- Red Hat (Raleigh, NC)
- …+ Identifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk management + Collaborate with a cross-functional ... team about market requirements and best practices + Keep abreast of the latest technologies and standards in the field **What you will bring** + 10+ years of experience in MLOps, DevOps, Automation and modern Software Deployment practices + Strong experience… more
- NBC Universal (New York, NY)
- …work experience. + Minimum 3-5 years of experience in PCI compliance, vulnerability management, or penetration testing. + Strong understanding of PCI DSS ... requirements, especially ASV scanning and penetration testing controls. + Proficiency in penetration testing methodologies (OWASP, NIST SP 800-115, PTES). + Experience with tools such as Burp Suite, Nmap, Nessus, Metasploit, Kali Linux, and scripting (Python,… more
- Rincon Consultants (Ventura, CA)
- …and writing for public audiences. + Contribute to Climate Change Vulnerability Assessments, including evaluating risks such as extreme heat, wildfire, flooding, ... and sea level rise. + Contribute to GHG inventories, including data collection and analysis. + Participate in facility GHG audits and verification reports. + Prepare research summaries, data visualizations, and planning materials for public-facing… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …for industry, infrastructure, technology, country, geographic area, biographic and targeted vulnerability . + Assist with preparation of assessments of current events ... based on the sophisticated collection, research and analysis of classified and open source information. + Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. + Assists with the collection of data using a… more
- Guthrie (Sayre, PA)
- …standards. * Perform risk assessments to identify areas of vulnerability and recommend corrective actions. * Investigate compliance billing-related incidents ... and ensuring proper documentation and reporting to authorities. * Responsible for the daily management of compliance auditors * Support responses to external audits and inspections. Data Analysis & Reporting * Analyze data to detect patterns, trends, and… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and accreditation. ... Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs),… more
- TEKsystems (Reston, VA)
- …or similar. + 5+ years of experience in cybersecurity with a focus on vulnerability management and network security. + Proven expertise in Cisco ISE and Centralized ... AAA platform configuration, management, and integration. + Strong knowledge of DISA STIGs, SRGs, and NIST 800-53 compliance. + Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field. + Ability to thrive in a fast-paced,… more
- Microsoft Corporation (Redmond, WA)
- …help defenders to understand and prioritize remediation by providing automated vulnerability and impact assessments. You will deliver high quality engineering ... solutions while enabling Microsoft to strengthen our defenses. Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate… more
- Serco (Kirtland AFB, NM)
- …from policy or acceptable configurations. + Perform compliance audits and vulnerability assessments to support cybersecurity objectives. + Support program control ... processes to ensure risk mitigation and accreditation readiness. + Assist in the implementation of DoD security policy (eg, NISPOM, DCID 6-3) and recommend process enhancements. + Validate security requirements and recommend safeguards. + Support Security Test… more
- Clark County, NV (Las Vegas, NV)
- …14 Indicate your full-time professional experience performing cyber-security vulnerability detection, design and implementing remediation. + No Experience ... + Less than 2 years + 2 to 4 years + 4 to 6 years + More than 6 years 15 Please list all employer(s) and each job title on your application where your experience was obtained in question 14. The template provided below must be completed in its entirety or the… more