- Hartford HealthCare (Hartford, CT)
- …a regional home care system, an array of senior care services, a mobile neighborhood health program and a comprehensive physical therapy and rehabilitation network. ... action plans and ongoing monitoring * Identify potential areas of compliance vulnerability and risk, develop and implement corrective action plans for resolution of… more
- Medtronic (Minneapolis, MN)
- …mindset, we pursue continuous innovation to breach new frontiers of Biomedical research . As the world is getting more connected, complexity and security challenges ... design to deployment. + Risk Assessment - Conduct threat modeling and vulnerability assessments to identify and mitigate security risks throughout the product… more
- Meta (Salt Lake City, UT)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software… more
- Chenega Corporation (Arlington, VA)
- …changes to enhance system and application security. + Strong knowledge of vulnerability management, system STIGing, RMF, and ATO lifecycle best practices. + ... + Demonstrated success in building and scaling web or mobile applications. + Excellent communication and interpersonal skills, with...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more
- CACI International (Chantilly, VA)
- …cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized ... systems (incl. Active Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus.** **Solid understanding of networking, TCP/IP,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... will join a team of developers working on various Unix, Windows, or Mobile capabilities. They will support the group's overall mission to design, develop, test,… more
- Procter & Gamble (Cincinnati, OH)
- …access, network segmentation, cloud guardrails). + Perform campaign/TTP research , develop internal PoCs/tooling (eg, tradecraft to exercise specific ... roadmap, methodology standardization, control validation cadence, and integration with vulnerability management. Job Qualifications Required: + BA or BS degree… more
- Amazon (Arlington, VA)
- …cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale. ... into actionable technical guidance for builders * Threat modeling * Projects and research work as needed * Security training and outreach to internal development… more
- CACI International (Chantilly, VA)
- …have a wide range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, ... intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more
- JPMorgan Chase (Plano, TX)
- …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best ... of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security… more