- AbbVie (North Chicago, IL)
- …and deployment processes. + Utilize existing enterprise tools dedicated to vulnerability management, asset inventory, and cyber hygiene to ensure that all ... assets meet established security baseline requirements + Develop custom integrations using APIs or other scripting tools for high-risk applications to enable proactive monitoring of critical security controls + Lead posture and hygiene efforts to effectively… more
- BigBear.ai (Hanover, MD)
- …and infrastructure deployment tools. + Ability to perform system startup & shutdown, vulnerability scans, and patch management on Linux and Windows. + Skilled in ... creating/updating documentation and diagrams (System Security Plans, Security CONOPS, FAQs, How To's). + Maintain current documentation with minimal supervision. + Excellent time management skills for multitasking and prioritization About BigBear.ai BigBear.ai… more
- ManTech (Fort Meade, MD)
- …System Security Plans (SSPs) for both new and existing systems + Analyze vulnerability scan results and collaborate with system owners to implement remediation + ... Leverage sponsor tools such as Gatekeeper, Xacta, SEAR, and LatteArt in daily operations **Minimum Qualifications:** + Bachelor's degree with 15 years of ISSO related experience OR 4 additional years of related experience as an ISSO might be substituted for a… more
- American Water (Camden, NJ)
- …enterprise-class security tools and platforms (SIEM, SOAR, EDR, IAM, vulnerability management). * Experience/Education* * Bachelor's degree in Cybersecurity, ... Computer Science, Information Systems, or related field; or equivalent professional experience. * Appropriate technical certification in specialty area preferred. * Minimum of 5 years of professional experience in Information Technology operations. * Minimum 2… more
- Truist (Wilson, NC)
- …patterns, mutual TLS (mTLS), service mesh (eg, Istio or Linkerd), and container vulnerability scanning tools. + 6+ years of experience in software engineering, with ... a strong track record of enterprise-scale service delivery in production environments. + Expert-level proficiency in Java and Python, with demonstrable experience building services deployed on Kubernetes using Helm and declarative configurations. + Experience… more
- Regions Bank (Charlotte, NC)
- …security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication. This position will develop ... and manage strategic relationships with senior leaders across the enterprise to incorporate cyber security tools and resources into business operations. **Primary Responsibilities** + Creates strategy influencing business methods and integrated security… more
- PNC (Miamisburg, OH)
- …QA mock deployments, troubleshooting, testing, change request prep, address vulnerability findings, and any other aspects of maintaining applications readiness. ... Technical Skills: * ETL Informatica, API Services * Dynatrace, ServiceNow, Jira, Big Panda, uDeploy, Jenkins, BitBucket, SQL Developer, OCP (OpenShift Container Platform) * SQL, .NET, C# * Exadata, Mong, Oracle PNC will not provide sponsorship for employment… more
- BAYADA Home Health Care (Pennsauken, NJ)
- …and ongoing risk assessments + Monitor and identify potential areas of compliance vulnerability and risk; provide advice on corrective action plans for resolution of ... problematic issues; provide general guidance on how to avoid or deal with similar situations in the future. + Review external regulatory and accreditation audit requests; guide Compliance team responses and appeals; and collaborate with other enterprise… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …+ Gain hands-on experience supporting ongoing security projects, such as vulnerability scanning, code analysis, security awareness training, and incident response ... exercises. + Deliver high-quality work in a fast-paced, dynamic work environment by managing time and effort across multiple projects. + Perform other cybersecurity-related duties as assigned, which may include assisting with security audits, compliance… more
- AeroVironment (Jessup, MD)
- …and research. + Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. + Develop innovative tradecraft, exploitation ... techniques, and concepts of operation. + Leverage knowledge of AMOD and proficiency in AMOD tools. + Work closely with operators and partners to effectively analyze and process intelligence information. + Provide subject matter expertise to not only the… more