- NVIDIA (Santa Clara, CA)
- …on RTL, emulation, and silicon. + Run simulations to analyze Architectural Vulnerability Factor and Liveness of on-die memory, flip-flops, and latches. + Develop ... CUDA software diagnostics kernels for to run on clusters of NVIDIA GPUs and identify potential hardware issues. + Develop and automate fault models to simulate various fault types (eg, transient faults, stuck-at faults) in gate-level netlist, RTL,… more
- Insight Global (Fort Meade, MD)
- …Bluetooth, Cellular, and emerging technologies) to identify vulnerabilities. Conduct vulnerability assessments of RF-enabled devices and systems; assist in ... exploiting RF vulnerabilities. Collaborate with cyber teams to integrate RF-related vulnerabilities into operational plans. Prepare clear, concise technical reports documenting findings, analyses, and recommendations. Maintain detailed records of RF spectrum… more
- Lentech, Inc (Hanover, MD)
- …tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team dedicated to protecting our ... country's most valuable assets? Lentech Inc. is a boutique engineering firm that specializes in delivering advanced, mission-focused technical solutions to support our high-profile intelligence community clients. Clearance: Current TS/SCI Poly JOB FUNCTIONS… more
- SpaceX (Hawthorne, CA)
- …Secure/authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success here. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an interplanetary… more
- Callen-Lorde Community Health Center (New York, NY)
- …organization's cybersecurity program, including policies, controls, incident response, vulnerability management, and regulatory compliance (HIPAA, HITECH, OMNIBUS). ... + Assess cybersecurity and infrastructure risks and present readiness, mitigation strategies, and remediation plans to senior leadership. + Evaluate vendor performance, contracts, SLAs, and cost effectiveness; develop strategies to reduce vendor dependency and… more
- Panasonic North America (Hoffman Estates, IL)
- …across the application portfolio **Security Assessment and Testing** - Conduct vulnerability assessments and penetration testing on MES applications - Identify and ... document security vulnerabilities and recommend remediation strategies - Implement and maintain security testing tools and methodologies **Security Architecture and Design** - Help design and implement secure architecture for manufacturing software systems -… more
- Nightwing (MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a cleared Full time Technical… more
- Google (Kansas City, MO)
- …worker injuries and security incident investigations. Perform straightforward Threat, Vulnerability and Risk Assessments (TVRA). + Implement established compliance ... processes aligned with Cyber Security Risk Management (CSRM) policies, standards, guidelines, and relevant legal or regulatory requirements. + Manage the security-related costs through budget, forecasting and invoice control for the assigned campus, and assist… more
- CACI International (Fort Meade, MD)
- …Perform technical security assessments of computing environments to identify points of vulnerability , and then recommend mitigation strategies for those that do not ... comply with established Information Assurance (IA) standards. **You'll Bring These Qualifications:** + Bachelor's (BA) degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college… more
- Vanguard (Chesterbrook, PA)
- …areas (eg, applications, cloud, network, cybersecurity, access control, vulnerability management, automation and artificial intelligence). + Exceptional ... relationship-building and communication skills, with the ability to influence, persuade, and present findings and insights to senior technology leaders with confidence and clarity. + Proven success in complex, fast-paced environments with strong project… more