- Leidos (Ashburn, VA)
- …Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC ... Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA - EC-Council Network Security Administrator + ECIH - EC-Council Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council… more
- Intuit (San Francisco, CA)
- …Analytics into business intelligence that drives performance Applies proven methods and hacking skills in working with divergent data types, data scales, and big ... data (petabytes), to explore and extrapolate data-driven insights using advanced, predictive statistical modeling and testing applied to data acquired and cleansed from a range of sources (relational and non-relational NoSQL databases) Provides updates on KPIs… more
- Google (Mountain View, CA)
- …flexible, full-stack thinker, capable of jumping between different parts of the stack-from hacking together an agent harness for Gemini to quickly bringing up an ... end-to-end application demo for proving out product experiences. In this role, you will apply your broad engineering expertise to create the initial sparks that could eventually impact users globally. About Us Artificial Intelligence could be one of humanity's… more
- Providence (Irvine, CA)
- …about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization ... + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical… more
- Nexon America Inc (El Segundo, CA)
- …as needed * Work with the InfoSec Team to investigate banned accounts for hacking , botting, real money trading, etc. * Other duties as assigned Work Experience * ... College degree or equivalent game-related work experience preferred Education, Professional Training, Technical Training or Certification * College degree or equivalent game-related work experience preferred * 1+ year of game industry Player Support experience… more
- New York Times (Washington, DC)
- …able to deliver scoops about online espionage and influence campaigns, encryption and hacking , but also be able to write stories exploring and explaining the impact ... of artificial intelligence and other emerging technologies in law enforcement and what it tells us about government policy and society. We want someone who can dive into this sprawling area of coverage that touches on national security and intelligence and… more
- RedTrace Technologies Inc (Fort Belvoir, VA)
- …access, lateral movement, collection, exfiltration, command and control, and device hacking . Operators will apply advanced consulting skills and extensive technical ... expertise for threat analysis, vulnerability assessments, and persistent penetration testing cyber campaigns. A successful Computer Exploitation Engineer will be capable of working without considerable direction, as well as mentor and supervise team members,… more
- Hawaiian Electric (Honolulu, HI)
- …Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). + Ethical hacking principles and techniques. + Penetration testing principles, tools, and ... techniques. + Conceptual knowledge of National Institute and Standards and Technology (NIST) Standards, ISO 27000 series, OWASP, and other security related frameworks and standards. + Conceptual knowledge of utility business and related Operational Technology… more
- CGI Technologies and Solutions, Inc. (Lebanon, VA)
- …programs \#CGIFederalJob \#LI-JK6 **Skills:** + Computer Security + English + Ethical Hacking + Security Operations Center + CompTIA Cyber Security Analyst + CompTIA ... Security+ Network Security **What you can expect from us:** **Together, as owners, let's turn meaningful insights into action.** Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you'll reach your full potential because You are invited… more
- University of Colorado (Colorado Springs, CO)
- …Cyber Security + IT Risk Management + IT Security Auditing + Ethical Hacking + Cloud Computing & Cybersecurity Classes may be on-campus, online, or hybrid. ... This is a revolving Lecturer Pool for the College of Business. If there is a course opening and your qualifications match a course and the minimum requirements, you may be contacted at that time. The University of Colorado Colorado Springs will not sponsor… more