- University of Texas Rio Grande Valley (Edinburg, TX)
- …endpoint devices, Active Directory, ITSM , Amazon Web Services, Environment and PII vulnerability scanning, Office 365, and Oracle Identity Manager or similar ... in all aspects of information security. + Coordinates and conducts vulnerability and penetration analysis/tests on University systems and services to identify… more
- Emerson (Boulder, CO)
- …they meet policy criteria. + Escalate nonconforming proposals or exceptions to the Manager for review. **Risk & Vulnerability Analysis** + Monitor open source ... ensuring compliance with established policies. Working under the direction of the Manager , this role is execution focused, helping translate strategy into day-to-day… more
- OneMain Financial (Fort Mill, SC)
- …and roadmaps with a focus on cloud security. + Serve as the technical resource for OneMain patch management and vulnerability remediation efforts across ... **Key Responsibilities** + Contribute to the OneMain Enterprise Patch Management Program Strategy focusing on cloud architecture. + Act as the subject matter expert… more
- CACI International (Colorado Springs, CO)
- …+ Reports cybersecurity potential and anomalous system events and incidents to the Program Manager + Responds to cybersecurity incidents with appropriate actions ... Performs periodic and on-demand vulnerability scans, develops vulnerability trend reports on assets and program ...key tasks and high-impact assignments + Functions as a technical expert across multiple project assignments + May supervise… more
- TEKsystems (Charlotte, NC)
- …○ Implement automation for routine operational tasks. * Contribute to vulnerability remediation and compliance-driven activities across the Teradata ecosystem. * ... Qualifications * Hands-on UNIX/Linux administration experience in an enterprise environment. ○ Manager is flexible on "years of experience"; focus is on real,… more
- General Dynamics Information Technology (Fort Bliss, TX)
- …update (Server Operating systems and Applications), apply Information Assurance Vulnerability Managements (IAVMS), and Security Technical Implementation Guides ... TX Mission Training Complex (MTC). The ideal candidate acts as a recognized technical expert in base labor category description. **HOW THE SENIOR NETWORK SYSTEMS… more
- TEKsystems (Seattle, WA)
- …distributed ecosystem. As a Lead Engineer, you will serve as a key technical leader responsible for architecting, implementing, and guiding the evolution of our ... compute environments. You'll work hands-on with engineers while setting the technical direction, promoting secure and scalable design practices, and ensuring… more
- Mallinckrodt Pharmaceuticals (Bridgewater, NJ)
- …vision & strategy. This role manages the enterprise's information security program , identifies, and evaluates IT and cybersecurity risks, and ensures the ... monitoring a strategic, comprehensive enterprise information security and IT risk management program . + Working directly with the business leaders & IT business… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, ... queue and identify new and emergent requirements. The SE blends technical skills in cloud platforms, Nutanix, Windows/Linux, automation tools, containerization, and… more
- Amentum (Crane, IN)
- …Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected ... etc.) for multiple programs, in compliance with SSP Regulations. + Support the Program Office Technical Lead as needed identifying issues and action items,… more