- Bank of America (Denver, CO)
- …of internal and external threats on information systems and predict future threat behavior. + Incorporate threat actors' tactics, techniques, and procedures ... related protocols/technologies (eg, UNIX/LINUX, TCP/IP, Cookies) + Experience with vulnerability assessment tools and penetration testing techniques. + Solid… more
- GovCIO (Tampa, FL)
- …with a hybrid remote opportunity based on project requirements. **Responsibilities** Correlates threat data from various sources to establish the identity and modus ... operandi of hackers active in client's networks and posing a potential threat . Provides the customer with assessments and reports facilitating situational awareness… more
- Koniag Government Services (Chantilly, VA)
- …rule configurations + Proficiency in ServiceNow security modules (Security Operations, Vulnerability Response, Threat Intelligence) or other similar security ... more. Koniag Management Solutions (KMS) is seeking an experienced ServiceNow Security Manager to lead the security, compliance, and governance of our ServiceNow… more
- ADP (Roseland, NJ)
- …threat detection, incident response, fraud, governance, identity, and vulnerability management)._ + **_Architect and design_** _intelligent solutions in alignment ... _._ + _Understanding of security processes and operational models (eg, DLP, threat detection, SOAR, vulnerability management)._ + _Ability to translate technical… more
- HCA Healthcare (Nashville, TN)
- …+ Able to discuss and demonstrate deep understanding of information security threat and vulnerability detection, risk assessment, risk management, and risk ... storage. This position will report to the Information Security Consulting Team Manager and is responsible for ensuring that security requirements are adequately… more
- MUFG (Tampa, FL)
- …to understand application architectures and identify potential security risks + Create threat models for applications, review output from DAST and SAST reviews, ... to identify and mitigate threats effectively. + Crosstrain other teams on threat modeling techniques and best practices. + Architectural Review & Risk Challenge… more
- Patent and Trademark Office (Alexandria, VA)
- …security programs designed to anticipate, assess, and minimize system vulnerability , eg, intrusion prevention, forensics, computer incident response, security device ... advanced security operations including continuous monitoring, incident response, and threat detection across hybrid and cloud-based environments, proven ability to… more
- Muckleshoot Indian Tribe (Auburn, WA)
- …of systems security. + Maintain the accuracy and success rate of all vulnerability and patch management solutions. + Manage, configure, and operate the SIEM/SOAR ... validate and remediate the security posture of information systems. + Conduct threat hunting within our internal systems environment. + Develop a training… more
- Guidehouse (Houston, TX)
- …The ideal candidate will possess domain expertise in cybersecurity architecture, threat intelligence, risk management, and compliance, and will serve as a ... Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering… more
- Woodforest National Bank (The Woodlands, TX)
- …information systems, network, databases, and web-based security. Also, conducts vulnerability assessments and monitors systems, network, databases, and web for ... regulations and privacy laws as applicable. . Vulnerabilities: . Lead vulnerability assessments, monitor systems, and ensure critical and high vulnerabilities are… more