg, OWASP Top Ten). +… more
- TekSynap (Virginia Beach, VA)
- …+ Active TS/SCI security clearance + Bachelor of Science in Information Systems , Information Technology, Computer Science, or Computer Engineering + DoD ... assessments using SCAP benchmarks and EvaluateSTIG to ensure compliance with DoD security requirements. + Perform vulnerability assessments utilizing the Assured… more
- KBR (Midwest City, OK)
- …verification and validation testing and provide guidance on mitigating risk to systems + Performs risk and vulnerability analysis, cybersecurity vulnerability ... Title: Lead IT Security Analyst Position Description/Job Responsibilities: + KBR is...initiate and complete the complex cybersecurity requirements of multiple systems in the DOD environment + The selected candidate… more
- Robert Half Technology (Coral Gables, FL)
- …and non-technical staff on cybersecurity protocols. + Support integration of physical security systems (card readers, surveillance, alarms). + Coordinate with ... Investigate suspicious behavior from IDS/IPS, antivirus, firewalls, and endpoint protection systems . + Perform vulnerability scanning and collaborate with teams… more
- Nightwing (Annapolis Junction, MD)
- Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- TekSynap (Virginia Beach, VA)
- …across hardware, software, and network components. + Conduct STIG implementation to ensure systems meet DoD security compliance standards. + Configure and manage ... Secret security clearance (Tier 5) + Bachelor of Science in Information Systems , Information Technology, Computer Science, or Computer Engineering +… more
- Google (San Bruno, CA)
- …+ Bachelor's degree or equivalent practical experience. + 8 years of experience with security engineering, computer and network security and security ... devices (eg, embedded, mobile, web) to front-end serving stack, back-end, video streaming systems , global networking, crypto, protocols. Security is at the core… more
- Burns & McDonnell (Houston, TX)
- … Team to support the maintenance and ongoing system testing of all integrated security systems at assigned regional office facilities and sites. Work with ... relationships. + Demonstrated proficiency technology, ability to learn company specific integrated security systems at an operator level (Access Control, CCTV,… more