- KeyBank (Brooklyn, OH)
- …systems + Knowledge of security services such as firewalls, IDS, vulnerability assessment, and authentication + Professional certification (GWAPT, OSWE, BSCP, CISSP, ... or Google Professional Cloud Security Engineer) is desirable Essential Job Function: + Conducts comprehensive application security testing + Participates in application threat modeling and tabletop exercises + Coordinates the development, implementation, and… more
- American Family Insurance - Corporate (Boston, MA)
- …determining scope, urgency, and potential impact, identifying the specific vulnerability . *Builds strong relationships with Peers across functions through ... collaborative engineering operations and initiatives. *Designs and implements automated solutions to enable security needs. *Designs and develops system-security measures to ensure cybersecurity is fully integrated. Validates current and future-state… more
- General Dynamics Information Technology (Mclean, VA)
- …STIGs applied to operating systems, network devices, and applications. + Vulnerability Management: Work with security engineering to proactively identify and assess ... vulnerabilities using tools like Tenable Nessus. Work with system administrators to prioritize and track remediation efforts, ensuring compliance with established timelines. + Network Security & Architecture Review: Conduct in-depth firewall rule reviews,… more
- Virtual Service Operations (Portsmouth, VA)
- …to Citrix and Palo Alto environments. + Contribute to compliance auditing, vulnerability scanning, and risk assessments for Citrix infrastructure. + Support SIEM ... tools (Splunk, ELK, or other SOC tools) by ensuring proper logging of Citrix and firewall events. Requirements + Please note that pursuant to a government contract, this specific position requires US citizenship status + 7 - 9 years of professional experience… more
- RTX Corporation (Fulton, MD)
- …OpenShift + Experience with managing cyber security processes including vulnerability assessments. + Strong communication skills and a collaborative, empathetic ... leadership style. + Background in hiring, onboarding, and building a collaborative team culture. + Active and transferable Secret US government issued security clearance. **What We Offer Benefits** Some of our competitive benefits package includes: + Medical,… more
- Lockheed Martin (King Of Prussia, PA)
- …environments * Experience with automated security testing tools and vulnerability scanning * Knowledge of compliance frameworks, governance requirements, and ... regulatory standards related to information security * Strong analytical and problem\-solving skills with the ability to prioritize and mitigate risk * Excellent collaboration and communication skills across development, operations, and security teams *… more
- GliaCell Technologies (Annapolis Junction, MD)
- …our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent ... Threat. We Offer: + Long term job security + Competitive salaries & bonus opportunities + Challenging work you are passionate about + Ability to work with some amazingly talented people Job Description: GliaCell is seeking a Junior Java Software Engineer on… more
- Improveit Home Remodeling (Columbus, OH)
- …best practices (Zero Trust, endpoint protection, PCI-DSS for call recordings, vulnerability management) + Lead disaster recovery planning and testing, including ... Five9 failover and geographic redundancy Five9 Contact Center Infrastructure Support + Primary infrastructure owner for Five9: SIP trunks, WebRTC, SBCs, QoS, carrier relationships, and integrations with Salesforce + Troubleshoot voice quality, connectivity,… more
- Deloitte (Memphis, TN)
- …GitHub Copilot, including data governance, access management, code scanning, and vulnerability detection. + Build secure CI/CD pipelines for training, tuning, and ... deploying Machine Learning and Generative AI models, embedding security throughout the MLOps lifecycle. + Manage data security through encryption, tokenization, anonymization, and access control for Azure data stores (eg, Azure Storage, SQL Database, Cosmos… more
- Fresenius Medical Center (Lawrence, MA)
- …events (post-market surveillance) within the scope of complaints/incidents and vulnerability management coordination of product related cybersecurity activities . ... Involvement in the definition of policies, SOPs and guidelines for cybersecurity and data privacy . Compiles, maintains, and evolves approved project deliverables. . Communicates project and compliance issues to Quality Systems management and provide solutions… more