- TP-Link North America, Inc. (Irvine, CA)
- …JMeter, Locust) including load, stress, and scalability analysis. + Expertise in security testing, including vulnerability assessments and penetration testing. + ... Headquartered in the United States, TP-Link Systems Inc. is a global provider of reliable...Java, or JavaScript. + Execute end-to-end, regression, performance, and security testing, and develop coverage strategies aligned with business… more
- Ventura County (Ventura, CA)
- …placement on an eligible list. EDUCATION, TRAINING and EXPERIENCE Extensive experience in computer systems analysis, design, and programming and serving in a ... management, business process improvement, applications support, voice/data infrastructure, data security , threat and vulnerability /risk management, and extended… more
- Forward Air (Dallas, TX)
- … security solutions, including firewall, anti-virus, and intrusion detection systems + Investigate and troubleshoot network problems and perform LAN/WAN ... of network security risks + Coordinate and conduct application and network vulnerability scans + Assess and implement new security toolsets and related… more
- Dartmouth Health (Lebanon, NH)
- …Experience with end-user support, security event and audit log management systems , vulnerability scanning and management, basic malware handling and analysis ... posture. Works together with other D-HH SecOps analysts and the D-HH security operations center (SOC) to prepare for, monitor, detect, prioritize, analyze, respond… more
- Link Solutions Inc (Adelphi, MD)
- …into technical networking solutions and support documentation. + Participate in security audits, STIG compliance checks, and vulnerability remediation processes ... enterprise networking operations to include planning and implementation, optimization, and security integration. As a leader, you will lead complex projects, mentor… more
- GovCIO (San Antonio, TX)
- …intelligence to cyber incident response professionals. + Leverages technical knowledge of computer systems and networks with cyber threat information to assess ... Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and… more
- Antech Diagnostics (New York, NY)
- …provisioning/de-provisioning) in accordance with SDx and Mars business requirements and security best practices. + Coordinate and assist in performing entitlement ... customer-facing technologies and products are secure and updated to best security practices in identity management. **Qualifications & Experience:** + Bachelors in… more
- United States Steel (Pittsburgh, PA)
- …EDUCATION, KNOWLEDGE, SKILLS AND ABILITIES: Minimum Requirements: + Bachelor's degree in computer science, Information Systems , Computer Engineering or ... and cabling). + Familiar with implementing cyber security standards and security posture improvements in IT, including vulnerability management and hardening… more
- ManTech (Norfolk, VA)
- …practices such as code reviews using source control + Work with container security technologies, evaluating and mitigating or resolving vulnerability findings + ... quantifiable approaches to the development, operation, and maintenance of software systems supporting the Navy Continuous Training Environment (NCTE) + Understand… more
- Raymond James Financial, Inc. (St. Petersburg, FL)
- …without supervision and provides technical guidance when required on maintaining the security , integrity, compliance and continuity of IT systems and services. ... You will be involved in portions of the full systems life cycle (based on experience/skills) and will be...on factors such as reporting formats required, costs, and security needs to determine hardware configuration. + Participates in… more