- CGI Technologies and Solutions, Inc. (Pittsburgh, PA)
- …using Spring Boot & Spring framework. . Experience coding to prevent hacking and other vulnerabilities. . Strong collaboration and communication skills within ... distributed project teams and in an Agile environment. . Excellent oral and written communication skills. . Working Knowledge and hands on experience in DEVOPs tools like Jenkins, uDeploy and GIT . Ability to prioritize work and meet deadline and also… more
- Palo Alto Networks (Santa Clara, CA)
- …AI, OpenAI, etc. + Experience and interest in reverse engineering, jailbreaking, and hacking AI systems. + Experience in AI Security research and performing security ... evaluations and threat modeling. + In-depth experience with exploiting OWASP LLM Top 10 vulnerabilities, OWASP Low Code No Code Top 10 vulnerabilities, and OWASP NHI Top 10 vulnerabilities. + Knowledge of AI Agents / LLM security, Application security, Network… more
- Cummins Inc. (GA)
- …you'll help maintain system reliability and performance. + **Support Ethical Hacking Efforts** Participating in authorized penetration testing helps uncover hidden ... vulnerabilities and validate the effectiveness of existing defenses. + **Design Secure Architectures** Your work in designing hardware, OS, and applications with cybersecurity in mind will ensure systems are resilient from the ground up. + **Promote a… more
- Insight Global (Aberdeen Proving Ground, MD)
- …with code analysis and reverse engineering * Knowledge of hardware hacking techniques (chip-off, fault-injection, etc.) * Experience with COTS/GOTS radios, SDRs, ... This role requires an active DoD Secret clearance and the ability to obtain and maintain a TS/SCI clearance. The successful candidate will join a specialized team conducting manual technical cybersecurity assessments across devices, products, web applications,… more
- Johns Hopkins University (Baltimore, MD)
- …and technologies. + Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. + Working knowledge of either Cisco or Palo Alto ... firewall technologies. Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. _Host and Cloud Security_ + Design, implement and administer automated security update technologies for… more
- RELX INC (New York, NY)
- …across our g lobal marketing teams including Brand, Content, UX, Growth Hacking , Communications & PR, Market planning , Customer Insight and Analysis teams ... + Advocate for our defined marketing vision, and support in the delivery of our strategic priorities: digital transformation; brand elevation; growth drivers; and team excellence + Drive excellence by nurturing and promoting a best-in-class marketing culture,… more
- Old Dominion University (Norfolk, VA)
- …hands-on lab courses in cybersecurity (cybersecurity techniques and operations, ethical hacking , etc.). Conditions of Employment Location Norfolk, VA Job Open Date ... 04/20/2025 Application Review Date 05/16/2025 Open Until Filled Yes Application Instructions Interested candidates should visit https://jobs.odu.edu/postings/23055 to apply and attach the following with their online application: + A cover letter. + A… more
- Cambridge International Systems Inc (Norfolk, VA)
- …Vulnerability Penetration Assessments and Adversarial Assessments: + Employ ethical hacking techniques to exploit vulnerabilities in systems, protocols, or security ... services. + Use approved commercial and open-source tools (eg, Metasploit, Core Impact, Cobalt Strike, Burp Suite, Nessus, SharpHound/BloodHound). + Validate tools for functionality and safety based on source code review or dynamic analysis. + Operate… more
- UL, LLC (Northbrook, IL)
- …and internal security team's trusted advisor. Conduct advanced hardware penetration tests, hacking to identify issues in embedded products and software. + Perform ... code review in customer offices or UL premises to analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test plan with the project leader. + Perform software penetration testing for evaluation with regards to reverse… more
- Leidos (Ashburn, VA)
- …Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC ... Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA - EC-Council Network Security Administrator + ECIH - EC-Council Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council… more
Recent Jobs
-
Laboratory Administrative Assistant
- Brockton Hospital (Brockton, MA)
-
Postdoc Research Fellow - Dr. Cao Lab
- University of North Carolina- Chapel Hill (Chapel Hill, NC)
-
Accounts Receivable Specialist (On-Site)
- SPAR (Charlotte, NC)
-
Senior Software Engineer, Level 3
- Lockheed Martin (Colorado Springs, CO)