- Deloitte (Honolulu, HI)
- …SEME operations comply with cybersecurity requirements and best practices. Drive vulnerability assessments, threat modeling, and the implementation of safeguards. + ... Contribute to the planning and development of technology roadmaps and operational strategies for critical communications systems, aligning technology investments with organizational goals. + Serve as a communications bridge between technical experts and… more
- Amentum (Fort Meade, MD)
- …recommendations for the resolution or computer security incidents and vulnerability compliance. * Experience creating and presenting documentation and management ... reports. **Clearance Required:** * TS/SCI with Poly **Minimum Education:** * A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for four (4) years' experience. * DoD 8570.1 compliant IAM Level III… more
- Themis Insight (Laurel, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Producability, etc.) + Establish and follow a ... formal procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces Individual Capabilities/Experience Required: + Fourteen (14) years experience as a SE in programs and contracts of similar scope,… more
- Walmart (Bentonville, AR)
- …risk associated with key business solutions + Providing security and vulnerability remediation expertise to technology stakeholders and partners + Mentoring and ... sharing knowledge with other security practitioners and technology stakeholders + Assist in the implementation of advanced security technology solutions by conducting feasibility studies, proof of concept, product comparison, and/or optimization analyses;… more
- Amentum (Baltimore, MD)
- …Control), and least privilege principles. * Support incident response and vulnerability management processes through root cause analysis, patching, and continuous ... improvement of security posture. * Document and maintain operational runbooks, playbooks, and system diagrams to promote transparency, consistency, and knowledge sharing across the team. * Continuously evaluate and improve automation, monitoring, and security… more
- CNO Financial Group (Carmel, IN)
- …enhancements + Leading results analysis of information technology audits and vulnerability reviews, including penetration tests and security design reviews of ... network infrastructure and applications + Interfacing with all levels within IT, up to and including the CIO. Will also have business stakeholder interactions and visibility up to and including the Senior Leadership Group and the Executive Leadership Group. +… more
- IT Concepts (Tampa, FL)
- …on-prem environments + Support continuous monitoring (ConMon) activities and vulnerability remediation + Review and approve security configurations, policies, and ... procedures + Advise senior leadership on cybersecurity posture, risk acceptance, and mitigation strategies + Participate in technical reviews, architecture sessions, and government working groups + Mentor junior cybersecurity personnel and provide subject… more
- Parsons Corporation (Centreville, VA)
- …+ Rapidly prototyping new technologies to exploit target systems + Performing vulnerability research on hardened systems **Required Skills:** + Must have a **Top ... Secret or higher security clearance** + BS degree in Computer Science/Information Sciences or related discipline; will consider experience in lieu of degree + Minimum of 8 years of experience relevant to the duties outlined above + Have knowledge of embedded… more
- Noblis (Arlington, VA)
- …general categories of analytic quantitative assessment, including: + Threat and Vulnerability Assessments, + Basic Challenge Sources, + Attack Characterization, + ... Atmospheric Transport Dispersion Modeling, + NC3 Equipment, + AF Operations, Risk Assessment/Management, + Hazard Modeling and Analysis, + Detector Capability Analysis, + Nuclear Weapons and Nuclear Operational Conditions Research and Development. Required… more
- Citigroup (Irving, TX)
- …and rest and in transit between all compute boundaries + ** Vulnerability Management:** Proactively monitor GCP environments for vulnerabilities, manage threat ... detection, and ensure prompt response to potential security incidents. + **Cross-Functional Collaboration:** Work closely with engineering, development, SRE, and operations teams to enforce security policies and integrate security best practices into the… more
Recent Jobs
-
Backend Engineer
- Robert Half Technology (Bellevue, WA)
-
Upper Level Math & Science Instructors
- Sylvan Learning (Richardson, TX)
-
Sr Director Partnership Growth - US Based Remote
- Anywhere Real Estate (Houston, TX)
-
Server- Bob's Steak and Chop House Part Time
- Omni Hotels (Fort Worth, TX)