- New Horizons Ranch & Center, Inc. (Abilene, TX)
- …anyone who is not committed to keeping kids safe from abuse, neglect and exploitation . At New Horizons, we Keep Kids First while providing a safe, therapeutic and ... loving environment for kids and adolescents. Through our Child Placing Agency, we recruit and train families to provide a home to boys and girls, ages birth to adulthood, who have been removed from their biological homes due to neglect and/or abuse. Our Child… more
- Plan International USA (Monrovia, CA)
- …information from applicants previous employers about any findings of sexual exploitation , sexual abuse and/or sexual harassment during employment, or incidents under ... investigation when the applicant left employment. By submitting an application, the job applicant confirms their understanding of these recruitment procedures. Please note that Plan International will never send unsolicited emails requesting payment from… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, and email security. + Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports. + Engaging with FCC or DIB… more
- Foxhole Technology, Inc (Smyrna, GA)
- …mitigate unauthorized use of materials. + Identify vulnerabilities, prevent content exploitation , and reduce potential legal and financial risks. + Continuously ... monitor malware detection software tools. + Monitor network-based security sensors for anomalies and unauthorized activities. + Monitoring security controls and initiating event/incident handling processes. + Provide summary reports on collaborative efforts… more
- New Horizons Ranch & Center, Inc. (Goldthwaite, TX)
- …and maintains proactive systems to protect children from abuse, neglect, and exploitation . Essential Duties and Responsibilities + Lead, supervise, and coach Team ... Leaders and Direct Care Staff to support high-quality, trauma-informed care. + Oversee scheduling, staffing, ratio compliance, and daily program operations; identify staffing gaps and develop contingency plans. + Provide 24/7 on-call coverage and respond… more
- Leidos (Ashburn, VA)
- …(CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + CISSP ... - Certified Information SystemsSecurity + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + CTIA - EC-Council Certified Threat… more
- BAE Systems (Hill AFB, UT)
- …facilitate early identification and mitigation of risks, opportunities for exploitation , and inform leadership decision making. Duties also include evaluation ... of programmatic schedule activities impacting ICBM Transition/schedules/roadmaps and working to identify linkages and dependencies across Transition stakeholders and the development and tracking of ICBM Transition metrics. This team member also interacts with… more
- Capitol Care, Inc. (Landing, NJ)
- …activities. Report all incidents, including allegations of abuse, neglect, exploitation , injury and other reportable incidents immediately upon discovery. Monitor ... individual's daily activity through documentation in progress notes, ICL, and verbal communication with supervisors and co-workers. Attend all mandatory meetings and trainings as required. Monitor own time card to ensure correct recording of hours worked, and… more
- Parsons Corporation (Centreville, VA)
- …(OBC): + Seek continued relevance on new internet data sets and exploitation capabilities. + Conduct training and develop criteria for evaluating the effectiveness ... of training activities. + Develop, organize, and conduct training and educational programs for approved personnel. + Provide research for national security, infrastructure, technology, country, geographic area, and biographic and targeted vulnerability. +… more
- Steampunk (Mclean, VA)
- …development lifecycle + You will contribute to the growth of our Data Exploitation Practice! **Qualifications** + Ability to hold a position of public trust with ... the US government. + Bachelor's degree and 5 overall years of experience + 2-4 years of experience in designing, developing, and configuring data visualizations for different types of users + 2-4 years of experience using Tableau, Power BI, or other tools to… more