• Assistant Facility Security Officer

    Amentum (Melbourne, FL)
    …procedures. . Perform facility security inspections, risk assessments, and vulnerability analyses. . Investigate security incidents and prepare reports with ... corrective actions. . Coordinate with Space Force, government agencies, and contractors on security requirements. . Support audits, inspections, and self-assessments to ensure compliance. Minimum Requirements: . Active Secret Clearance (Top Secret preferred).… more
    Amentum (01/06/26)
    - Related Jobs
  • Windows System Administrator (Senior-Level)

    Link Solutions Inc (Durham, NC)
    …Collaborate with IT and Cybersecurity teams to support remediation, patching, and vulnerability scanning efforts. Please note this job description is not designed to ... cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. + Must be a US Citizen. + Must have an active DoD Top Secret Clearance + Must have an MS or BA/BS in computer sciences or… more
    Link Solutions Inc (01/06/26)
    - Related Jobs
  • Information System Security Manager

    SAIC (Chantilly, VA)
    …Demonstrated experience with Rapid7, WebInspect, AppDetective, CIS-CAT, and other vulnerability assessment tools and processes. + Information security certifications ... such as CISSP, CISSE, CISA, CEH, CCSP, etc. + Demonstrated experience with computer and network vulnerabilities (eg, malware, zero-day attacks, denial of service attacks, etc.). REQNUMBER: 2510066 SAIC is a premier technology integrator, solving our nation's… more
    SAIC (01/06/26)
    - Related Jobs
  • Cyber and Technology Operational Risk Manager

    CIBC (Chicago, IL)
    …and deep risk expertise in areas such as cloud, network, cybersecurity, DevOps, vulnerability management, and IT service management to assess and challenge risks and ... controls across technology and business lines. Support risk activities across the team, including incident management, deficiency management, risk reviews, and risk assessments, operating within a matrix team environment, and driving continuous improvement in… more
    CIBC (01/06/26)
    - Related Jobs
  • Senior Product Security Engineer

    Bayer (Seattle, WA)
    …GDPR, NIST, & CIS; providing software, network security & vulnerability management; maintaining current insights into standard security regulations, policies, ... & procedures for information systems; maintaining written documentation for product project & program strategies, and security SOP's & standards; using Agile, Scrum & Kanban methodologies to reduce attack surface & improve security engagement; driving logging… more
    Bayer (01/06/26)
    - Related Jobs
  • Embedded Systems Security Engineer (Cyber…

    Huntington Ingalls Industries (Dayton, OH)
    …design documents for anti-tamper solutions (eg Anti-Tamper Plans) and conduct vulnerability analysis of system level anti-tamper architectures + Author technical ... reports to document vulnerabilities of proposed anti-tamper solutions and provide technical recommendations for key DoD acquisition decision makers + Support technical interchange meetings and program reviews with US Air Force and DoD program offices and… more
    Huntington Ingalls Industries (01/06/26)
    - Related Jobs
  • Automated Scheduling Software Specialist

    MyFlorida (Tallahassee, FL)
    …file encryption, secure authentication, and role-based access control (RBAC). + Perform vulnerability assessments and security audits on the EFT server. + Use ... logging tools, dashboards, and performance metrics to monitor system health. + Identify bottlenecks and optimize file transfer efficiency. + Configure user roles, group policies, and access permissions for internal and external users. + Integrate Active… more
    MyFlorida (01/06/26)
    - Related Jobs
  • Product Owner - Cyber

    Capgemini (Chicago, IL)
    …security posture, driving continuous improvement. Support incident response and vulnerability remediation planning. Ensure documentation and audit trails meet ... internal and external standards. **What You'll Bring** Proven experience as a Product Owner in cybersecurity or infrastructure domains. Strong understanding of threat modelling, secure software development, and DevSecOps. Familiarity with frameworks such as… more
    Capgemini (01/06/26)
    - Related Jobs
  • Communication, Surveillance, and Safety…

    State of Colorado (Adams County, CO)
    …Federal Standards. This includes proper SAB/VV/VAB (Sexually/Violently Aggressive Behavior/ Vulnerability to Victimization (SAB/VV) Risk Assessment Tool) risk ... assessment or reassessment. Internal Quality Control - Review all incidents that occur within the youth center are written within the guidelines of DYS Policy. Will supervise and oversee accurate documentation of those incidents and provide feedback to the… more
    State of Colorado (01/06/26)
    - Related Jobs
  • Associate Information Security - Launchpad

    Lowe's (Charlotte, NC)
    …enablement and communications strategy + Participates in regular security vulnerability assessments + Assistsduring integration and user acceptance testing ... activities + Assistsas needed during information security incidents **Minimum Qualifications** + Bachelor's Degree in Computer Science, CIS, Engineering, Business Administration, Cybersecurity, or related field (or equivalent work or military experience in a… more
    Lowe's (01/06/26)
    - Related Jobs