• Senior API Developer - Microservices - Local…

    CGI Technologies and Solutions, Inc. (Pittsburgh, PA)
    …using Spring Boot & Spring framework. . Experience coding to prevent hacking and other vulnerabilities. . Strong collaboration and communication skills within ... distributed project teams and in an Agile environment. . Excellent oral and written communication skills. . Working Knowledge and hands on experience in DEVOPs tools like Jenkins, uDeploy and GIT . Ability to prioritize work and meet deadline and also… more
    CGI Technologies and Solutions, Inc. (12/11/25)
    - Related Jobs
  • Sr Staff Software Engineer - Agentic AI Security…

    Palo Alto Networks (Santa Clara, CA)
    …AI, OpenAI, etc. + Experience and interest in reverse engineering, jailbreaking, and hacking AI systems. + Experience in AI Security research and performing security ... evaluations and threat modeling. + In-depth experience with exploiting OWASP LLM Top 10 vulnerabilities, OWASP Low Code No Code Top 10 vulnerabilities, and OWASP NHI Top 10 vulnerabilities. + Knowledge of AI Agents / LLM security, Application security, Network… more
    Palo Alto Networks (12/10/25)
    - Related Jobs
  • Customer Identity & Access Management Engineer…

    Cummins Inc. (GA)
    …you'll help maintain system reliability and performance. + **Support Ethical Hacking Efforts** Participating in authorized penetration testing helps uncover hidden ... vulnerabilities and validate the effectiveness of existing defenses. + **Design Secure Architectures** Your work in designing hardware, OS, and applications with cybersecurity in mind will ensure systems are resilient from the ground up. + **Promote a… more
    Cummins Inc. (12/09/25)
    - Related Jobs
  • Secret Vulnerability Penetration Tester

    Insight Global (Aberdeen Proving Ground, MD)
    …with code analysis and reverse engineering * Knowledge of hardware hacking techniques (chip-off, fault-injection, etc.) * Experience with COTS/GOTS radios, SDRs, ... This role requires an active DoD Secret clearance and the ability to obtain and maintain a TS/SCI clearance. The successful candidate will join a specialized team conducting manual technical cybersecurity assessments across devices, products, web applications,… more
    Insight Global (12/07/25)
    - Related Jobs
  • IT Security Engineer (Johns Hopkins Public Safety)…

    Johns Hopkins University (Baltimore, MD)
    …and technologies. + Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. + Working knowledge of either Cisco or Palo Alto ... firewall technologies. Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. _Host and Cloud Security_ + Design, implement and administer automated security update technologies for… more
    Johns Hopkins University (12/06/25)
    - Related Jobs
  • US Head of Marketing

    RELX INC (New York, NY)
    …across our g lobal marketing teams including Brand, Content, UX, Growth Hacking , Communications & PR, Market planning , Customer Insight and Analysis teams ... + Advocate for our defined marketing vision, and support in the delivery of our strategic priorities: digital transformation; brand elevation; growth drivers; and team excellence + Drive excellence by nurturing and promoting a best-in-class marketing culture,… more
    RELX INC (12/05/25)
    - Related Jobs
  • Lecturers of Cybersecurity (F1104a, F1105a,…

    Old Dominion University (Norfolk, VA)
    …hands-on lab courses in cybersecurity (cybersecurity techniques and operations, ethical hacking , etc.). Conditions of Employment Location Norfolk, VA Job Open Date ... 04/20/2025 Application Review Date 05/16/2025 Open Until Filled Yes Application Instructions Interested candidates should visit https://jobs.odu.edu/postings/23055 to apply and attach the following with their online application: + A cover letter. + A… more
    Old Dominion University (12/04/25)
    - Related Jobs
  • Red Team Operator - Top Secret Clearance|

    Cambridge International Systems Inc (Norfolk, VA)
    …Vulnerability Penetration Assessments and Adversarial Assessments: + Employ ethical hacking techniques to exploit vulnerabilities in systems, protocols, or security ... services. + Use approved commercial and open-source tools (eg, Metasploit, Core Impact, Cobalt Strike, Burp Suite, Nessus, SharpHound/BloodHound). + Validate tools for functionality and safety based on source code review or dynamic analysis. + Operate… more
    Cambridge International Systems Inc (12/04/25)
    - Related Jobs
  • Security Analyst - Hardware, IoT, Medical…

    UL, LLC (Northbrook, IL)
    …and internal security team's trusted advisor. Conduct advanced hardware penetration tests, hacking to identify issues in embedded products and software. + Perform ... code review in customer offices or UL premises to analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test plan with the project leader. + Perform software penetration testing for evaluation with regards to reverse… more
    UL, LLC (12/04/25)
    - Related Jobs
  • Incident Response Deputy Team Lead

    Leidos (Ashburn, VA)
    …Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC ... Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA - EC-Council Network Security Administrator + ECIH - EC-Council Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council… more
    Leidos (12/03/25)
    - Related Jobs