• Security Software Engineer - Top Secret Clearance

    SpaceX (Hawthorne, CA)
    …Secure/authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success here. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an interplanetary… more
    SpaceX (12/18/25)
    - Related Jobs
  • Director, Infrastructure Operations

    Callen-Lorde Community Health Center (New York, NY)
    …organization's cybersecurity program, including policies, controls, incident response, vulnerability management, and regulatory compliance (HIPAA, HITECH, OMNIBUS). ... + Assess cybersecurity and infrastructure risks and present readiness, mitigation strategies, and remediation plans to senior leadership. + Evaluate vendor performance, contracts, SLAs, and cost effectiveness; develop strategies to reduce vendor dependency and… more
    Callen-Lorde Community Health Center (12/18/25)
    - Related Jobs
  • Product Security Engineer

    Panasonic North America (Hoffman Estates, IL)
    …across the application portfolio **Security Assessment and Testing** - Conduct vulnerability assessments and penetration testing on MES applications - Identify and ... document security vulnerabilities and recommend remediation strategies - Implement and maintain security testing tools and methodologies **Security Architecture and Design** - Help design and implement secure architecture for manufacturing software systems -… more
    Panasonic North America (12/18/25)
    - Related Jobs
  • Technical Instructor SME - Radio Frequency…

    Nightwing (MD)
    …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a cleared Full time Technical… more
    Nightwing (12/18/25)
    - Related Jobs
  • Google Security Manager, Data Centers (English)

    Google (Kansas City, MO)
    …worker injuries and security incident investigations. Perform straightforward Threat, Vulnerability and Risk Assessments (TVRA). + Implement established compliance ... processes aligned with Cyber Security Risk Management (CSRM) policies, standards, guidelines, and relevant legal or regulatory requirements. + Manage the security-related costs through budget, forecasting and invoice control for the assigned campus, and assist… more
    Google (12/18/25)
    - Related Jobs
  • Information Systems Security Engineer (Multiple…

    CACI International (Fort Meade, MD)
    …Perform technical security assessments of computing environments to identify points of vulnerability , and then recommend mitigation strategies for those that do not ... comply with established Information Assurance (IA) standards. **You'll Bring These Qualifications:** + Bachelor's (BA) degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college… more
    CACI International (12/18/25)
    - Related Jobs
  • IT Audit Director

    Vanguard (Chesterbrook, PA)
    …areas (eg, applications, cloud, network, cybersecurity, access control, vulnerability management, automation and artificial intelligence). + Exceptional ... relationship-building and communication skills, with the ability to influence, persuade, and present findings and insights to senior technology leaders with confidence and clarity. + Proven success in complex, fast-paced environments with strong project… more
    Vanguard (12/18/25)
    - Related Jobs
  • Global Head Security Risk and Compliance

    Rogers Corporation (Chandler, AZ)
    …systems, business operations, and facility defenses against security breaches and vulnerability issues. This individual is also responsible for auditing existing ... systems, while directing the administration of security policies, activities, and standards. Essential Functions: * Participate as a member of the senior management team in governance processes of the organization's security strategies. * Lead strategic… more
    Rogers Corporation (12/18/25)
    - Related Jobs
  • Penetration Tester, Senior

    BOOZ, ALLEN & HAMILTON, INC. (San Antonio, TX)
    …Carbon Black, Tenable, EDR platforms, and MYSP. Through penetration testing, vulnerability assessments, risk analysis, and ongoing threat monitoring, you'll work ... with multiple stakeholders to evaluate risk and deliver meaningful, actionable recommendations. You'll oversee the monitoring of security environments and identify gaps by viewing systems through the mindset of an adversary. In this role, you'll influence… more
    BOOZ, ALLEN & HAMILTON, INC. (12/18/25)
    - Related Jobs
  • Technical Project Manager - IT Infrastructure…

    PCI Pharma Services (Philadelphia, PA)
    …(Agile/Hybrid/Waterfall). Drive cybersecurity initiatives such as SOC enablement, vulnerability management, endpoint protection, and incident response readiness. ... Prepare and maintain project documentation, status reports, and executive communications. Support audits, validation activities, and compliance assessments related to IT and cybersecurity systems. Performs other duties as assigned by Manager/Supervisor.… more
    PCI Pharma Services (12/18/25)
    - Related Jobs