- L3Harris (Greenville, TX)
- …networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple ... needs, concerns and requirements at customer meetings. + Perform periodic vulnerability scans of systems to identify security vulnerabilities and provide remediation… more
- ManTech (Belcamp, MD)
- …accreditation packages or Certification of Networthiness efforts. + Conduct vulnerability assessments, risk analysis, and incident responses. + Actively monitoring ... technologies (firewalls, intrusion detection/prevention systems, SIEM). + Experience with vulnerability scanning and penetration testing. + Possess analytical and… more
- INTECON (Bellevue, NE)
- …developing Tactics, Techniques, and Procedures (TTPs) incorporating risk analysis, vulnerability management, and threat-hunting methods. + Ensure all cybersecurity ... + eMASS accreditation and authorization system. + DISA STIGs for system hardening and vulnerability management. + Must possess at least one or more of the following… more
- Dayforce (Minneapolis, MN)
- …globally dispersed team of 5-10 professionals. Manage Penetration testing, vulnerability identification program, and third-party risk analysis process. Manage cross ... OS - Database technologies including SQL, Oracle and DB2 - Security vulnerability management tools - Cloud knowledge and experience including Azure, AWS environments… more
- Regions Bank (Hoover, AL)
- …and managing SharePoint uploads for compliance. + **Security & Vulnerability Management:** Strong understanding of Microsoft security patching, vulnerability ... scanning, and endpoint security tools (eg, SentinelOne, EPM, Rapid7). + **Project Support:** Ability to conduct system impact analysis and testing for banking projects (eg, Early Pay, Overdraft Grace, Customer Transparency). + **Payments & Middleware… more
- Grant PUD (Ephrata, WA)
- …software including IDS, Active Directory, DNS, anti-virus, malware detection, vulnerability scanners, baseline management, backup and recovery, remote access, and ... software including IDS, Active Directory, DNS, anti-virus, malware detection, vulnerability scanners, baseline management, backup and recovery, remote access, and… more
- Northrop Grumman (Colorado Springs, CO)
- …procedures, and mandates. This role involves performing compliance audits, vulnerability assessments, and security certification tests, as well as developing ... deviations from configurations, policies, or standards through compliance audits and vulnerability assessments. + Establish and enforce program control processes to… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Cummins Inc. (GA)
- …in the following ways:** + **Strengthen System Security** By conducting vulnerability scans and analyzing findings, you'll help proactively identify and mitigate ... Strategic Improvements** Your ability to spot systemic issues from vulnerability data and configuration assessments will guide long-term security enhancements… more
- Insight Global (Dallas, TX)
- …integrate, and perform initial configurations of security tools. * Vulnerability Management: Coordinate and conduct regular security assessments, penetration ... testing, and vulnerability scans to proactively identify and address security weaknesses. * Incident Response: Lead incident response efforts to promptly detect,… more