- KBR (Chevy Chase, MD)
- …providing recommendations to address issues and shortfalls in security, vulnerability , confidentiality, integrity, and availability + Experience providing systems ... engineering support to evaluate utility and demand for capabilities, systems, and services and suggest modifications + Demonstrated experience executing and managing end-use requirements gathering and curation activities for Information Technology (IT) systems… more
- Insight Global (Los Alamitos, CA)
- …experience in securing cloud infrastructures such as AWS and Azure. * Vulnerability Management: Lead efforts to identify and remediate security weaknesses in ... networks and systems, providing technical guidance and support. * Policy Development: Create, implement, and maintain internal procedures to safeguard data and manage incident response effectively. * Collaboration: Work with project teams and system architects… more
- Battelle Memorial Institute (Beavercreek, OH)
- …and business teams in areas such as reverse engineering, vulnerability research, network engineering, software engineering, data science, hardware engineering, ... program management, and more. + Participate in training sessions, team meetings, and hands-on projects. + Complete assigned tasks and projects within established timelines. + Contribute to all phases of research projects: planning, execution, data collection,… more
- University of Southern California (Los Angeles, CA)
- …in software development life cycle (SDLC) improvements, including security and vulnerability management. + Cross train and collaborate with other developers. DevOps ... & CI/CD + Design and maintain CI/CD pipelines using Azure DevOps to automate Docker image builds and deployments . + Use YAML-based configurations to ensure standardization across multi-developer environments. + Implement best practices in source code control… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …Nessus, SCC, STIG Viewer). + Knowledge and/or experience Endpoint Security, Vulnerability Management, Logging, and Monitoring + Knowledge and/or experience in the ... Risk Management Framework (RMF) process and JSIG security controls. + Knowledge and/or experience of information system architecture and standards as they apply to cybersecurity. + Minimum 8570 IASAE I Certification (ie Security+). + DoD Top Secret security… more
- The Boeing Company (Hazelwood, MO)
- …+ Working knowledge of cybersecurity controls, frameworks, and the vulnerability management lifecycle + Experience in architecture, design, management, ... administration and troubleshooting of networks with a focus on security controls and firewall administration + Experience in cyber security and/or product security engineering + Experience in analysis of customer security requirements and deriving detailed… more
- University of Utah (Salt Lake City, UT)
- …+ Leadership and executive competency, including emotional intelligence, vulnerability , situational awareness, and accountability. + Interpersonal and communication ... skills, including eloquence, empathy, diplomacy, trustworthiness, and wit. + Thinking and problem-solving skills, including cognitive flexibility, sense-making, and resilience. + Work ethic and motivation, including initiative, candor, learning agility, and… more
- Capgemini (Atlanta, GA)
- …after hour rotation environment. + Relevant experience supporting security audits, vulnerability assessments, and compliance automation efforts. + High school or ... equivalent diploma. The base compensation range for this role in the posted location is: **$66,910 - $151,510** Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The… more
- CACI International (Springfield, VA)
- …Assurance/Security Specialist III to join our team. This role will performs vulnerability /risk analyses of computer systems and applications during all phases of the ... system development life cycle. This role with assist in Identifies, reports, and resolves security violations. **Responsibilities:** * Support development and analysis of Assessment & Authorization (A&A) and Life Cycle Management documentation of systems… more
- Google (HI)
- …role, incident response, threat hunting, artificial intelligence, and vulnerability management. + Experience delivering comprehensive security solutioning through ... design, coding, configuration, and deployment. + Experience in securing cloud environments with an understanding of Google cloud security principles and best practices. **About the job** In this role, you will provide AI-enabled SOC services and cyber threat… more