- TEKsystems (Mahwah, NJ)
- …* Experience with XDR (Extended Detection and Response) clients for advanced threat detection and response. * Experience with RDP, Dameware, Quick Assist. * ... Knowledge of PDQ Deploy, SCCM, Windows GP, Acronis. Pay and Benefits The pay range for this position is $40.00 - $50.00/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject… more
- TekSynap (Rockville, MD)
- …Log Configuration and Management + Network Security: firewalls, Intrusion Prevention/ Detection Systems (IPS/IDS), and Web Application Firewalls (WAFs) + Data ... Loss Prevention System Administration + Endpoint Security and Advanced Threat Protection + DNS/DNSSEC Administration + Email Security + Packet Capture and Protocol… more
- CareFirst (Reston, VA)
- …to firewalls, load balancers, WAFs, email security, packet brokers and packet storage, threat detection , DNS, and NAC. **Knowledge, Skills and Abilities (KSAs)** ... + Ability to perform risk assessments and investigate cyber security incidents. + Ability to understand vulnerabilities at a technical level. + Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues. + Proficient… more
- RTX Corporation (Aurora, CO)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... satisfaction, the ASDS team provides customers with unmatched capabilities of detection and sensing, command and control, and air-to-air, air-to-surface, and… more
- RTX Corporation (Andover, MA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... analysis. **What You Will Do** + Advanced knowledge of Solder defect prevention detection , and assessment to ANSI J-STD-001 Class 3 solder joint specifications +… more
- Teledyne (Billerica, MA)
- …where we're dedicated to safeguarding lives with cutting-edge sensing and threat detection technologies. Our arsenal includes advanced surveillance sensors, ... handheld devices, unmanned vehicles, lasers, and more solutions that increase operational effectiveness for warfighters, first responders, and search-and-rescue teams. We're looking for passionate innovators eager to shape the future of the Defense industry.… more
- RTX Corporation (Huntsville, AL)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... of system level software architecture + Experience with system concepts; detection , discrimination, track and signal processing algorithms and their behaviors and… more
- Truist (Raleigh, NC)
- …of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software ... security technologies including but not limited to firewalls, intrusion detection /prevention systems, network operating systems, identity management, database activity… more
- GE HealthCare (Bellevue, WA)
- …and GDPR assessment and compliance, and approve Security and Privacy design. + ** Threat Detection ** : Hunt, detect, and respond to digital security threats, ... demonstrating technical leadership in malware, emerging threats, and calculating risk. + **Identity Management** : Develop approaches to address the implementation of Identity and Access Management (IdAM) solutions, implement Privilege Identity Management… more
- Huntington Ingalls Industries (Bremerton, WA)
- …security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis ... (including facilities analysis, and security management). + Assesses and mitigates system security threats and risks throughout the program life cycle. + Validates system security requirements definition and analysis. + Establishes system security designs. +… more