• Cybersecurity Analyst II

    CoreCivic (Brentwood, TN)
    …communities we serve. The Cybersecurity Analyst II develops and maintains the CoreCivic cyber regulatory compliance program to support the alignment of security ... architectures, plans, controls, processes, policies and procedures with security standards and operational goals. Applies theory and puts it into practice with… more
    CoreCivic (10/17/25)
    - Related Jobs
  • Sr. Account Executive

    Nightwing (Sterling, VA)
    …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
    Nightwing (10/10/25)
    - Related Jobs
  • Business Process Red Team Operator

    JPMorgan Chase (Wilmington, DE)
    …levels + Candidate should have the ability to perform targeted, covert security tests with vulnerability identification , exploitation, and post-exploitation ... vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation, and post-exploitation (eg… more
    JPMorgan Chase (09/29/25)
    - Related Jobs
  • Sr. ISSE TS/SCI Poly

    Leidos (Annapolis Junction, MD)
    …environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system ... understanding of security practices and policies as well as hands-on vulnerability testing experience. You will have numerous responsibilities from day to day… more
    Leidos (09/15/25)
    - Related Jobs
  • Navy Qualified Validator (NQV)

    Frontier Technology Inc. (Norfolk, VA)
    vulnerability remediation and determination of risk posture. Position security clearance requirement isELIGIBILITY FOR TS/SCI. Responsibilities + Responsible for ... This position is designated as key personnel and an advanced level Security Control Assessor (work role: 612) under DCWF. CONTRACTOR shall conduct independent… more
    Frontier Technology Inc. (09/02/25)
    - Related Jobs
  • Early Talent Internship: Technology

    TIAA (Charlotte, NC)
    …experience in areas such as cybersecurity operations, network and cloud security , incident response, threat analysis, vulnerability management, identity and ... in Computer Science, Information Technology, Mathematics, Data Analytics, Data Science, Cyber - Security , Engineering and/or Operations Management, and any other… more
    TIAA (10/08/25)
    - Related Jobs
  • Cybersecurity Quality Advisor

    Caterpillar, Inc. (Irving, TX)
    …Cybersecurity leadership experience. + Facilitation / Project management experience guiding cyber security projects in large enterprises. + Knowledge and ... utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance. **Additional Info:** + The primary locations for this… more
    Caterpillar, Inc. (10/06/25)
    - Related Jobs
  • Project Manager

    Epsilon, Inc (Monterey, CA)
    …eradicate cyber threats through monitoring, intrusion detection, and protective security services to information systems. The SOC also conducts vulnerability ... be working onsite at SOC's Monterey, CA location. **Our Customer's Mission** : The Security Operations Center (SOC) is responsible for the overall security of… more
    Epsilon, Inc (10/01/25)
    - Related Jobs
  • Federal Account Executive, Navy

    Rubrik (Austin, TX)
    …of data protection, cyber resilience and enterprise AI acceleration. The Rubrik Security Cloud platform is designed to deliver robust cyber resilience and ... in the field through mindshare, partner introductions, and by new opportunity identification + Leverage Salesforce.com and other tools to track the success of… more
    Rubrik (09/24/25)
    - Related Jobs
  • Director Governance, Risk & Compliance (GRC)

    Baylor Scott & White Health (Dallas, TX)
    …(or related): Cyber Risk Management, Incident Response, Data Protection, OT Security , Vulnerability Management, Identity and Access Management, Cyber ... policies, standards, and procedures for risk management, compliance, and information security . (eg, NIST CSF, HITRUST). - Providing guidance and leadership to… more
    Baylor Scott & White Health (10/04/25)
    - Related Jobs