• Information Security System Engineer

    L3Harris (Greenville, TX)
    …Sensor Infrastructure team. The ideal candidate possesses experience with vulnerability scanning, compliance, and ATO documentation. Familiarity with requirements ... the mission system development lifecycle. + Perform security compliance scans, vulnerability analysis, and drive identified issues resolution. + Develop and maintain… more
    L3Harris (10/12/25)
    - Related Jobs
  • Cybersecurity Engineer

    University of Maine System (Orono, ME)
    …security policies and controls across the enterprise. + Conduct risk and vulnerability assessments for networks and computing systems. + Analyze and integrate ... working with routing, TCP/IP, Internet/Intranet, network security/firewalls and encryption, vulnerability management, and a variety of operating systems. +… more
    University of Maine System (10/11/25)
    - Related Jobs
  • ServiceNow Developer (Cybersecurity)

    Insight Global (Des Plaines, IL)
    …stakeholders to determine the requirements and goals for the SecOps and Vulnerability Response module. * Help design a scalable, robust ServiceNow SecOps ... SecOps module. * Define and develop integrations with external systems like vulnerability scanners, ticketing systems, and SIEM solutions. * Implement the design by… more
    Insight Global (10/08/25)
    - Related Jobs
  • Information Systems Security Engineer (ISSE)…

    Watershed Security (Philadelphia, PA)
    …an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by ... with established security policies and standards. + Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to… more
    Watershed Security (01/02/26)
    - Related Jobs
  • Information Systems Security Engineer (ISSE)…

    General Dynamics Information Technology (Chantilly, VA)
    …and TCP/IP networking. + Skilled with and/or demonstrated technical aptitude with vulnerability and risk assessment tools such as Elasticsearch or Splunk SIEMs, ... & Authorization (A&A) + Support continuous monitoring activities + Support vulnerability scans and remediation + Ensure secure baseline configurations are applied… more
    General Dynamics Information Technology (01/02/26)
    - Related Jobs
  • Senior Cyber Security Specialist, Threat Hunt

    Southern California Edison (Rosemead, CA)
    …hunt for those across the SCE environment. + Use understanding of Vulnerability Exploitation to Hunt for Evidence of exploitation of emerging vulnerabilities. + ... systems and network appliances. **Responsibilities** + Performs security risk, vulnerability assessments, and business impact analysis for medium complexity… more
    Southern California Edison (01/02/26)
    - Related Jobs
  • Sr. Navy Qualified Validator ( NQV)

    Watershed Security (Philadelphia, PA)
    …networks, and information. This position involves conducting risk and vulnerability assessments, ensuring proper accreditation procedures are followed, and ... confidentiality, integrity, and availability of systems + Conducting risk and vulnerability assessments + Ensuring proper accreditation procedures are followed +… more
    Watershed Security (01/01/26)
    - Related Jobs
  • Lead Software Engineer

    Mastercard (O'Fallon, MO)
    …Familiar with secure coding standards (eg, OWASP, CWE, SEI CERT) and vulnerability management Has skills in building applications using open frameworks to achieve ... others) Able to configure rules and build automation for code with vulnerability scanning and software composition analysis using standard tools (eg, Sonar,… more
    Mastercard (01/01/26)
    - Related Jobs
  • Systems Engineer - Cyber Security

    Penske (Reading, PA)
    …analysis * IDS/IPS configuration and analysis. * SSO Infrastructure * Network Vulnerability Scanning * Advanced User Authentication Structures * OS Hardening and ... Security * Application vulnerability scanning * Networking TCP/IP and packet capture applications * Endpoint Protection solutions * Encryption Technology * Good… more
    Penske (01/01/26)
    - Related Jobs
  • Microsoft SQL Database Administrator

    Leidos (Suitland, MD)
    …issues with precision. + Implement and maintain security policies, conduct vulnerability analyses, and develop system documentation. + Partner with network, system, ... re‑accreditation efforts, including DISA STIG reviews, system upgrades, and vulnerability remediation. + Communicate effectively across diverse teams, bridging… more
    Leidos (01/01/26)
    - Related Jobs