- Antech Diagnostics (Oak Brook, IL)
- …well as threat modeling, attack-route analysis, application testing and vulnerability management related to security architecture designs. + Experience communicating ... complex security concepts effectively (technical, non-technical and executive level audiences). + Relevant certifications such as CISSP, GIAC Defensible Security Architecture, CISA or Security+. + Cloud security architecture or related certifications in Azure,… more
- Humana (New York, NY)
- …many of the following in each day: + Conduct threat, risk and vulnerability assessments ahead of planned events or travel; develop cost-effective countermeasures and ... other risk mitigations to fill identified gaps + Liaise with physical security team and/or security contractors to ensure appropriate security measures and technology are available for deployment + Investigate threats to associates; identify and implement… more
- Convey Health Solutions (Fort Lauderdale, FL)
- …secure software development lifecycle, static and dynamic analysis tools and vulnerability remediation + Hands on experience architecting and building large scale ... data processing infrastructure + Experience in designing and implementing data ingestion routines and parsers to extract, transform, and load data from various sources + Proficiency with data integration techniques, data mapping, and data transformation… more
- MUFG (Jersey City, NJ)
- …of DevSecOps principles and best practices, including secure coding, vulnerability management, and compliance. + Experience with advanced deployment approaches ... such as blue-green and canary deployments, feature flags, automated rollbacks, etc. + Strong scripting and automation skills using tools such as Ansible, Python, Bash, or PowerShell. + Experience with Agile methodologies and project management tools like Jira… more
- Oracle (Abilene, TX)
- …as resourcing demands. + Ensures that the Security Systems Team completes all vulnerability tasks in a timely manner. + Manages hardware swap-out and EOL replacement ... programs. + Has an active role in the overall management of all providers, participating in all QBR / ABR programs. + Works closely with Global Service Teams, providing 2nd / 3rd line support as required. + Performs additional functions as directed by the Data… more
- General Dynamics Information Technology (Fairfax, VA)
- …DWaaS + Support for **incident reports, root cause analysis, and vulnerability reports** related to database access + **Performance Outcomes** + High-availability, ... secure Snowflake operations with measurable improvements in **performance, cost efficiency, and reliability** + Timely delivery of operational documentation, metrics, and remediation actions supporting EDW governance **REQUIRED EXPERIENCE** + Strong experience… more
- Alaka'ina Foundation Family of Companies (Fort Belvoir, VA)
- …acquisition and contracting strategy documentation and communications + Provides security/ vulnerability assessments and input to program protection plans + ... Coordinates with the Project Manager and/or Quality Assurance Manager to ensure adequate design specifications and associated documentation and problem resolution for problem reports REQUIRED DEGREE/EDUCATION/CERTIFICATION: + Must have a Bachelor's degree +… more
- Lockheed Martin (Liverpool, NY)
- …network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. Excellent written and verbal communication skills, with the ... ability to effectively interface with numerous cognizant security agencies, customers, and senior leadership\. Proven knowledge of the DCSA Assessment and Authorization Process Manual \(DAAPM\), Joint Special Access Program Implementation Guide \(JSIG\), and… more
- Softchoice (CA)
- …a security architecture as it relates security incident management, threat & vulnerability management to include market leading SIEM & SOAR event management ... platforms + Help customers define best practices and key processes and systems to provide guidance on SecOps best practices and efficiencies + Facilitate C-level conversations to enhance understanding of security and bring alignment at customers to specific… more
- GovCIO (Kearneysville, WV)
- …devices,serversand endpointsin accordance withSTIGs and RMF requirements + Conduct vulnerability scans (eg, ACAS, SCAP), analyze findings and remediate security ... issues tomaintainsystem accreditation + Develop andmaintaindetailed network documentation, including architecture diagrams, configuration baselinesand change control records + Support RMF lifecycle activities by preparing and updating accreditation artifacts… more