- SMX (Aiea, HI)
- …Tenable, Nessus, Burp Suite, Wireshark) and techniques (eg, penetration testing, vulnerability scanning). + Experience securing Microsoft Windows, Linux , Active ... and proactive threat mitigation. + Integrate AI/ML Security Solutions: Research , evaluate, and integrate state-of-the-art AI/ML solutions into existing security… more
- Parsons Corporation (Linthicum, MD)
- …skills to gather, distill, and provide critical insights into cybersecurity vulnerability assessments of mission-critical government systems, we have the ideal role ... all-source analysis to lead the team's focus in performing both cybersecurity vulnerability assessments and strategic cyber report analysis to help assess and… more
- L3Harris (Broomfield, CO)
- …networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple ... design, deployment, and management of cloud security technologies. + Familiarity with Linux . + Familiarity with security related tools - SIEM, malware, HIPS, etc.… more
- Nightwing (Greenville, SC)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- Parsons Corporation (Charlotte, NC)
- …engineers to join our team of subject matter experts in embedded development, vulnerability research , and reverse engineering. In this role, you'll support an ... innovative software for tools and capabilities related to computer security, vulnerability research , reverse engineering, and product development. + **Low-Level… more
- Leidos (Ashburn, VA)
- …media forensic + Monitoring and detection + Incident Response + Vulnerability assessment andpenetration testing + Cyber intelligence analysis + Extensive experience ... Cyber Security Analyst (CySA+) + CEH - Certified EthicalHacker + CompTIA Linux Network Professional (CLNP) + CompTIA Pentest+ CompTIA Cybersecurity Analyst (CySA+) +… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... seeking a Technical Engagement Network (TEN) Lab Manager with experience in Linux , Splunk and Ansible System Administration to support the design, development, and… more
- AIG (Reston, VA)
- …Infrastructure Build and Operations teams, and GCDC SOC analysts for research and remediation of Security vulnerabilities, controls, and settings. The CrowdStrike ... + Integration & Engineering + + Integrate CrowdStrike with SIEM, SOAR, vulnerability management tools, and other security platforms. + Lead CrowdStrike version… more
- The MITRE Corporation (Bedford, MA)
- …to develop advanced tools that enable, accelerate, and scale our embedded software vulnerability research and reverse engineering analyses as well as bring ... technical expertise across many embedded security disciplines including software vulnerability research and reverse engineering, hardware reverse engineering,… more
- Tetrad Digital Integrity LLC (Arlington, VA)
- …maintenance, security analysis and network performance and tuning of Windows and Linux servers in a virtual infrastructure + Define system security & design ... Ansible, or CloudFormation + Implement automated security tools for vulnerability scanning, static/dynamic application security testing (SAST/DAST), and container… more