- JPMorgan Chase (Wilmington, DE)
- …of the following: Networking fundamentals (all OSI layers, protocols); Windows/ Linux /Unix/Mac operating systems as well as software vulnerability and ... that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... requirements. The SE blends technical skills in cloud platforms, Nutanix, Windows/ Linux , automation tools, containerization, and scripting utilizing skills and tools… more
- Arkansas Electric Cooperative Corporation (Little Rock, AR)
- …cyber threats. This role provides hands-on experience in security monitoring, vulnerability assessment, and incident response while learning industry best practices. ... threats. + Support the Cyber Security team in conducting vulnerability assessments and penetration testing. + Participate in the...cyber security policies and procedures. + Help in the research and analysis of emerging cyber threats and security… more
- BOOZ, ALLEN & HAMILTON, INC. (Riverdale, MD)
- …features, including App-ID, User-ID, Threat Prevention, and GlobalProtect. You'll manage the research of new technologies and market trends to further develop and ... Manage infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. +… more
- Golden Route Operations (Las Vegas, NV)
- …current on vulnerabilities, infiltration tactics, forensics, and threats through ongoing research . + Conduct vulnerability assessments to pinpoint weaknesses, ... testing tools such as Kali, Metasploit, Burp, Wireshark, Nmap, Netcat, and vulnerability scanners. + Preferred: Adept at scripting with PowerShell, automation, and… more
- General Dynamics Information Technology (Bossier City, LA)
- …that arise in the field for current releases of IMIS. + Run vulnerability assessments STIGS/SCAP + add additional security controls to reduce the attack surface ... check, etc. the packages provided to the customer. + Research latest CVEs for software and hardware we use...latest information about OS patches and CVEs. + Run vulnerability assessments of lab systems and hardware. + Update… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …experience performing offensive security activities such as red teaming, penetration testing, and vulnerability research + 6 years of total experience in a ... adversary emulation and the validation of detective, defensive, and vulnerability controls + Plan and oversee external red team...+ Using security tools like NMAP, Burp Suite, Kali Linux , Bloodhound, and similar tools + Experience with C2… more
- Argonne National Laboratory (Lemont, IL)
- …Policy. + Experience with maintenance routines such as monthly security and vulnerability patching, firmware and driver updates, and routine backup schedules. + ... (SCAP), and/or Center for Internet Security (CIS) Baselines + Experience with vulnerability scanning and remediation using Nessus or similar tools. + Experience with… more
- TestPros (Sterling, VA)
- …Independent Verification and Validation (IV&V), Quality Assurance (QA), Compliance, and Research and Development (R&D) services. TestPros is an Equal Opportunity ... with the command line interface of multiple operating systems - Windows, macOS, Linux , etc. + Solid understanding of manual scripting and scripting languages- ex.… more
- Lockheed Martin (Littleton, CO)
- …120,000 people worldwide and is principally engaged in the research , design, development, manufacture, integration, and sustainment of advanced technology ... The ideal candidate will have a strong background in Red Hat Enterprise Linux \(RHEL\), system hardening, and network security principles, with the ability to ensure… more