- ADP (Roseland, NJ)
- …threat detection, incident response, fraud, governance, identity, and vulnerability management)._ + **_Architect and design_** _intelligent solutions in alignment ... _._ + _Understanding of security processes and operational models (eg, DLP, threat detection, SOAR, vulnerability management)._ + _Ability to translate technical… more
- Google (GU)
- …personnel (eg, contract guards/local teams). + Conduct risk assessments and threat analyses, managing the vulnerability life-cycle from identification to ... of experience in critical infrastructure protection, risk assessment, and actionable threat analysis. + Experience with intelligence services or telecom security… more
- HCA Healthcare (Nashville, TN)
- …+ Able to discuss and demonstrate deep understanding of information security threat and vulnerability detection, risk assessment, risk management, and risk ... storage. This position will report to the Information Security Consulting Team Manager and is responsible for ensuring that security requirements are adequately… more
- MUFG (Tampa, FL)
- …to understand application architectures and identify potential security risks + Create threat models for applications, review output from DAST and SAST reviews, ... to identify and mitigate threats effectively. + Crosstrain other teams on threat modeling techniques and best practices. + Architectural Review & Risk Challenge… more
- Muckleshoot Indian Tribe (Auburn, WA)
- …of systems security. + Maintain the accuracy and success rate of all vulnerability and patch management solutions. + Manage, configure, and operate the SIEM/SOAR ... validate and remediate the security posture of information systems. + Conduct threat hunting within our internal systems environment. + Develop a training… more
- Patent and Trademark Office (Alexandria, VA)
- …security programs designed to anticipate, assess, and minimize system vulnerability , eg, intrusion prevention, forensics, computer incident response, security device ... advanced security operations including continuous monitoring, incident response, and threat detection across hybrid and cloud-based environments, proven ability to… more
- Guidehouse (Houston, TX)
- …The ideal candidate will possess domain expertise in cybersecurity architecture, threat intelligence, risk management, and compliance, and will serve as a ... Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering… more
- Woodforest National Bank (The Woodlands, TX)
- …information systems, network, databases, and web-based security. Also, conducts vulnerability assessments and monitors systems, network, databases, and web for ... regulations and privacy laws as applicable. . Vulnerabilities: . Lead vulnerability assessments, monitor systems, and ensure critical and high vulnerabilities are… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …formal methods, or security models to protect government systems. Utilize vulnerability assessment methodologies to the security policies and mechanisms at customer ... of formal logic, and algorithmic analysis and design. You will report to the manager for our Cyber Operations and Incidence Response team. This position will be open… more
- Santander US (Dallas, TX)
- … (PSM) + Privileged Session Manager for SSH (PSM-SSH) + Central Policy Manager (CPM) + Privileged Threat Analytics (PTA) + Implement and maintain CyberArk ... proxies, DNS). + Experience supporting large-scale, high-availability PAM environments. + Threat and vulnerability management related to privileged access +… more