- Sysco (Stockton, CA)
- …and execution of product recalls and completion of related documentation. Completes vulnerability assessment and develops mitigations for the Food Defense Program to ... ensure requirements are carried out in a timely, accurate manner to decrease risk of Intentional Adulteration. Completes or assures completion of the Regulatory Visit Report and documents corrective and preventive action plans for non-conformances identified… more
- General Dynamics Information Technology (El Segundo, CA)
- …critical national assets. + Working knowledge of cyber threats and vulnerability , including the applicable laws, regulations, policies, and ethics related to ... cybersecurity, privacy, and impacts. + Applies techniques of debriefing, interviewing, or elicitation in a systematic manner through direct and indirect questioning to obtain information of security, counterintelligence and/or intelligence value. Prepares… more
- Air Mobility Command (Mcchord AFB, WA)
- …the Risk Management Framework to assess risk factors and advise on vulnerability to attack from a variety of sources (eg destructive programs/applications/viruses, ... unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications. 3. Knowledge of Local Area Network security requirements and techniques for protecting computer systems from viruses, data tampering,… more
- TEKsystems (Chandler, AZ)
- …team (CSIRT) activities - Security engineers will also participate in network vulnerability scans, security audits or risk assessments and provide feedback to ensure ... compliance with corporate security policies and adherence to industry best practices. This position interacts with management, lines-of-business representatives, and senior technical engineers across internal and external organizations. This role participates… more
- Robert Half Technology (Jacksonville, FL)
- …security incidents, including malware, phishing, and intrusion attempts. + Perform vulnerability assessments and recommend remediation actions. + Analyze logs and ... network traffic to detect suspicious activity. + Maintain and update security documentation, policies, and procedures. + Collaborate with IT and cybersecurity teams to improve overall security posture. Requirements Qualifications: + 2+ years of experience in… more
- Fiserv (Omaha, NE)
- …regulated environments (eg, PCI DSS, SOC 2), including secrets management and vulnerability remediation. + 5+ years of experience in Infrastructure as Code ... (Terraform, CloudFormation, Ansible) for provisioning and configuration management. + 5+ years of experience in CI/CD pipeline engineering using Jenkins, GitLab CI, GitHub Actions, or Azure DevOps. + 5+ years of experience in scripting and automation using… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …development of security and contingency plans and conduct complex risk and vulnerability assessments. + Analyze policies and procedures against DoD security policies ... and regulations and provide recommendations for closing gaps. + Recommend system enhancements to improve security deficiencies. + Interface with both client managers and system users. + Analyze customer DevSecOps security controls and AI/ML security controls… more
- Commonwealth of Pennsylvania (PA)
- …correctional training program courses related to security such as Security Analysis or Vulnerability Assessment. + D. I have NO training or experience related to ... this work behavior. 10 In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you… more
- NVIDIA (Santa Clara, CA)
- …solutions + Expertise in network security, including Zero Trust architectures, vulnerability assessment, encryption standards, and secure data handling. + Proficient ... in Identity and Access Management (IAM) solutions, multi-factor authentication (MFA), and modern security technologies like SIEM, IDS/IPS, DLP, and endpoint protection. + Excellent written and verbal communication skills. Ability to communicate effectively… more
- Lockheed Martin (Orlando, FL)
- …network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. **Desired Skills:** * Proven expertise in Dev/Sec/Ops ... concepts and processes, with the ability to apply them in real\-world scenarios, including: Expertise in Splunk, including: Writing queries, Creating dashboards, Implementing third\-party apps \(e\.g\., Qmulos Products\)\. Experience with network design… more