- JPMorgan Chase (Columbus, OH)
- …periods of vulnerability + Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if ... vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase… more
- JPMorgan Chase (Tampa, FL)
- …best solutions for the future state architecture + Understanding of the external threat landscape, threat actors, adversary tactics & techniques, and industry ... trends **Preferred qualifications, capabilities, and skills** + Experience with Payments environments including key business processes and technology trends + CISSP, CASP+ or equivalent certification **\#CTC** JPMorganChase, one of the oldest financial… more
- US Tech Solutions (Charlotte, NC)
- …CyberArk to CyberArk SaaS Privilege Cloud, while also assisting in cyber threat detection, forensic investigations, and access governance across IT systems. + This ... authentication protocols (LDAP, SAML, OAuth) + Experience in incident response, threat monitoring, and log analysis + Working knowledge of PowerShell, scripting,… more
- RTX Corporation (Tucson, AZ)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... to design near-field-to-far-field processing algorithms + Understanding of complex threat environments and battlefields + Experience designing datalink, flight… more
- RTX Corporation (Tewksbury, MA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... development, Mission Defense Planning, Simulation Modeling and Analysis and Threat Evaluation/Weapon Assignment processing. + Knowledge of data structures and… more
- Boston Public Schools (Boston, MA)
- …and does not tolerate any form of retaliation, or bias-based intimidation, threat or harassment that demeans individuals' dignity or interferes with their ability ... and does not tolerate any form of retaliation, or bias-based intimidation, threat or harassment that demeans individuals' dignity or interferes with their ability… more
- Palo Alto Networks (Reston, VA)
- …so you're prepared to connect them with a solution for every stage of threat prevention. You'll be responsible for meeting and exceeding your quota by crafting and ... Networks has brought technology to market that is reshaping the cybersecurity threat and protection landscape. Our ability to protect digital transactions is limited… more
- Leidos (Bethesda, MD)
- …or information, to include technical support to CI and Insider Threat investigations. **Responsibilities include** : Develop, implement, and maintain TSCM programs ... and processes + General knowledge of counterintelligence investigations, insider threat operations, physical security and anti-terrorism requirements, cyber security,… more
- MTA (New York, NY)
- …where poor quality of Security enforcement is observed. This measure differs from threat vulnerability risk assessments in that, this role is tasked with addressing ... the quality of security efforts that exist to address a threat such as whether staff are attentive, alert, collaborating with surveillance monitoring centers,… more
- Xcelerate Solutions (Vienna, VA)
- …support to a federal agency in support of the US Government's threat watchlisting and screening mission. Duties may include the processing and verification ... of national security threat actor nominations, data integrity/quality control, encounter management, information sharing, and/or multiple discipline intelligence… more