- SpaceX (Hawthorne, CA)
- …Secure/authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an inter-planetary scale,… more
- L3Harris (Palm Bay, FL)
- …to include experience with networking equipment; experience interpreting vulnerability scanning results; experience reviewing workstation, server, firewall, & ... IPS logs; experience with SIEM tools + Experience as an ISSO managing cybersecurity on classified systems under multiple agencies' JSIG, NISPOM Ch8, ICD 503, and/or NIST 800-53 implementations Preferred Additional Skills: + Flexibility to adjust to changing… more
- Caris Life Sciences (Irving, TX)
- …and implementation + Experience with security scanning tools (SAST/DAST) and vulnerability management + Understanding of compliance frameworks (HIPAA, SOC 2, etc.) ... + Proficiency in implementing security protocols (OIDC/OAuth 2.0, encryption) + Version control systems (Git) and collaborative development workflows + Monitoring and alerting platforms (Grafana, Sentry, Datadog, NewRelic) + Infrastructure automation and… more
- Lockheed Martin (Orlando, FL)
- …and network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. \- Proven experience in executing security hardening on ... Windows and RHEL operating systems, utilizing approved DISA STIGs and SRGs, and implementing NIST SP 800\-53 security controls to ensure compliance with industry standards\. \- Proven knowledge of the DCSA Assessment and Authorization Process Manual \(DAAPM\),… more
- OCT Consulting, LLC (Suitland, MD)
- …candidate will be proficient in key areas of security such as: Vulnerability Management, Intrusion Prevention and Detection, Access Control and Authorization, Policy ... Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption, Two-Factor Authentication, Web filtering, and Advanced Threat Protection. Responsibilities will include, but are not limited… more
- ManTech (Fort Meade, MD)
- …intelligence organizations. Based upon this analysis, provide impact and vulnerability assessments, recommendations, and countermeasures to threats. + Collect, ... analyze and interpret open-source intelligence (OSINT) data across multiple collection platforms and fuse OSINT with classified intelligence to develop rigorously objective in-house evaluations of the foreign intelligence threat - to include potential foreign… more
- JPMorgan Chase (Plano, TX)
- …IBM software maintenance by running SYSMOD reports, managing HIPER and system vulnerability fixes and responding to HOLDDATA actions required + Perform on-call ... duties within on on-call shift rotation across a global and diverse team, providing daily turnover and management updates + Collaborate with IBM and other infrastructure software vendors on high priority incidents, abnormal system behaviors and tuning… more
- JPMorgan Chase (Columbus, OH)
- …security needs and recommend business modifications during periods of vulnerability . **Required qualifications, capabilities, and skills** + Formal training or ... certification on Engineering and/or Cybersecurity concepts and 5+ years applied experience as a cloud engineer, deployment engineer, DevOps engineer, or equivalent role. + Experience with cloud engineering, deployment engineering, DevOps engineering, or… more
- CAE USA INC (Arlington, TX)
- …Firewalls, Data Protection Controls, + Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG). + Continuous Monitoring . Patch/STIG . ... Annual ATO Package Review . Peer Reviewing program security documents. + Attending and presenting in Design reviews, Program Meetings, Technical Interchange Meetings and IPT meetings. + Assist in compliance monitoring. Reviewing, evaluating and updating STIG… more
- Rubrik (Columbia, SC)
- …and aid investigation when needed; + Support controlled changes and vulnerability remediation activities; and + Work collaboratively with Information Security in ... designing, implementing, assessing or enhancing system-specific security and privacy controls. **Position Risk Designation** section: This position carries duties and responsibilities involving the US Federal Government's interests. The selected incumbent may… more