- Hologic (San Diego, CA)
- …and assessment of risk against CVEs. + Establish automated processes for vulnerability scanning and remediation + Educate the development and leadership teams on ... are correct and can be used as part of our continuous vulnerability monitoring process + Design architecture that prioritizes efficient, secure software updates… more
- Insight Global (Swatara, PA)
- …activities, enhance detection and automation, and drive proactive threat and vulnerability management. - Metrics & Reporting: Deliver executive-level reports on ... security concepts, including network and endpoint security, IDS/IPS, firewalls, and vulnerability management. - Background in manufacturing or engineering and proven… more
- Perdue Farms, Inc. (Salisbury, MD)
- …and technical standards in cloud deployments. + Perform threat modeling, vulnerability assessments, and risk analysis of cloud environments. + Automate security ... SCA) for code, containers, and infrastructure. + Integrate security controls, vulnerability scanning, and compliance checks into CI/CD pipelines (eg, Azure DevOps,… more
- City of New York (New York, NY)
- …Policies CYBER SECURITY OPERATIONS /ACTIVITIES: - Track cyber security incidents and vulnerability reports, direct teams for remediation of issues. - Ensure identity ... properly done. Missing patches and inconsistencies should be resolved. - Analyze vulnerability reports and operationalize them by providing specific guidance to IT… more
- Nightwing (Arlington, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Lockheed Martin (Sunnyvale, CA)
- …on servers \(including Perl, Bash and PowerShell\) * Experience with vulnerability remediation and security management \(i\.e\., system hardening, log management, ... Guide \(STIG\) Requirements * Direct work experience interfacing with vulnerability management **Security Clearance Statement:** This position requires a government… more
- NTT DATA North America (Tallahassee, FL)
- …and implementation of complex IT security solutions including Threat Management, Vulnerability Management, and Identity and Access Management. + * Evaluate security ... audit log reviews, system monitoring, SPAA processes, FISMA requirements, vulnerability and compliance scanning, continuous monitoring, security testing and… more
- Leidos (Annapolis Junction, MD)
- …function on time. + Executing the process for managing information assurance vulnerability alerts (IAVAs) and system security scanning for equipment suites in ... architectures, and Network security technologies (Multiple Domain, PKI, SSP, Vulnerability Assessment, etc.). + Experience working with Enterprise Domain Services.… more
- Cipher Tech Solutions (Vienna, VA)
- …while maintaining strong proficiency in software development, reverse engineering, and vulnerability research. You will apply your foundational knowledge of RE, VR, ... have proficiency in reverse engineering with an aptitude for performing vulnerability research. + Must be possess strong verbal/written communications skills that… more
- MUFG (Jersey City, NJ)
- …use cases by onboarding systems of record and telemetry sources (IAM, vulnerability , logging, CMDB, cloud posture) into automated pipelines. + Translate control ... and automation tools for control testing; familiarity with SIEM, CSPM, vulnerability management, and identity platforms. + Proficiency in dashboarding and reporting… more
Recent Jobs
-
Software Engineer (SWE) Skill Level 3
- Kaizen Approach, Inc (Annapolis Junction, MD)
-
Senior Physician Compensation Analyst
- Omaha Children's Hospital (Omaha, NE)
-
Data Scientist
- SAIC (Augusta, GA)
-
Various Positions
- Alaka'ina Foundation Family of Companies (Washington, DC)