- Lockheed Martin (Colorado Springs, CO)
- …from multiple sensors to identify and characterize the inbound ballistic missile threat , plans the best defensive solution, and launches the intercepting missiles to ... negate the threat \. **The Work** The selected candidate will become part...mininode configurations to include adding, removing, updating redhat package manager modules \(RPMs\) for testing/verification * Produce lab runs… more
- Southern California Edison (Rosemead, CA)
- …software applications to identify vulnerabilities and weaknesses. + Develop and maintain threat models to identify and mitigate potential security risks. + Conduct ... scanning tools, application analysis tools (SCA, SAST, DAST, etc.), and threat assessment tools. + Experience and proficiency in programming/scripting languages such… more
- Black Hawk College (Moline, IL)
- …them. + Implements strategies, tools, and methods to assess the College's threat level in order to deter electronic attacks upon the College infrastructure; ... reports threat levels and deficiencies on a monthly basis to...computer hardware and application software to the IT Systems Manager . + Assists the Co-Chief Information Officer in security… more
- Air National Guard Units (Springfield, OH)
- …operations and production to include time critical targeting (TCT), direct threat warning, battle damage assessment, combat identification, combat search and rescue, ... multi-INT correlation, threat analysis, mapping, intelligence preparation of the battlespace, situation...(CT). Incumbent works with the subordinates and Unit Training Manager to identify shortfalls and develop plans to correct… more
- Bank of America (Denver, CO)
- …of internal and external information vulnerabilities to evaluate the degree of threat to an information system and answer tactical questions about current ... commitment to build partnerships in a dynamic risk & threat driven environment * Strong interpersonal skills; ability to...offered a role with Bank of America, your hiring manager will provide you with information on the in-office… more
- GovCIO (Hanover, MD)
- …cyber network defense, computer forensics and/or cyber threat emulation/detection. + Extensive, demonstrative, experience assessing instructional ... whose duties include cyber network defense, computer forensics and/or cyber threat emulation/detection. + Extensive experience assessing the efficacy of cyber… more
- RTX Corporation (Tucson, AZ)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... to design near-field-to-far-field processing algorithms + Understanding of complex threat environments and battlefields + Experience designing datalink, flight… more
- Toyota (Plano, TX)
- …gaps, and provide support for security remediation Reporting to the Senior Manager , this role will join the **Cloud Engineering & Software Development Support ... secure development practices across the organization. + Develop comprehensive threat models for complex applications, communicating effectively with application… more
- The Brattle Group (Boston, MA)
- …incidents that impact the firm's infrastructure, systems, or data. Reporting to the Manager of Cybersecurity., the IRS plays a key role in defending the enterprise ... + Develop, refine, and implement incident response playbooks for different threat scenarios. + Provide detailed documentation and post-incident reporting, including… more
- Deloitte (Rochester, NY)
- …deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, ... role ends on 12/25/2025. Work you'll do As a Manager , you will be at the front lines with...ID and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity, manage/migrate/deploy… more