- Lockheed Martin (Fayetteville, NC)
- …maintain OS images, and automate routine administrative tasks\. + Review vulnerability ‑scan reports, apply security patches, and maintain compliance with established ... security policies\. + Provide advanced troubleshooting and technical research to resolve complex hardware/software issues and support Special Operations Forces infrastructure\. **Why Join Us** This position supports our Special Operations Forces - Global… more
- TP-Link North America, Inc. (Irvine, CA)
- …management. + Experience with security tools and technologies (eg, vulnerability scanners, SIEM, IDS/IPS). + Outstanding communication, collaboration, and ... problem-solving skills. + Ability to work independently and manage multiple priorities. Additional Skills (Preferred): + Experience in cloud security on AWS, Azure, OCI. + Experience operating and maintaining Palo Alto Networks VM-Series NGFW. + Experience in… more
- Walmart (Bentonville, AR)
- …to recommend best practices and communication strategies to reduce vulnerability collaborating withcross functionalbusiness partners in the development of solutions ... for the division for example policies programs and overseeing the implementation of solutions throughout the divisions facilities + Drivesdivisional leveltalent management by developing and implementing talent plans developing relationships with professional… more
- Synergy ECP (Annapolis, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Reproducibility, etc.) + Establish and follow a ... formal procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces. + Capture all interface designs in a common interface control format, and store interface data in a commonly accessible… more
- WellLife Network (Old Field, NY)
- …journey. Join us in helping lay the foundation for a brighter, more hopeful future-transforming challenges into milestones and vulnerability into resilience. ... Our Child Support Professionals are compassionate, dedicated members of the Community Residence Program team, creating a safe and therapeutic environment for children and adolescents. If you have a caring heart, a commitment to trauma-informed care, and the… more
- Palo Alto Networks (Plano, TX)
- …Execution, Inclusion, and Integrity + Strong understanding of security principals, vulnerability management, and industry best practices + Practical experience with ... public cloud platforms, preferably Azure, Google Cloud, and AWS + Expertise with container technologies, such as Docker + Experience with CI/CD tools, examples include Jenkins, Github Actions, or Gitlab + Expertise in software development, including but not… more
- BOOZ, ALLEN & HAMILTON, INC. (San Antonio, TX)
- …Black, Tenable, and various EDR platforms. Through penetration testing, vulnerability assessments, risk evaluations, and continuous threat monitoring, you'll ... collaborate with multiple stakeholders to identify vulnerabilities and deliver meaningful, actionable recommendations. You'll help monitor security environments and uncover gaps by viewing systems through the mindset of an adversary. In this role, you'll make… more
- Cadence Design Systems, Inc. (San Jose, CA)
- …and high-security R&D environments. + Conduct ongoing threat, risk, and vulnerability assessments based on local geopolitical conditions, crime trends, regional ... regulations, and Cadence's footprint. + Drive consistent implementation of global security standards while adapting appropriately to local laws, norms, and cultural considerations. Operational Excellence & Incident Response + Oversee daily operational… more
- RTX Corporation (Cedar Rapids, IA)
- …and robustness tests to evaluate a products attack surface + Conducting vulnerability assessments of proposed and in-service systems + Embedding with development ... teams to address product security concerns + Developing threat model / data flow diagrams to ensure data can be properly isolated in motion and at rest + Assisting w/ implementing mandatory access controls (MAC) through the development of SELinux policies +… more
- Louisiana Department of State Civil Service (Baton Rouge, LA)
- …dashboards for security anomalies and incidents; + Manage endpoint protection, vulnerability scanning, and remediation processes; + Participate in incident response, ... security audits, and policy development; + Provide advanced technical support and escalation for IT service requests; + Develop and maintain system documentation, SOPs, and configuration baselines; + Train peer IT staff and serve as a subject matter expert in… more