- COLSA Corporation (Huntsville, AL)
- …including architectures, firewalls, electronic data traffic, and network access. * + Performs research and analysis at the deepest levels of total system product to ... and disposal. * + Designs encryption, penetration testing, and vulnerability analysis solutions of various security technologies.* + Integrates architectural… more
- HCA Healthcare (Nashville, TN)
- …strong organizational and operational organization skills. + Innovation: Proactively research and recommend innovative security solutions that enhance the HCA's ... various Information Security domains such as: Identity, Endpoint, Network, Data, Mobile , Cloud, Application Security etc. + Experienced assessing and implementing… more
- Meta (Santa Fe, NM)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software… more
- nVent (New Berlin, WI)
- …robust security embedded, in compliance with Critical Security Controls. + ** Vulnerability Management:** Partner with infrastructure operations team to ensure PCs ... and Technology Leadership** : Partner with Enterprise Solution teams to conduct research on emerging products, services, protocols, and standards in support of IT… more
- Nightwing (Herndon, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... unclassified distributed work environment architectures and systems. + Secure remote mobile computing. + SCCM **Additional Requirements** + Additional Technical and… more
- Medtronic (Minneapolis, MN)
- …we pursue continuous innovation to breach new frontiers of Biomedical research . As global connectivity increases, the complexity and security challenges associated ... design to deployment. + Risk Assessment - Conduct threat modeling and vulnerability assessments to identify and mitigate security risks throughout the product… more
- CACI International (Chantilly, VA)
- …cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized ... systems (incl. Active Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus.** **Solid understanding of networking, TCP/IP,… more
- Hartford HealthCare (Hartford, CT)
- …a regional home care system, an array of senior care services, a mobile neighborhood health program and a comprehensive physical therapy and rehabilitation network. ... action plans and ongoing monitoring * Identify potential areas of compliance vulnerability and risk, develop and implement corrective action plans for resolution of… more
- Amazon (Arlington, VA)
- …cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale. ... into actionable technical guidance for builders * Threat modeling * Projects and research work as needed * Security training and outreach to internal development… more
- Ventura County (Ventura, CA)
- …applications support, voice/data infrastructure, data security, threat and vulnerability /risk management, and extended staffing. The Position Working within ... adjusts telecommunications equipment (eg microwave systems, radios, repeater sites, mobile units, multiplexers, and modems) in support of enterprise infrastructure… more