- Leidos (Lorton, VA)
- …responsible for securing and hardening enterprise Linux servers, managing Tenable vulnerability scanning platforms, and driving compliance across on-prem and cloud ... platforms (Tenable.sc, Nessus, Nessus Agents, connectors) to support continuous vulnerability scanning. + Develop and maintain scanning policies, schedules, and… more
- ServiceNow, Inc. (Kirkland, WA)
- …Location.** As a member of the Systems Engineering's Compliance and Vulnerability Management team, you will support critical initiatives across both commercial ... containerized services, configuration and change management, security scanning tools, and vulnerability analysis. You will work closely with teams across the… more
- Colorado State University (Fort Collins, CO)
- …Subject Matter Expert ( SME ) to develop extreme weather change vulnerability assessments, analyze extreme weather data, and make management recommendations for ... required to conduct literature reviews, preliminary data analysis, and vulnerability assessments. These positions require experience with weather-related risk… more
- Experian (AZ)
- …identity and access management (IAM), cloud security, main management, vulnerability management, Infrastructure-as-Code (IaC) security, and application security. The ... + Define policies for encryption, main rotation, and lifecycle management. + Vulnerability Management + Establish architecture for vulnerability scanning and… more
- Microsoft Corporation (Redmond, WA)
- …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. + OR Master's Degree in ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. + OR Bachelor's Degree in… more
- Microsoft Corporation (Redmond, WA)
- …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. + OR Master's Degree in ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection. + OR Bachelor's Degree in… more
- General Dynamics Information Technology (Washington, DC)
- …development to include security design principles, data protection, threat and vulnerability management, compliance and governance, threat and vulnerability ... System Security Office (ISSO) to schedule periodic penetration testing and conduct vulnerability assessments. + Provide monthly and ad hoc reports on identified… more
- Google (Kirkland, WA)
- …or a related technical field. + Experience with security assessments, vulnerability management, security research, vulnerability investigation or security ... creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to...you will gain knowledge of our security bug triage, vulnerability management, security fix release, and Vulnerability … more
- US Marine Corps (Quantico, VA)
- …tasks for Information System Security Manager (ISSM), security assessments, vulnerability management, or cybersecurity (CY): OR an appropriate combination of ... threats and vulnerabilities, encryption algorithms, host/network access control mechanisms, vulnerability information dissemination sources, Payment Card Industry (PCI) data… more
- CAI (Salt Lake City, UT)
- …the next level! If you have hands-on experience with Zscaler administration, vulnerability management expertise, and strong documentation skills, and are looking for ... **Zscaler Engineer** to manage and administer Zscaler services, operate the vulnerability management program, and document configurations and handover materials to… more