- Geisinger (Danville, PA)
- …to associate level personnel for identifying and reporting on specific threat and vulnerability topics. + Participates on the Security Incident Response Team as ... direction of leadershipr. Proactively analyzes and anticipates changes in the cyber -threat landscape and actively participates in the design of effective… more
- Exeter Government Services, LLC (Fort Knox, KY)
- Exeter is seeking a Cybersecurity Analyst to support the US Army at Fort Knox, Kentucky. Paid relocation to Fort Knox is not available; candidates must be local or ... Assessment and Authorization (A&A) requirements for annual Federal Information Security Management Act (FISMA) reporting. . Supports the Cybersecurity Division… more
- Robert Half Technology (Fort Lauderdale, FL)
- …, firewalls, and IDS/IPS. + Understanding of incident response and vulnerability management. Preferred Qualifications: + Security certifications (CompTIA ... Description Job Summary: The Cybersecurity Analyst will safeguard the organization's systems and data... will safeguard the organization's systems and data from cyber threats through continuous monitoring, analysis, and incident response.… more
- Serco (Langley AFB, VA)
- **Position Description** Serco is seeking an **Information Systems Security Officer (ISSO)** to support the Immersive Missions and Training Solutions teams SAP ... role, you will: + Conduct system and network assessments to identify security deviations from policy or acceptable configurations. + Perform compliance audits and… more
- Belay Technologies (Hanover, MD)
- …may also include engineering hardware and/or software, programming, computer/network security , vulnerability analysis, penetration testing, computer forensics, ... developing detailed exploitation and operations plans. The Digital Network Exploitation Analyst will have a solid understanding of logical/physical IP core… more
- IDEX (Rutherford, NJ)
- …and engagement with team members. + Adherence to corporate compliance (JDE) and cyber security and SOX compliance. **EDUCATION AND EXPERIENCE REQUIREMENTS OR ... lifecycle and standard software development methodologies. + Experience with Security management and Vulnerability Mitigation techniques. **COMPETENCIES** +… more
- COLSA Corporation (Dahlgren, VA)
- …eMASS (Enterprise Mission Assurance Support Service) environment to document security controls, track authorization status, and maintain continuous monitoring ... competent knowledge of the Risk Management Framework, Computer Network Defense, and Vulnerability Mgmt. + Self starter that requires some or little direction on… more
- Deloitte (Baltimore, MD)
- …including engineering hardware and/or software, programming, computer/network security , vulnerability analysis, penetration testing, computer ... Manager on the project, as a Digital Network Exploitation Analyst you will: + Apply data and technical expertise...time in the future + Active TS/SCI with Polygraph security clearance required + Ability to perform job responsibilities… more
- Gulfstream (Savannah, GA)
- …for a student who have an interest in Information Technology Risk Management or Cyber Security . Intern students at Gulfstream Aerospace in IT Audit, Compliance, ... Requirement + Must be actively pursuing a degree in Information Technology, Cyber Security , Computer Science, Computer Engineering or other Engineering… more
- MIT Lincoln Laboratory (Lexington, MA)
- …microgrids - energy systems that can operate independently from the bulk electric grid, cyber security of control systems that interface with energy systems, and ... Protection Division and focuses on assisting the Departments of Defense and Homeland Security in securing the nation from energy-related threats. Our group works on… more
Recent Jobs
-
Fitness Floor Attendant (fill-in)
- HealthFitness (O'Fallon, MO)
-
Product Development Intern - Summer
- Henkel (Elgin, IL)
-
Distribution Associate
- SEA Wire and Cable (Madison, AL)