- Johns Hopkins University (Baltimore, MD)
- …and technologies. + Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. + Working knowledge of either Cisco or Palo Alto ... firewall technologies. Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. _Host and Cloud Security_ + Design, implement and administer automated security update technologies for… more
- RELX INC (New York, NY)
- …across our g lobal marketing teams including Brand, Content, UX, Growth Hacking , Communications & PR, Market planning , Customer Insight and Analysis teams ... + Advocate for our defined marketing vision, and support in the delivery of our strategic priorities: digital transformation; brand elevation; growth drivers; and team excellence + Drive excellence by nurturing and promoting a best-in-class marketing culture,… more
- Old Dominion University (Norfolk, VA)
- …hands-on lab courses in cybersecurity (cybersecurity techniques and operations, ethical hacking , etc.). Conditions of Employment Location Norfolk, VA Job Open Date ... 04/20/2025 Application Review Date 05/16/2025 Open Until Filled Yes Application Instructions Interested candidates should visit https://jobs.odu.edu/postings/23055 to apply and attach the following with their online application: + A cover letter. + A… more
- Cambridge International Systems Inc (Norfolk, VA)
- …Vulnerability Penetration Assessments and Adversarial Assessments: + Employ ethical hacking techniques to exploit vulnerabilities in systems, protocols, or security ... services. + Use approved commercial and open-source tools (eg, Metasploit, Core Impact, Cobalt Strike, Burp Suite, Nessus, SharpHound/BloodHound). + Validate tools for functionality and safety based on source code review or dynamic analysis. + Operate… more
- UL, LLC (Northbrook, IL)
- …and internal security team's trusted advisor. Conduct advanced hardware penetration tests, hacking to identify issues in embedded products and software. + Perform ... code review in customer offices or UL premises to analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test plan with the project leader. + Perform software penetration testing for evaluation with regards to reverse… more
- Leidos (Ashburn, VA)
- …Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC ... Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA - EC-Council Network Security Administrator + ECIH - EC-Council Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council… more
- Imagine One Technology & Management (Lexington Park, MD)
- …Analysts + NDU CIO certificate-Chief Information Officer (CIO) + Computer Hacking Forensic Investigator (CHFI) + GIAC Reverse Engineering Malware (GREM) + ... CISM + GIAC Certified Incident Handler (GCIH) + EC-Council Certified Incident Handler (ECIH) + GIAC Certified Forensics Analyst (GCFA) + CEH + CISSP + GSEC + Licensed Penetration Tester (LPT) *Retired + CASP+ GSLC + CSSLP + NEC 741A Information System Security… more
- Leidos (Bethesda, MD)
- …analytical mind outstanding problem-solving skills + Awareness of Cybersecurity trends and hacking techniques. + Master's degree with 15+ years of prior relevant ... experience in order to operate within the scope contemplated by the level + **To be considered must have an active TS/SCI with polygraph security clearance** **Preferred Qualifications** + Experience with additional security tools and processes such as… more
- V2X (Reston, VA)
- …who excel in:✔ Threat detection and response✔ Network and cloud security✔ Ethical hacking and penetration testing✔ Risk assessment and compliance (NIST, ISO, SOC 2, ... etc.)✔ Incident handling and digital forensics✔ Security architecture and engineering Industry certifications such as CISSP, CEH, Security+, CISM, OSCP, GIAC, and AWS Security are highly valued. Join V2X - Always Hiring Cybersecurity Professionals! At V2X, we… more
- Oracle (Boston, MA)
- …cloud security, application security, vulnerability analysis, threat modeling, and hacking /enterprise network penetration. The biggest challenges for the team are ... the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs… more