- General Dynamics Information Technology (Hanover, MD)
- …real time operating systems . you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research, Rapid Prototyping of proof of concept ... Description:** Designs, develops, tests and evaluates electrical, mechanical, and/or computer components, equipment and systems . Provides innovative methods… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …Plan (COOP) for that system or DoD Component. * Ensure that CS security requirements are appropriately identified in computer environment operation procedures. * ... overlays. * Ensure that all users have the requisite security clearances and access authorization, and are aware of...and reviews are coordinated. **Qualifications** + Bachelor's degree in computer science, IT, information systems , or related… more
- RedTrace Technologies Inc (Philadelphia, PA)
- …from accredited college/university in Electrical, Electronic or Computer Engineering, Computer Science, or Information Systems . Security Clearance: + ... Contingent Upon Contract Award SECURITY CLEARANCE REQUIREMENT: Secret POSITION REQUIRES US CITIZENSHIP...and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results + Ensure information systems… more
- Bechtel Corporation (Richland, WA)
- …Requirements: + Requires bachelor's degree in Cybersecurity, Information Technology, Computer Science, Mechanical, Electrical, Chemical, Systems , Controls ... standard cybersecurity solutions, configurations, and practices, to include operating systems , directory services, policy, logging/telemetry, networking/telecommunications, and vulnerability… more
- Google (HI)
- …**Remote location: Hawaii, USA.** **Minimum qualifications:** + Bachelor's degree in Computer Science, Information Systems , Cybersecurity, a related technical ... security design reviews, or threat modeling. + 5 years of experience with security engineering, computer and network security , and security … more
- MyFlorida (Tallahassee, FL)
- …TALLAHASSEE COUNTY: LEON SPECIAL NOTES: Four (4) years of experience in Computer Science, Management Information Systems , Information Technology, or related ... file encryption, secure authentication, and role-based access control (RBAC). + Perform vulnerability assessments and security audits on the EFT server. +… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …using ticketing systems . + Gain hands-on experience supporting ongoing security projects, such as vulnerability scanning, code analysis, security ... awareness and best practices. + Assist in identifying and analyzing potential security vulnerabilities within supported systems and networks, following industry… more
- Microsoft Corporation (Redmond, WA)
- …and compliance best practices (least privilege, secrets management, supply-chain security , vulnerability remediation) across services and CI/CD. ... across global infrastructure. This role involves working across distributed systems , networking, storage, and platform automation to deliver resilient customer… more
- Robert Half Technology (Hammonton, NJ)
- …initiatives in Hammonton, New Jersey. This role requires a deep understanding of hardware security , embedded systems , and the ability to mentor and guide a ... with clients to identify their needs and articulate the value of embedded systems and hardware solutions. * Conduct application security assessments, including… more
- Delta Air Lines, Inc. (Atlanta, GA)
- …communicationtechniques/protocols (IP and others), and their combined effects on network andhost systems security . + Experience using a SIEM. + Comfortable ... Security team committed to safeguarding information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.… more