- TEKsystems (Chicago, IL)
- …Owner) is a plus. * Previous experience in cyber security, specifically vulnerability management or application security testing is advantageous. * Experience with ... Jira, .NET or Java development is a strong asset. * Experience writing clear and detailed technical requirements Experience Level Expert Level Job Type & Location This is a Contract position based out of Chicago, IL. Pay and Benefits The pay range for this… more
- Williams Adley (Washington, DC)
- …and complete financial information. The Senior Associate shall also participate in vulnerability and risk assessment reviews and evaluations of the client's IT ... infrastructure to determine the adequacy of the controls to detect and prevent unauthorized activities, provide an acceptable level of risk to the organization, and establish controls to mitigate loss. The Associate is expected to be familiar with or willing… more
- GliaCell Technologies (Linthicum Heights, MD)
- …our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent ... Threat. We Offer: + Long term job security + Competitive salaries & bonus opportunities + Challenging work you are passionate about + Ability to work with some amazingly talented people Job Description: GliaCell is seeking a Senior Python Software Engineer on… more
- KBR (Beavercreek, OH)
- …prevention methods, incident response and management methods, auditing, vulnerability management support, and system security documentation. Key Responsibilities: ... + Coordinating, executing, and managing cybersecurity assessment & authorization (A&A) related activities supporting IT hardware, software, and connectivity capabilities in support of intelligence data management and analysis requirements + Provide advice and… more
- Northrop Grumman (Melbourne, FL)
- …security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and ... business continuity planning and provide analytical support for security policy development and analysis. + Integrate new architectural analysis of cyber security features and relate existing system to future needs and trends, embedded advanced forensic tools… more
- City of New York (New York, NY)
- …to the Commissioner and agency leadership; identifying areas of legal vulnerability ; and coordinating agencywide compliance with court orders, consent decrees, and ... other legal/regulatory mandates. OGC works closely with the NYC Law Department to minimize risk, avoid litigation where possible, and defend ACS in class action and individual lawsuits. OGC is led by the General Counsel, who serves as ACS's highest legal… more
- DEFTEC (Norfolk, VA)
- …Aid with design and implementation of training related to cognitive vulnerability and cognitive enhancement. (individual and whole force). Required Qualifications: + ... University Degree in Behavioural Science or a related field + Five years in the last 10 in the field of applied behavioral science or cognitive effects including understanding of human behaviour, cognitive effects, and decision-making processes. +… more
- Walmart (Bentonville, AR)
- …foundation across secure SDLC, cloud security, IAM, threat and vulnerability management, application security, and security automation. + Exceptional communication ... and executive presence, with experience influencing senior leaders and partnering horizontally across large enterprises. At Walmart, we offer competitive pay as well as performance-based bonus awards and other great benefits for a happier mind, body, and… more
- Highmark Health (Harrisburg, PA)
- …In addition, the Analyst will identify potential areas of processing vulnerability through procedure review and report trending/analysis; generate reports for ... analysis and/or sampling; review audit samples for accuracy and appropriateness; train operational staff on processes, act as the subject matter expert for all audit adjustment processes for workgroups, recommend and implement process changes, and coaching… more
- SAIC (El Segundo, CA)
- …(PERSEC), and operations security (OPSEC). + Conduct thorough risk and vulnerability assessments to identify potential program weaknesses and recommend effective ... mitigation strategies. + Provide subject matter expertise on a wide range of security concepts, principles, and practices to internal and external customers. + Coordinate with counterintelligence and engineering teams to assess supply chain risks and integrate… more