- Lockheed Martin (Annapolis Junction, MD)
- …The services enable the Data Transformation, Malware Analysis, and Cyber Threat Intelligence processing and sharing capabilities for the customer, fulfilling mission ... objectives and offering actionable information to detect and mitigate cyber threats\. The contract has several locations in Maryland and a small contingent in Texas\. **WHO WE ARE** * Lockheed Martin is a global leader in aerospace, defense, and security… more
- EchoStar (Englewood, CO)
- …unless doing so poses an undue hardship on the Company, poses a direct threat of substantial harm to others, or is otherwise not required by law. EchoStar ... has a more detailed Accommodation Policy that applies to employees. EchoStar endeavors to make echostar.com and jobs.echostar.com accessible to users. Please contact ###@dish.com if you would like to discuss the accessibility of our website or need assistance… more
- Jacobs (Santa Fe, NM)
- …essential physical work functions of this safety sensitive position without posing a direct threat to the health or safety of themselves or others. The physical and ... environmental demands required to perform the essential duties of this position include standing, walking, sitting, coordination, balance and agility demands, which may include the ability to stoop, kneel, squat, grasp, reach, perform repetitive hand… more
- RTX Corporation (Andover, MA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... world. Raytheon is seeking a highly motivated candidate to serve as a Risk and Opportunity (R&O) Manager for the LTAMDS LRIP Program (Low-Rate Initial Production). As a Risk and Opportunity Manager for this high-profile program, you will work closely with the… more
- Nomad Global Communication Solutions (Columbia Falls, MT)
- …corrective actions. They will also stay informed about the evolving cyber threat landscape and current best practices in cybersecurity. In addition, the role ... includes supporting the creation of enterprise-wide security policies and procedures, conducting vulnerability testing and security assessments, and strengthening the organization's cyber defense posture through gap analysis and validated prevention,… more
- TekSynap (Huntsville, AL)
- …and integrating secure information systems. This role involves conducting threat modeling, implementing security architectures, and validating system compliance with ... applicable standards such as NIST, RMF, and DoD directives. Responsible for assessing, understanding, and communicating actual and potential security and/or privacy vulnerabilities of government-controlled systems and suggest ways to remove, mitigate, or… more
- RTX Corporation (Tucson, AZ)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... world. The Effector RF Products Department is seeking a Lab Lead. This individual will collaborate closely with other Lab Leads, Engineering staff, and Technicians to ensure the Engineering Labs adhere to established company policies and provide hardware… more
- Air Force Materiel Command (Edwards AFB, CA)
- …drug testing. Illegal drug use by employees in sensitive positions presents a clear threat to the mission of the Air Force, national security, and public safety. The ... duties of this position meets all requirements as a category 4 designation, and shall not be vacated during a national emergency or mobilization without seriously impairing the capability of the parent Federal Agency or office to function effectively. This… more
- Meijer (Grand Rapids, MI)
- …Support + Establishes the necessary security design review processes; conducting threat modeling for complex & high-risk implementations + Communicates information ... security initiatives effectively to internal staff, internal business customers, Senior/Executive level leadership and to external vendors as required + Leads and manages team of Information Security Architects, providing technical guidance and mentorship and… more
- Leidos (Washington, DC)
- …deployments and policy rollouts across local and remote systems. + Conducting threat analysis and crafting custom security rules tailored to advanced exploits and ... vulnerabilities. + Providing in-depth reporting on system health, event trends, and module performance. + Supporting major updates and compliance efforts, including STIG-mandated Trellix upgrades. + Helping design and evaluate network components and develop… more