- Nightwing (Lumber Bridge, NC)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Contingent Upon Award of Contract** **Nightwing is… more
- US Bank (Hopkins, MN)
- …**Scrum** and **Kanban** boards + Strong troubleshooting skills, including vulnerability management and release fixes + Knowledge/experience in **AI** technologies, ... including **Co-pilot** solutions and **Agentic** workflows + Willingness to provide production support during core hours, evenings, and weekends, on a **rotating on-call schedule** + Experience managing **QRM** or other large vendor packages in multiple… more
- US Tech Solutions (White Plains, NY)
- …+ Proficiency in cybersecurity technologies, including threat detection, vulnerability management, and incident response. + Excellent leadership, communication, ... and stakeholder management skills. + Strong analytical and problem-solving capabilities. + Ability to manage multiple projects and priorities in a dynamic environment. + Knowledge of Clienture and AI technologies, including large language models and modern… more
- MIT Lincoln Laboratory (Lexington, MA)
- …various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile, or advanced computing systems + Apply ... AI/ML to spectrum analysis and hardware analysis problems The intern will work closely with a mentor from the Cyber Physical Systems Group technical staff. Successful candidates are interested in the inter-disciplinary nature of the cyber-physical problem… more
- SanDisk (Irvine, CA)
- …different stages, including design, threat analysis, implementation, validation, vulnerability testing, certification, and audit. **Qualifications** **REQUIRED:** To ... qualify for this position, an ideal candidate would have/be. + A degree in Computer Science, Electrical/Computer Engineering, Software Engineering, or a related field. + **3+ years of experience** in embedded programming, with proficiency in C/C++ and one or… more
- Systems Technologies, Inc. (Charleston, SC)
- …Support Service (eMASS) and stages of system projects. + Perform threat vulnerability assessments, aid in security test & evaluation, and develop Cybersecurity ... artifacts in support of RMF and DoD standards across the enterprise. + Evaluate, develop, recommend, test, modify, and change system configurations to meet DoD security requirements. QUALIFICATIONS + Prior related work experience in DoD environment SECURITY… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. We're seeking a skilled **Senior Network Engineer** to… more
- Nightwing (Lumber Bridge, NC)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Contingent Upon Award of Contract** Nightwing is seeking… more
- Emory Healthcare/Emory University (Atlanta, GA)
- …Tenable, and CrowdStrike platforms for enhanced security operations and vulnerability management. + Strong documentation and reporting skills, including the ... ability to maintain dashboards, monthly reports, and audit-ready inventory records. + Ability to collaborate effectively with distributed IT teams, departments, faculty, and central OIT groups within a large research or academic environment. NOTE: This role… more
- TekSynap (Washington, DC)
- …unauthorized access, misuse, or destruction. + Provide technical expertise in vulnerability assessments, risk analysis, network defense, and the application of ... cybersecurity controls. + Assist in evaluating customer systems and recommend enhancements to strengthen security posture. + Analyze mitigation strategies to determine their effectiveness in meeting established security requirements. + Balance organizational… more