- SOS International LLC (Pearl Harbor, HI)
- …to support the execution of the information system patch and vulnerability management program. + Thorough understanding of Security Technical Implementation ... Guidelines (STIG) and ensure they are reviewed, maintained, and updated on a quarterly basis. + Ensure compliance with Configuration Management policies and procedures for authorizing the use of hardware and software on an information system. + Engage with… more
- City of Jacksonville (Jacksonville, FL)
- …for Oracle Fusion Cloud environments. + Conduct regular security audits and vulnerability assessments. User Administration and Support: + Create, modify, and manage ... user accounts, roles, and security profiles. + Provide end-user support for Oracle Cloud Fusion applications, including troubleshooting and resolving issues. + Ensure proper role-based access controls are implemented for security and compliance purposes.… more
- ADP (Roseland, NJ)
- …databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in ... disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security… more
- SpaceX (Hawthorne, CA)
- …Secure/Authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an inter-planetary scale,… more
- Microsoft Corporation (Redmond, WA)
- …issues across diverse hardware stacks. + Investigate security issues and identify vulnerability patterns to help secure the device driver ecosystem. + Partner with ... Windows teams and hardware partners to deliver robust, certifiable drivers. + Drive AI‑first engineering through creation and integration of AI agents across development, validation, debugging, and certification processes. **Qualifications** **Required… more
- Santander US (Dallas, TX)
- …Architecture Identity and Access Management Network / Firewall Management Vulnerability and Patch Management Cloud Security Architecture Secure Application ... Development / Containerization Encryption / Tokenization Data Loss Prevention Security Logging and Monitoring Incident Detection and Response Management Offensive Security **Skills and Abilities:** Strong understanding of multiple information security and… more
- Kansas Judicial Branch (Topeka, KS)
- …Develop and enforce server security policies, including system hardening and vulnerability management. + Manage backup and disaster recovery solutions. + Collaborate ... with Network, Security, and Application teams to ensure system stability and security. + Provide hands-on technical support and troubleshoot IT Infrastructure issues as needed + Available during off-hours to direct, manage, troubleshoot and restore critical… more
- TEKsystems (Denver, CO)
- …Product Owner) preferred + Previous experience in cybersecurity, ideally in vulnerability management or application security testing + Previous SIEM/SOAR experience ... is preferred Nice to Have: + Jira, Confluence + Agile transformation experience + Familiarity with .NET or Java development Responsibilities: + Define and communicate product vision, strategy, and roadmap + Own and maintain the product backlog; write… more
- Centene Corporation (Austin, TX)
- …scripting and Endpoint Engineering, network protocols + Linux and Windows server vulnerability remediation + Linux and Windows server OS patching + Automation ... (Ansible or similar) + Connections via API to systems (ServiceNow, Satellite or similar) **Soft Skills:** + Intermediate - Seeks to acquire knowledge in area of specialty + Intermediate - Ability to identify basic problems and procedural irregularities,… more
- Mitsubishi Chemical Group (NC)
- …to identify risks and vulnerabilities + Conduct **risk assessments, vulnerability analyses, and penetration testing** , delivering enterprise-wide security ... recommendations + Design, recommend, and implement **defense-in-depth security strategies** based on emerging malware and threat trends + Respond to and resolve **complex system and network security incidents** , exercising sound judgment under pressure +… more