- IRIS Consulting Corporation (Atlanta, GA)
- …mission by completing related results as needed. '-Builds, deploys, and tracks security measurements for computer systems and networks. -Mitigates ... the design, testing, evaluation, implementation, support, management, and deployment of security systems /devices used to safeguard the organization's information… more
- City of New York (New York, NY)
- …accredited college including or supplemented by twenty-four (24) semester credits in cyber security , network security , computer science, computer ... computer engineering, information technology, information science, information systems management, network administration, or a pertinent scientific, technical… more
- City of New York (New York, NY)
- …accredited college including or supplemented by twenty-four (24) semester credits in cyber security , network security , computer science, computer ... computer engineering, information technology, information science, information systems management, network administration, or a pertinent scientific, technical… more
- MIT Lincoln Laboratory (Lexington, MA)
- …written and oral formats * Maintain smooth operation of multi-user computer systems , including coordination with network/software/system engineers, desktop ... and configuration management * Create and maintain user and computer accounts, and modify file permissions and security...products, services, and suggestions * Adhere to strict Information Systems security guidelines in all cases *… more
- MIT Lincoln Laboratory (Lexington, MA)
- …and technical analysis of offensive or defensive cyber tools and systems , automated vulnerability discovery, reverse engineering, software protection mechanisms, ... Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and… more
- Kansas Judicial Branch (Topeka, KS)
- … security initiatives. + Work collaboratively with the Director of Information Systems in designing and implementing all security -related functions for the ... + Monitor and analyze system access logs. + Perform vulnerability and penetration tests, identify, defend against and remediate...work assignments in a timely fashion. Working knowledge of security protocols, IT systems , security … more
- Northrop Grumman (Colorado Springs, CO)
- …Expertise in applying vendor patches for cybersecurity tools and the underlying systems (Windows, Linux) + Understanding vulnerability management processes, such ... Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations… more
- WestRock Company (Atlanta, GA)
- …of study, including any of the following but not limited to: Information Systems , Network Engineering, or Information Security . * Certifications in related ... written communication skills. Preferred: * BS/BA in a related discipline (ie, Computer Science, Information Systems , Engineering, Business, etc.); and/or 5 years… more
- Charles Schwab (Phoenix, AZ)
- …is a centralized 1st Line of Defense Center of Excellence (COE) that provides security services to advance Schwab's security posture and enhance the protection ... of Schwab's critical assets. Enterprise Vulnerability Management (EVM) is responsible for Secure Configuration Management - and we need a skilled and experienced… more
- TekSynap (Columbia, MD)
- …that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Ensures the rigorous application of ... **Responsibilities & Qualifications** **RESPONSIBILITIES** Plan, implement, upgrade, or monitor security measures for the protection of computer networks and… more