- Paycom Online (Oklahoma City, OK)
- …appropriate. **Qualifications** **Education/Certification:** + **Bachelor's Degree in Management Information Systems , Computer Science or Cyber Security ** ... but are not limited to the following areas: Vulnerability Scanning; Security Information and Event Management systems ; Next Generation Firewalls; Network… more
- COLSA Corporation (Shalimar, FL)
- … security analysis and assessments on Air Force and Space Force systems to better understand cybersecurity vulnerabilities, characterize security risks, and ... and other penetration test tools. Additional experience can include vulnerability analysis, network/ security engineering, network protocol structures,… more
- General Dynamics Information Technology (San Antonio, TX)
- …ICAM requirements. You must be able to research, compile information and prepare computer security incident solutions based on threat events, incidents and ... compliance with the security controls identified within the Committee on National Security Systems Instructions (CNSSI) No 1253 Table D-1, Security … more
- General Dynamics Information Technology (Colorado Springs, CO)
- …primary function will be to organize, install, and support government organization's computer systems , including local area networks (LANs), wide area networks ... Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems , forensic analysis/ vulnerability assessment, Group Policy management… more
- TestPros (Sterling, VA)
- … governance and policy + Security risk analysis + Auditing and monitoring systems + Scanning and vulnerability management systems + Advanced Malware ... Systems and Organizations (DFARS 252.204-7012). + NIST SP 800-53 Rev. 5, Security and Privacy Controls for Federal Information Systems and Organizations. +… more
- Serco (Norfolk, VA)
- … security and design practices, and implement all applicable Information Assurance Vulnerability Alert (IAVA) security requirements. + Support the regular ... the implementation configuration/setup, test, maintenance and upgrade of Host Base Security System (HBSS) solution to include derivation and configuration and… more
- Parsons Corporation (Centreville, VA)
- …for automating reverse engineering and exploit development + Create and develop novel security applications for embedded systems + Quickly isolate areas of ... agile, tight knit development team helping to drive client computer network defense (CND) and computer network... + Rapidly prototype new technologies to exploit target systems + Perform vulnerability research on hardened… more
- Comerica (Auburn Hills, MI)
- …Git, etc. Preferred Qualifications/Licenses/Certifications: + Preferred, CISSP (Certified Information Systems Security Professional) CISM, CySA+, or other ... Engineering function is responsible for supporting the design and implementation of Security Architecture patterns into functioning platforms and systems within… more
- Cisco (Research Triangle Park, NC)
- …with third-party security tools, APIs, and data sources like SIEM systems and Vulnerability Scanning tools. Data Integration and Engineering: Design and ... San Jose, CA areas. Meet the Team The Cloud Security Engineering team within Cisco's Security &...Trust Organization (STO) designs, builds, and maintains robust back-end systems , intuitive front-end interfaces, and efficient data pipelines to… more
- CACI International (Patuxent River, MD)
- …to start. **_Desired:_** + Advanced certifications, such as CISSP, SecurityX, or Systems Security Certified Professional (SSCP). + Experience with advanced ... and ensure compliance with industry standards. You'll contribute to strengthening the security posture of critical infrastructure and systems supporting CACI… more
Recent Jobs
-
Technical Product Marketing
- Arrow Electronics (Englewood, CO)
-
Associate, Financial Reporting Analyst
- HSBC (New York, NY)