- Insight Global (Melbourne, FL)
- …log analysis. Understanding of predominant cyber-attack vectors (Buffer Overflow, Phishing , etc.) Security+ Certification or equivalent certification null We are ... a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates… more
- Motion Recruitment Partners (Fort Lauderdale, FL)
- …Exploitation frameworks: Metasploit, CANVAS, Core Impact + Social Engineering campaigns: email phishing , phone calls, SET + Deep understanding of OSI model and OWASP ... + Security devices: Firewalls, VPN, AAA systems + OS Security: Unix/Linux, Windows, OSX + Understanding of common protocols: HTTP, LDAP, SMTP, DNS + Web application infrastructure: Application Servers, Web Servers, Databases + Web development and programming… more
- Optiv (Tampa, FL)
- …Security Information and Event Management (SIEM), end-point security products, email/ phishing products, and case management/knowledge management systems such as ... Service NOW. + Creating and maintaining documentation for all playbooks, scripts, integrations, etc. + Excellent time management, reporting, and communication skills. + Superior developer problem-solving skills. + Experience working with Internal and client… more
- CACI International (Chantilly, VA)
- …SQLi, covert channels, secure tunneling,pivot, socks proxies, infil/exfil of data, phishing , writing buffer overflows, fuzzing, etc. **What We Can Offer You:** ... **- We've been named a Best Place to Work by the Washington Post.** **- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.** **- We offer competitive benefits and learning and development… more
- Capital One (Mclean, VA)
- …actionable intelligence to mitigate cyber threats to include brand impersonations and phishing , in collaboration across the enterprise. You are adaptable and thrive ... working cross-functionally, adept at producing intelligence to support business requirements, and proactively identify areas for implementation of cyber defense measures. You are a People Leader leveraging capacity planning skills which help achieve a… more
- Motion Recruitment Partners (Atlanta, GA)
- …Implement and manage email security policies and protocols to protect against phishing , malware, and other email-borne threats. + Analyze email security incidents, ... perform root cause analysis, and implement corrective measures. + Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards. + Technical Support and Troubleshooting: + Provide advanced technical support… more
- The City of Houston (Houston, TX)
- …Center (SOC) mailbox and monitor and analyze the emails for threats including phishing and malware and escalates per procedures. + Participates in the investigations ... of information security incidents and may prepare reports on intrusions as required. + Perform real-time detection, analysis, and response to threats via an EDR tool. + Track, provide, and present analysis into observed attacks against the COH. + Assist with… more
- VadaTech Inc. (Henderson, NV)
- …software. + Need to have experience working with cyber security tools for phishing /malware detection monitoring + Must be a US Citizen WORK ENVIRONMENT . Mostly ... Indoors/Office PHYSICAL DEMANDS This position involves work typical of an office environment with no unusual hazards. The physical demands described below are representative of those that must be met by an employee to successfully perform the essential… more
- Georgetown Univerisity (Washington, DC)
- …awareness and training program to include education, outreach, and performing phishing training campaigns. In a Senior-level position within the UISO, the ... Director represents the Office of the Chief Information Security Officer (CISO) on cybersecurity risk and vulnerability management across GU; serves point-of-contact for the security posture concerns related to departments and organizations outside UIS, the… more
- CVS Health (Trenton, NJ)
- …Strong understanding of cyber security / Information Security concepts ( Phishing , Malware, Vulnerabilities, DDoS)* Strong understanding of Microsoft Technologies ... such as Active Directory, DNS, DHCP* Strong understanding of various identity and access management / authentication concepts and technologies* Ability to collect data from disparate systems in order to correlate and perform data analysis Skill In: * Precise &… more