- University of Southern California (Los Angeles, CA)
- …in software development life cycle (SDLC) improvements, including security and vulnerability management. + Cross train and collaborate with other developers. DevOps ... & CI/CD + Design and maintain CI/CD pipelines using Azure DevOps to automate Docker image builds and deployments . + Use YAML-based configurations to ensure standardization across multi-developer environments. + Implement best practices in source code control… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …Nessus, SCC, STIG Viewer). + Knowledge and/or experience Endpoint Security, Vulnerability Management, Logging, and Monitoring + Knowledge and/or experience in the ... Risk Management Framework (RMF) process and JSIG security controls. + Knowledge and/or experience of information system architecture and standards as they apply to cybersecurity. + Minimum 8570 IASAE I Certification (ie Security+). + DoD Top Secret security… more
- The Boeing Company (Hazelwood, MO)
- …+ Working knowledge of cybersecurity controls, frameworks, and the vulnerability management lifecycle + Experience in architecture, design, management, ... administration and troubleshooting of networks with a focus on security controls and firewall administration + Experience in cyber security and/or product security engineering + Experience in analysis of customer security requirements and deriving detailed… more
- University of Utah (Salt Lake City, UT)
- …+ Leadership and executive competency, including emotional intelligence, vulnerability , situational awareness, and accountability. + Interpersonal and communication ... skills, including eloquence, empathy, diplomacy, trustworthiness, and wit. + Thinking and problem-solving skills, including cognitive flexibility, sense-making, and resilience. + Work ethic and motivation, including initiative, candor, learning agility, and… more
- Capgemini (Atlanta, GA)
- …after hour rotation environment. + Relevant experience supporting security audits, vulnerability assessments, and compliance automation efforts. + High school or ... equivalent diploma. The base compensation range for this role in the posted location is: **$66,910 - $151,510** Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The… more
- CACI International (Springfield, VA)
- …Assurance/Security Specialist III to join our team. This role will performs vulnerability /risk analyses of computer systems and applications during all phases of the ... system development life cycle. This role with assist in Identifies, reports, and resolves security violations. **Responsibilities:** * Support development and analysis of Assessment & Authorization (A&A) and Life Cycle Management documentation of systems… more
- Google (HI)
- …role, incident response, threat hunting, artificial intelligence, and vulnerability management. + Experience delivering comprehensive security solutioning through ... design, coding, configuration, and deployment. + Experience in securing cloud environments with an understanding of Google cloud security principles and best practices. **About the job** In this role, you will provide AI-enabled SOC services and cyber threat… more
- Microsoft Corporation (Redmond, WA)
- …proficiency in SQL and CosmosDB, Power Platform and automation frameworks, vulnerability triage, data analysis and visualization using Kusto/KQL, Power BI, and ... scripting languages (eg, PowerShell and Python). Strong troubleshooting skills across multiple platforms (Windows, Linux, mobile OS) and ability to resolve complex service issues. Excellent written and verbal communication skills, with sound judgment and… more
- SOS International LLC (Scott Air Force Base, IL)
- …owners to maintain Risk Management Framework (RMF) packages, conduct risk and vulnerability assessments, provide support to the CDS approval processes, and perform ... other IA support duties. + Develop and submit recommended policy directives, instructions, manuals, standards, strategies, visions, mission statements, goals and objectives as they apply to CDS. + Provide ad hoc reports and briefings with information such as… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …of interest include cryptomathematics, algorithm development, computer network security, and vulnerability analysis. Interest in any of these areas is not required, ... but will be looked upon favorably. Requirements Conditions of Employment Qualifications The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Mathematics, Physics, Engineering, Data Science, Computer Science,… more