• Cyber Blue Team Analyst

    Applied Research Associates, Inc. (Fort Belvoir, VA)
    …threats to information technology and operational technology and assess the vulnerability and risk to assets. Selected candidates will apply in-depth knowledge ... of Warfare's information assurance policies and procedures + Experience in Vulnerability Alert processes + Working knowledge of Computer Network vulnerability more
    Applied Research Associates, Inc. (12/20/25)
    - Related Jobs
  • Functional Safety/Cyber Security Manager

    Cognizant (Auburn Hills, MI)
    …and defense-in-depth strategies; oversee safety validation, penetration testing, vulnerability management, and incident response planning. - Stakeholder Engagement: ... TARA** Ability to perform Threat Analysis and Risk Assessment, vulnerability identification, and mitigation planning. Advanced **Regulatory Compliance** Ensure… more
    Cognizant (12/19/25)
    - Related Jobs
  • Sr. Information Security Engineer

    Bandwidth (Raleigh, NC)
    …understanding of the utilization of various security tools include SIEM, SOAR, vulnerability scanners, CSPM, and EDR + Advanced understanding of securing both ... with corporate information, security policy and standards + Drive vulnerability management and remediation efforts - prioritizing issues, implementing mitigations,… more
    Bandwidth (12/19/25)
    - Related Jobs
  • Sr. Manager, Information Security

    Dairy Farmers of America (Kansas City, KS)
    …leadership and strategic oversight for security engineers, including Vulnerability Management, Operational Technology Security, Endpoint Security, Email Security, ... reduction, and compliance. Ensure metrics provide clear insights into vulnerability management progress, incident response efficiency, tool utilization, and team… more
    Dairy Farmers of America (12/19/25)
    - Related Jobs
  • IT Security Analyst

    GCG (OH)
    …are seeking an IT Security Analyst to support monitoring, threat detection, vulnerability management, and day-to-day security operations. In this role, you'll work ... alerts under the guidance of the Security Manager + Support periodic vulnerability scans, track remediation progress, and document findings + Participate in phishing… more
    GCG (12/18/25)
    - Related Jobs
  • Sr. Penetration Tester, Web/Mobile Apps and Cloud…

    TP-Link North America, Inc. (Irvine, CA)
    …including proficiency in developing custom cloud security tools, advanced vulnerability discovery, and system architecture evaluation, ensuring TP-Link's cloud ... and applications. + Lead incident response activities and perform in-depth vulnerability research, oversee and manage the entire incident response process for… more
    TP-Link North America, Inc. (12/18/25)
    - Related Jobs
  • Information Systems Security Engineer (ISSE) Level…

    Synergy ECP (Annapolis Junction, MD)
    …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... tools and services including project leadership roles. + Providing software vulnerability remediation advice to software developers and software development teams. +… more
    Synergy ECP (12/18/25)
    - Related Jobs
  • Senior Devops Engineer

    System One (Pittsburgh, PA)
    …+ Code Quality, Standards and Sonar Scan remediation. + Infrastructure and Vulnerability management. + Deep expertise in CI/CD tooling, scripting, cross functional ... and operation consistency. + Support and execute Change Request. + Infrastructure Vulnerability management. Collaborate with enterprise and run the bank team to… more
    System One (12/18/25)
    - Related Jobs
  • Supervisor Information Security

    Rogers Corporation (Chandler, AZ)
    …Log Aggregation/SIEM, DLP technologies and configurations, Cloud Protection/CASB technologies, Vulnerability Management platforms- vulnerability tracking and ... vulnerability reporting. * Travel: Up to 10%. Full-Time more
    Rogers Corporation (12/18/25)
    - Related Jobs
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    …Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and ... of offensive or defensive cyber tools and systems, automated vulnerability discovery, reverse engineering, software protection mechanisms, static analysis, and… more
    MIT Lincoln Laboratory (12/17/25)
    - Related Jobs