- Nightwing (Arlington, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a Logistics & Support Analyst to join… more
- Sutter Health (Los Altos, CA)
- …and/or drive positive outcomes. * Identifies areas of non-compliance or vulnerability , developing, recommending and implementing corrective action plans to address ... or minimize risk. * Keeps leadership informed of operations, and escalates complex issues requiring higher level direction. PLANNING: * Identifies ways to improve work processes, enhance quality, productivity, and service delivery. * Participates in… more
- Honeywell (Phoenix, AZ)
- …of the larger team include identifying security requirements, threat modelling, vulnerability analysis and penetration testing of aerospace products. Our Advanced ... Cyber Security Engineer will work directly alongside our Sr. Cyber Security Manager on a hybrid schedule out of our Phoenix, AZ site. **Key Responsibilities:** . Execute product security process activities including threat modelling, security requirements… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …security tools, including Splunk Enterprise Security (ES), firewalls, EDR/XDR, vulnerability scanners, threat intelligence platforms, and ticketing systems via API ... and custom app development. + Managing and optimizing data flow between Splunk ES and Splunk SOAR, ensuring security events and alerts trigger appropriate and effective automation actions. + Creating custom apps/integrations for Splunk SOAR to connect with… more
- Motion Recruitment Partners (Dallas, TX)
- …enterprise LAN/WAN/WLAN infrastructures + Experience conducting security assessments, vulnerability scans, and incident response + Strong documentation, ... communication, and problem-solving abilities **Desired Skills & Experience** + Certifications such as CCNA, CCNP, CCIE, CISSP, CISM, CEH, Security+, Network+ Experience with Azure/AWS networking or security + Knowledge of SD-WAN, NAC solutions (Cisco ISE),… more
- Oracle (Jackson, MS)
- …Maintain secure development practices: signed artifacts, change control, auditability, vulnerability management, and compliance with Oracle policies. Scope and ... ownership + Domain ownership within NOS (eg, datapath feature area, on-box telemetry, or a control plane agent), not the entire program. + Operates with an M5+ manager/architect for strategy; focuses on execution excellence, team health, and local technical… more
- CGI Technologies and Solutions, Inc. (Fairfax, VA)
- …are a plus. * Security best practices (IAM hardening, encryption, patching, vulnerability management). * Strong communication and teamwork skills. * Ability to adapt ... to a dynamic and changing environment. Desired qualifications/non-essential skills required: * AWS Administration * Scripting and automation CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role.… more
- Lockheed Martin (Moorestown, NJ)
- …of large combat systems software development * Familiarity with cybersecurity vulnerability assessments * Comfort and ability working on physical lab equipment ... * Ability to work independently, troubleshoot, problem\-solve with support as needed * Ability to work well in a team environment **Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for… more
- CACI International (Fort Gordon, GA)
- …Get to Do: + Conduct all-source and specialized intelligence analysis and vulnerability assessment support on adversary UAS operations within the CENTCOM AOR in ... support of Fusion analytical efforts. + Provide multi-faceted analysis that integrates existing national-level products and databases to define patterns of threat and UAS network activities. + The C-UAS Intelligence Analysts must have an expert understanding… more
- MIT Lincoln Laboratory (Lexington, MA)
- …works to understand air defense issues, in particular, air vehicle survivability, vulnerability of US Air Force (USAF) aircraft to weapons systems, electronic ... countermeasures, and air surveillance for homeland defense. The group focuses on understanding USAF and threat air defense systems through tests and measurements. Test activities include flight, field, and laboratory testing. The group operates two airplanes,… more