• Security Engineer, Artificial General Intelligence

    Amazon (Austin, TX)
    …manual processes into scalable controls 2. Conduct application security reviews, threat modeling sessions, and penetration testing to identify and remediate security ... Qualifications - 3+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software… more
    Amazon (12/18/25)
    - Related Jobs
  • Intelligence Research Specialist

    Headquarters, NASA (Redstone Arsenal, AL)
    …analysis and correlation of technical data, logs, digital forensics, and threat assessments. Develop actionable intelligence products that inform stakeholders of ... on security posture, gaps, and recommended countermeasures. Produce high-visibility threat and vulnerability assessments and intelligence reports. Conduct all-source… more
    Headquarters, NASA (12/18/25)
    - Related Jobs
  • Product Cybersecurity Engineer II (Onsite)

    RTX Corporation (Cedar Rapids, IA)
    …Cycle (SSDLC). Supporting this Cyber Security Engineering team's mission involves: developing threat models and information flow architectures to ensure data can be ... development teams to address product security concerns + Developing threat model / data flow diagrams to ensure data...- Layer 2/Layer 3/Layer 4 protocols + Knowledge of Threat Models and Data Flow Diagrams + Data/network security… more
    RTX Corporation (12/18/25)
    - Related Jobs
  • Product Cyber Security Engineer II

    Honeywell (Fort Mill, SC)
    …+ Support NPI (New Product Introduction) security process activities including threat modeling, final security reviews, threat vulnerability assessment, etc. ... + Knowledge of secure software development lifecycle and practices such as threat modeling, security reviews, penetration tests, and security incident response + 1… more
    Honeywell (12/18/25)
    - Related Jobs
  • Penetration Tester, Embedded Devices

    TP-Link North America, Inc. (Irvine, CA)
    …security activities for a single product category, including penetration testing, threat modeling and security assessment for specific modules, contributing to ... Provide remediation recommendations and write detailed penetration test reports. + Threat Modelling and security assessment: Perform threat modeling to… more
    TP-Link North America, Inc. (12/18/25)
    - Related Jobs
  • Manager, Incident & Technology Management

    Ally (Raleigh, NC)
    …management processes. The Manager will ensure effective use of threat and asset monitoring, emergency notification, and planning/response management procedures ... preparedness activities-planning, training, and exercises. * Oversee day-to-day CM threat monitoring activities to facilitate timely identification and notification… more
    Ally (12/17/25)
    - Related Jobs
  • Program Analyst IV (Hybrid)

    First Division Consulting (Stafford, VA)
    …Security Classification Guides (SCG), Critical Program Information (CPI), Anti-Tamper plans, Threat Assessments, and Validated Online Lifecycle Threat (VOLT). ... advance through the market research phase, providing guidance on Criticality Analysis, Threat Assessments, and Supply Chain Risk Management (SCRM) to reduce the… more
    First Division Consulting (12/17/25)
    - Related Jobs
  • Services Manager, Cybersecurity Operations

    ARCO (Brentwood, MO)
    …posture. This position is both strategic and hands-on, driving operational excellence, threat mitigation, and continuous improvement. As a senior member of the team, ... and optimize security tooling (SIEM, IDS/IPS, EDR, SIG, EPM, firewalls, threat intel platforms, etc.). + Oversee vulnerability scanning, prioritization, and… more
    ARCO (12/17/25)
    - Related Jobs
  • Information Technology Specialist 2

    New York State Civil Service (Albany, NY)
    …and resolution of security threats to Thruway Authority's information involving threat detection, threat intelligence assessment, vulnerability monitoring and ... resources and determine events that require investigation and response.* Monitor the threat landscape for changes impacting vulnerabilities and assess the risk to… more
    New York State Civil Service (12/17/25)
    - Related Jobs
  • DCO Engineer - Mid Level

    ISYS Technologies (Patrick, SC)
    …cyber key terrain to thoroughly understand the mission, architecture and associated threat . + Advises on technical design and implementation of DCO capabilities ... defense technologies for best fit based on mission, architecture and current threat . + Leads the design, implementation, configuration and/or tuning of cyber… more
    ISYS Technologies (12/17/25)
    - Related Jobs