- Niagara County Community College (Sanborn, NY)
- …IT security, including system hardening, intrusion detection, network architecture, and vulnerability management. + Proven ability to independently research , ... to perform intrusion detection/prevention, packet monitoring, file/database integrity assessments, vulnerability assessments, and incident tracking. + Monitors security systems,… more
- Truist (Charlotte, NC)
- …cloud-based applications and help maintain stable SAP applications via vulnerability management, on-call support, and collaboration on major infrastructure changes. ... cloud-based applications and help maintain stable SAP applications via vulnerability management, on-call support, and collaboration on major infrastructure changes.… more
- Amentum (Fort Meade, MD)
- …in multifunctional teams providing a holistic cyber security posture * Research and evaluate emerging technologies to determine cybersecurity effectiveness. * Aid ... IT system Common Vulnerabilities and Exposures (CVEs) and Information Assurance Vulnerability Alerts (IAVAs) * Experience using the MITRE ATT&CK framework to… more
- AireSpring (Chicago, IL)
- …and maintenance of enterprise IT infrastructure, including: + Servers (Windows/ Linux ), virtualization (VMware/Hyper-V) + Active Directory, DNS/DHCP, Group Policy, ... Lead annual compliance audits. + Manage endpoint protection, MDM, MFA, and vulnerability management. + Work closely with 3rd party consultants and internal… more
- Concentrix (Omaha, NE)
- …team, you will deliver strategic consulting, design, advisory services, market research , and contact center analytics that deliver insights to improve outcomes ... of vulnerabilities and misconfigurations. * Investigate and apply security fixes on Linux systems, Azure App Services, VMs, PaaS databases, and core networking… more
- Vexterra Group (Bethesda, MD)
- …digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify ... knowledge gained through the application of reverse- engineering and other research techniques, engineer low-level C and assembly. Position Requirements: +… more
- The Boeing Company (Titusville, FL)
- …identified to ensure the reliability and efficiency of software products + Research and implement current and emerging technologies, tools, frameworks and changes in ... perform preventative maintenance, and conduct monthly server patching + Utilize vulnerability scanners like SCAP workbench + Maintain and organize the server… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... or JavaScript) is essential for automating tasks and developing tools. + Linux /Unix Systems Administration: Strong knowledge of Linux /Unix operating systems,… more
- Global Resource Solutions (Arlington, VA)
- …Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis of exceptionally complex problems, and processes relating ... platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems,… more
- CACI International (Chantilly, VA)
- …cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized ... PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux , IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev.** **Must have… more