• Information System Security Engineer, Senior

    BOOZ, ALLEN & HAMILTON, INC. (Lexington, MA)
    …are trained on how to build secure sof tware, running security vulnerability scans, specifically with the DoD's Assured Compliance and Assessment Solution ( ... ACAS ) while generating and interpreting vulnerability scans, implementing Security Technical Implementation Guidelines ( STIGs ) and CIS Benchmarks, and other… more
    BOOZ, ALLEN & HAMILTON, INC. (12/22/25)
    - Related Jobs
  • Manual Ethical Hacker

    Bank of America (Boston, MA)
    …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... related protocols/technologies (eg, UNIX/LINUX, TCP/IP, Cookies) + Experience with vulnerability assessment tools and penetration testing techniques + Solid… more
    Bank of America (12/22/25)
    - Related Jobs
  • Consultant - ServiceNow Cyber Strategy

    Deloitte (Houston, TX)
    …solutions on ServiceNow Security Operations (Security Incident Response and Vulnerability Response) and Integrated Risk Management (IRM) applications utilizing ... Administrator (CSA), ServiceNow Certified Implementation Specialist (CIS) (Security Incident Response/ Vulnerability Response), Certified Technical Architect (CTA), CISSP, CISM, or… more
    Deloitte (12/21/25)
    - Related Jobs
  • Network Security Engineer

    BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
    …infrastructure and cyber security controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. + ... Perform risk and vulnerability assessments in network, system, and application areas. + Leverage big data analytics and traditional security event types to identify… more
    BOOZ, ALLEN & HAMILTON, INC. (12/21/25)
    - Related Jobs
  • IT Governance Engineer - Virtual

    Alight (Chicago, IL)
    …controls for AI systems, including access management, data protection, vulnerability scanning, and incident response protocols. + **Workflow Integration:** Build ... workflows. + Deep understanding of cybersecurity principles, threat modeling, vulnerability management, and incident response. + Familiarity with regulatory… more
    Alight (12/21/25)
    - Related Jobs
  • Penetration Tester 3 with Poly

    Amentum (Columbia, MD)
    …protocols, operating systems, architectures, equipment, services, and standards. + Perform vulnerability and penetration testing using a wide variety of tools + ... network and application-level testing using established testing protocols andMethods + Perform vulnerability and penetration testing using a wide variety of tools +… more
    Amentum (12/21/25)
    - Related Jobs
  • IT Program Auditor

    BEAT LLC (San Antonio, TX)
    …and audit readiness. Audit and assess the effectiveness of vulnerability management activities, including ACAS/eMASS asset tracking, credentialed scanning, and ... progress, and residual vulnerabilities. Collaborate with IA Control Assessors, Vulnerability Analysts, and Systems Administrators to align audit findings with… more
    BEAT LLC (12/21/25)
    - Related Jobs
  • SP28 Senior Information Systems Security Officer…

    Amentum (Crane, IN)
    …and institute protective or corrective measures when a security incident or vulnerability is discovered. + Report in conjunction with the User Representative (UR) ... Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner. + Evaluate performer… more
    Amentum (12/21/25)
    - Related Jobs
  • Senior Principal Offensive Security Engineer (OCI)

    Oracle (Richmond, VA)
    …to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, ... relative to the industry. **Qualifications** + 6+ years of experience in vulnerability discovery / security engineering / application security + Threat modeling… more
    Oracle (12/20/25)
    - Related Jobs
  • Cybersecurity Analyst

    Robert Half Technology (St. Louis, MO)
    …their impact and coordinate incident response efforts. + Conduct threat and vulnerability assessments, performing regular system scans and risk analyses. + Support ... network and endpoint security tools such as SIEM, firewalls, IDS/IPS, and vulnerability scanners. + Understanding of security frameworks and regulations (eg, NIST,… more
    Robert Half Technology (12/20/25)
    - Related Jobs