- NANA Regional Corporation (Huntsville, AL)
- …security controls in CI/CD pipelines. They will also lead monitoring, vulnerability management, system hardening, and compliance tasks, collaborating with IT and ... into CI/CD. + Monitor and investigate SIEM/EDR alerts, perform and track vulnerability scans, apply security baselines, and enforce access controls. + Support… more
- Golden Route Operations (Las Vegas, NV)
- …tactics, forensics, and threats through ongoing research. + Conduct vulnerability assessments to pinpoint weaknesses, evaluate control effectiveness, and coordinate ... testing tools such as Kali, Metasploit, Burp, Wireshark, Nmap, Netcat, and vulnerability scanners. + Preferred: Adept at scripting with PowerShell, automation, and… more
- The MITRE Corporation (Mclean, VA)
- …policies, standards, and procedures are established and followed. Performs vulnerability /risk assessment analysis to support Assessment & Authorization (A&A). ... and ensuring compliance with policies, standards, and procedures. + Conduct vulnerability assessments, risk analysis, and continuous monitoring to strengthen the… more
- Insight Global (Colorado Springs, CO)
- …(DCO) procedures, processes, manuals, and related documentation. - Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident ... test in an enterprise environment ○ Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments ○ Experience… more
- House of Representatives (Washington, DC)
- …Network Intrusion Detection, Security Information and Event Management, and Vulnerability Management tools. Knowledge of network architecture and the ability ... of additional data sources required to identify intrusions. Knowledge of vulnerability management, network operating systems, threat actor techniques, and using that… more
- CGI Technologies and Solutions, Inc. (Arlington, VA)
- …delivery (CI/CD) pipeline. Automating Security Processes: Automate security testing, vulnerability scanning, and other security checks to streamline the development ... workflow. Conducting Security Assessments: Perform regular security assessments, vulnerability testing, and penetration testing to identify and mitigate risks.… more
- Robert Half-Robert Half Corporate (New York, NY)
- …in-demand skillsets such as **(ERP, ERM, CRM, Cloud, Security, InfoSec, IT Audit/Risk, Vulnerability , UX/UI, Big Data, Java, .Net, C++).** The primary focus will be ... recruiting experience in (ERP, ERM, CRM, Cloud, Security, InfoSec, IT Audit/Risk, Vulnerability , UX/UI, Big Data, Java, .Net, C++) or related technical skillsets. +… more
- Micron Technology, Inc. (Boise, ID)
- …Bedrock). + Practical experience with DevSecOps for AI systems, including model vulnerability scanning and secure data management; familiarity with code scanning and ... vulnerability management tools. + Demonstrated ability to design and deploy AI solutions at production scale. + Proven leadership and mentoring experience within… more
- General Dynamics Information Technology (Fairfax, VA)
- …and network access. + Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security ... and security risks to both technical and non-technical stakeholders. + Vulnerability & Compliance Management experience (Qualys experience preferred) + Endpoint… more
- Wabtec Corporation (Fort Worth, TX)
- …including access control, network security, secure configuration and vulnerability management, intrusion detection, security monitoring and incident response. ... needs. + Establish risk assessment methodologies, including threat modeling and vulnerability scoring systems. + Develop policies, procedures, and guidelines for… more