- JPMorgan Chase (Houston, TX)
- …understand security needs and recommend business modifications during periods of vulnerability + Conducts discovery, vulnerability , penetration testing, and ... Application Resiliency, and Security + Experience with threat modeling, discovery, vulnerability , and penetration testing + In-depth knowledge of the financial… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... Responsibilities:** **Full-spectrum cyber operations, offensive and defensive cyber operations** ** Vulnerability research, and exploit development** **Malware analysis** **Network protocol… more
- L3Harris (Clifton, NJ)
- …and delivery of security architecture improvements, obsolescence replacements, and vulnerability response projects. + Provide Security Testing and Verification. + ... and delivery of security architecture improvement, obsolescence replacement and vulnerability response projects. + Provide Security Testing and Verification. +… more
- Actalent (Vancouver, WA)
- …+ Management of Windows Server & REHL operating systems. + Cyber Vulnerability Assessment and Mitigation Research. + Patch Management in an enterprise environment. ... systems devices and various software packages. Document patch and vulnerability applicability assessments and recommend vulnerability mitigation options.… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …threats to information technology and operational technology and assess the vulnerability and risk to assets. Selected candidates will apply in-depth knowledge ... knowledge of Department of Warfare's Information Assurance + Experience in Vulnerability Alert processes + Working knowledge of Computer Network vulnerability… more
- Oracle (Nashville, TN)
- …of evolving global regulatory requirements, security frameworks, and emerging vulnerability management trends to ensure Oracle's continued leadership in security ... such as CISSP, CISM, CISA preferred. + 7+ years' experience in vulnerability management, compliance, or enterprise security operations, preferably in a large global… more
- Amazon (Sunnyvale, CA)
- …Develop and interpret policies and procedures. Optimize and enhance existing vulnerability management processes and reduce operational overhead. Develop and deliver ... hands-on experience with information security technologies including: (a) OS vulnerability management platforms; (b) intrusion detection/prevention, (c) access control,… more
- OCT Consulting, LLC (Washington, DC)
- …security architectures for predictive threat detection and response. * Conduct vulnerability assessments. * Manage Configuration Management (CM) and control. * ... 800-53, STIGs, Security Content Automation Protocol (SCAP), Information Assurance Vulnerability Alerts (IAVAs), and Federal Information Security Management Act… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …threats to information technology and operational technology and assess the vulnerability and risk to assets. Selected candidates will apply in-depth knowledge ... of Warfare's information assurance policies and procedures + Experience in Vulnerability Alert processes + Working knowledge of Computer Network vulnerability… more
- Cognizant (Auburn Hills, MI)
- …and defense-in-depth strategies; oversee safety validation, penetration testing, vulnerability management, and incident response planning. - Stakeholder Engagement: ... TARA** Ability to perform Threat Analysis and Risk Assessment, vulnerability identification, and mitigation planning. Advanced **Regulatory Compliance** Ensure… more