- CGI Technologies and Solutions, Inc. (Bethesda, MD)
- …of digital storage devices. . Conduct reverse engineering, failure analysis, vulnerability analysis, and other research techniques to understand complex hardware ... systems, assess the functionality of components, and identify exploitation opportunities. . Alter hardware components to facilitate forensic analysis of the media or to adjust the functionality of the hardware to meet specific objectives. . Perform inspection,… more
- The Davey Tree Expert Company (Louisville, KY)
- …specific restoration solutions + 3D design in Autodesk Civil 3D + Flood vulnerability assessment of restoration design using 2D hydrodynamic models + Development of ... concept level, permit ready and constructible project drawings + Creation and use of high-resolution topographic datasets + Contributing to project proposals, mitigation plans, reports and presentations **Qualifications** REQUIRED: + Bachelor's degree in… more
- CGI Technologies and Solutions, Inc. (Knoxville, TN)
- …testing of the implementation. Responsible for tracking and managing and vulnerability fixes of all open-source products being used on the implementation. ... Responsible to define and create operations strategy and support manuals for the AI solutions being implemented on the Pulse AI platform. Responsible for setting up Monitoring and Alerting of AI Solution Accuracy and Performance drifts. **Required… more
- Three Saints Bay (Austin, TX)
- …Critical Program Information (CPI) assessments, critical functions assessments, vulnerability assessments, risk analyses, and countermeasures determinations. + ... Research, analyze, interpret, evaluate, and integrate extremely complex all-source intelligence data pertaining to order of battle, force structure, strategic and conventional military capabilities and key military leadership. + Executive level oral and… more
- Serco (Kirtland AFB, NM)
- …network devices and configurations. + Conduct regular security assessments and vulnerability scans to identify and address potential security weaknesses. + Stay ... up to date on the latest cybersecurity threats and vulnerabilities, and implement appropriate countermeasures. + **Specialized Equipment Management:** + Configure, maintain, and troubleshoot TACLANE encryptors to ensure secure data transmission across… more
- Link Solutions Inc (White Sands Missile Range, NM)
- …Collaborate with IT and Cybersecurity teams to support remediation, patching, and vulnerability scanning efforts. Please note this job description is not designed to ... cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. + Must be a US Citizen. + Must have an active DoD Top Secret Clearance + Ten (10+) years of relevant experience or a BA/BS… more
- Nordstrom (Seattle, WA)
- …understanding of secure software development practices, threat modeling, and vulnerability management. + Experience with security assessment tools and platforms, ... including AI-enhanced solutions. + Familiarity with cloud-native architectures, APIs, and modern development frameworks. + Excellent communication skills and ability to influence cross-functional teams. + Certifications such as CISSP, OSCP, or CSSLP are a… more
- AECOM (Dallas, TX)
- …treatment plants. + Analyzing water main replacement needs and conducting water vulnerability and emergency response assessments. This position demands a high level ... of expertise, attention to detail, and commitment to ensuring the safety and sustainability of vital water infrastructure. **Qualifications** **Minimum Qualifications:** + BA/BS + 8 years of related experience or demonstrated equivalency of experience and/or… more
- Applied Research Solutions (Bedford, MA)
- …contingency plans and disaster recovery procedures. + Experience with compliance and vulnerability and software scanning tools (STIGs, Nessus, ACAS, SCC/ SCAP, etc.) ... to include the review and creation of mitigation reports. + Review the Vendor submitted Contract Data Requirement List (CDRL) items for Cybersecurity related areas, to ensure technical requirements have been met, and provided substantial comments and… more
- American Express (Phoenix, AZ)
- …on automation testing and enterprise rerouting projects + Assist with vulnerability assessments, remediation tracking, and implementation of security best practices ... + Support disaster recovery planning and execution, ensuring systems meet corporate continuity standards + Monitor Symantec DLP systems and respond to alerts to prevent unauthorized data transmission + Conduct risk analysis and enforce enterprise data handling… more