- Cornerstone onDemand (Dublin, CA)
- …limited to: Pipeline security, DevSecOps, CloudFormation templates, Docker, Kubernetes, SIEM, IPS, Vulnerability Scanners **You've got what it takes if you have ** + ... in multiple security domains such as cloud security, platform hardening, vulnerability management, web application and browser security, penetration testing, applied… more
- Latham, The Pool Company (Latham, NY)
- …(IR) Plans and After Action Reports (AAR). + Conduct penetration testing and vulnerability assessments to identify and mitigate risks. + Implement and enforce Zero ... management. + Familiarity with SIEM tools, threat intelligence platforms, and vulnerability management. + Excellent written and verbal communication skills for… more
- Acclaim Technical Services (Annapolis Junction, MD)
- …Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a ... system; Verify and validate the system meets the security requirements; Provide vulnerability assessment of the system, coordinate penetration testing, and provide a… more
- Oracle (Montgomery, AL)
- …with at least 3 years working with Oracle systems + Proven experience in vulnerability management, scan analysis, and POAM development + Must be a US Citizen ... clearance Skills: + Strong understanding of cybersecurity scanning tools and vulnerability management processes. + Expertise in Oracle system architecture and… more
- Warner Bros. Discovery (Atlanta, GA)
- …including Kubernetes clusters, Docker setups, and orchestration solutions, emphasizing vulnerability reduction and compliance. + Develop and enforce security ... threats, and performance anomalies. + Conduct regular security assessments, vulnerability scans, and threat modeling for cloud environments. Identify, evaluate,… more
- CACI International (Albuquerque, NM)
- …environments, or organizations do not compromise security posture. + **Monitoring Vulnerability Postures:** Validate vulnerability postures in ACAS and ensure ... compliance with DISA STIGs and CSSP HBSS requirements. + **Verifying Security Program Implementation:** Ensure the delegated aspects of the system security program are implemented locally and across customer-related systems. + **Submitting ATO Documentation:**… more
- M. C. Dean (Chantilly, VA)
- …Conducting ICS/SCADA system inventories following DoD guidance + Conducting vulnerability scanning and document system vulnerabilities + Supporting ISO ... and data + Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS + Establishing, managing, and tracking of Plan of Action… more
- Guidehouse (Houston, TX)
- …Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering ... and implementing enterprise security tools such as SIEM (eg, Splunk), vulnerability scanners (eg, Nessus), and endpoint protection platforms (eg, Crowdstrike). +… more
- Scotiabank (Dallas, TX)
- …control areas, including Identity & Access Management (IAM), Data Protection, Vulnerability Management, Asset & Software Currency, Endpoint Controls, and Technology ... Improve protection of sensitive data across platforms and jurisdictions. o Vulnerability Management: Accelerate remediation of known vulnerabilities and address root… more
- Koniag Government Services (Huntsville, AL)
- …controls into all phases of development (DevSecOps), code scans, dependency management, vulnerability assessment, etc. + Use Infrastructure as Code (IaC) tools to ... and secure software delivery. + Familiarity with DevSecOps practices: vulnerability scanning, dependency management, secure coding, secrets management, encryption. +… more