- BOOZ, ALLEN & HAMILTON, INC. (Lexington, MA)
- …are trained on how to build secure sof tware, running security vulnerability scans, specifically with the DoD's Assured Compliance and Assessment Solution ( ... ACAS ) while generating and interpreting vulnerability scans, implementing Security Technical Implementation Guidelines ( STIGs ) and CIS Benchmarks, and other… more
- Bank of America (Boston, MA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... related protocols/technologies (eg, UNIX/LINUX, TCP/IP, Cookies) + Experience with vulnerability assessment tools and penetration testing techniques + Solid… more
- Deloitte (Houston, TX)
- …solutions on ServiceNow Security Operations (Security Incident Response and Vulnerability Response) and Integrated Risk Management (IRM) applications utilizing ... Administrator (CSA), ServiceNow Certified Implementation Specialist (CIS) (Security Incident Response/ Vulnerability Response), Certified Technical Architect (CTA), CISSP, CISM, or… more
- BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
- …infrastructure and cyber security controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. + ... Perform risk and vulnerability assessments in network, system, and application areas. + Leverage big data analytics and traditional security event types to identify… more
- Alight (Chicago, IL)
- …controls for AI systems, including access management, data protection, vulnerability scanning, and incident response protocols. + **Workflow Integration:** Build ... workflows. + Deep understanding of cybersecurity principles, threat modeling, vulnerability management, and incident response. + Familiarity with regulatory… more
- Amentum (Columbia, MD)
- …protocols, operating systems, architectures, equipment, services, and standards. + Perform vulnerability and penetration testing using a wide variety of tools + ... network and application-level testing using established testing protocols andMethods + Perform vulnerability and penetration testing using a wide variety of tools +… more
- BEAT LLC (San Antonio, TX)
- …and audit readiness. Audit and assess the effectiveness of vulnerability management activities, including ACAS/eMASS asset tracking, credentialed scanning, and ... progress, and residual vulnerabilities. Collaborate with IA Control Assessors, Vulnerability Analysts, and Systems Administrators to align audit findings with… more
- Amentum (Crane, IN)
- …and institute protective or corrective measures when a security incident or vulnerability is discovered. + Report in conjunction with the User Representative (UR) ... Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner. + Evaluate performer… more
- Oracle (Richmond, VA)
- …to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, ... relative to the industry. **Qualifications** + 6+ years of experience in vulnerability discovery / security engineering / application security + Threat modeling… more
- Robert Half Technology (St. Louis, MO)
- …their impact and coordinate incident response efforts. + Conduct threat and vulnerability assessments, performing regular system scans and risk analyses. + Support ... network and endpoint security tools such as SIEM, firewalls, IDS/IPS, and vulnerability scanners. + Understanding of security frameworks and regulations (eg, NIST,… more
Recent Jobs
-
Principal Technical Program Manager - GPU Infra & Datacenters - DFW Area
- Oracle (Little Rock, AR)
-
Senior Analyst, Actuarial
- CVS Health (Salem, OR)
-
SCADA Engineer
- Panasonic North America (De Soto, KS)
-
Patient Care Associate / Float Casual / SEIU - J, Part Time, AVH
- Highmark Health (Natrona Heights, PA)