- Leidos (Ashburn, VA)
- …(Lambda, SNS, SQS, etc. ) and third-party tools. + Conduct proactive threat modeling and risk assessments to identify potentialvulnerabilities and define mitigation ... Harness and Rafay. + Deep understanding of security bestpractices, including threat modeling, risk assessment, and vulnerability management. + Experience with… more
- Deloitte (Baltimore, MD)
- …deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, ... threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and… more
- Microsoft Corporation (Redmond, WA)
- …Implement novel defense-in-depth strategies like cross-prompt isolation (XPIA), adaptive threat detections, agentic adversarial testing, and secure model lifecycle ... for AI data. + Experience with incident response, red teaming, and threat modeling for AI/ML systems. \#MicrosoftAI Technical Program Management IC5 - The… more
- Nightwing (Falls Church, VA)
- …+ Escalate items which require further investigation to other members of the Threat Management team + Execute operational processes in support of response efforts to ... of: + Boolean Logic + TCP/IP Fundamentals + Network Level Exploits + Threat Management + Regular Expressions + Knowledge of Control Frameworks and Risk Management… more
- Applied Research Solutions (Dayton, OH)
- …Senior Managers. **Responsibilities:** + Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations. + Automate threat assessment ... and reporting activities. + Analyze and report system and organizational security posture trends to the ISSM/ISSO. + Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities. + Implement system security measures in… more
- Eversource Energy (Manchester, NH)
- …Software Development Life Cycle \(SSDLC\) \(e\.g\. code review, risk assessments, threat modeling, static code analysis, and dynamic application scanning\) One of ... successful adoption of required security approaches and capabilities\. + Conduct threat modeling for new and existing applications\. Perform security testing such… more
- Amentum (Fort Meade, MD)
- …CI flags, CI indicators, and operational vulnerabilities which pose a CI threat to human intelligence (HUMINT) activities, and produce comprehensive CI reviews + ... and the Department of the Army (DA) for CI investigations matters and provide threat - related data back to the division as it relates to CI investigations +… more
- Proofpoint (San Francisco, CA)
- …delivery, former executive or practitioner who planned or implemented Email Threat Protection, Information Protection, or Cloud Security programs. * Strong executive ... in a wide range of Cybersecurity including current advanced threats, threat protection, data protection, cloud security, malware protection and/or incident response.… more
- Truist (Charlotte, NC)
- …to both current and target state o real world expertise as it applies to threat events o translate reporting into action o representation and support of Cyber ... Threat Events Analysis and outcomes of the vulnerability report trends will drive actions for stakeholders to communicate downstream to Delivery and Production… more
- Lockheed Martin (Huntsville, AL)
- **Description:** "Ahead of Ready"\. The modern missile\- threat landscape is characterized by increasing complexity and rapid evolution, making it essential to adopt ... trajectory, launching an interceptor, and guiding it to successfully destroy the threat in mid\-air is an extraordinarily complex and challenging task\. It demands… more