- SysLogic, Inc. (Brookfield, WI)
- …Development stack. + Actively participate in the deep review of pen test and vulnerability assessments both in person with clients and remotely. + As needed provide ... training on secured development principals in both remote and in person settings. Qualifications + Bachelor's degree in computer science, related field or equivalent experience. + 5+ years of experience in application security or related role. + Strong… more
- Marriott (Bethesda, MD)
- …including PKI + Direct, hands-on experience or a strong working knowledge of vulnerability management tools + Working knowledge of the OWASP Top 10Preferred: + ... Strong working knowledge of IT service management (eg, ITIL-related disciplines): + Change management + Configuration management + Asset management + Incident management + Problem management + Ability to provide Security Requirements for areas including but… more
- University of Southern California (Los Angeles, CA)
- …and enrichment of the human mind and spirit." The Brain Research on Anxiety Vulnerability and Emotion (BRAVE) Lab is seeking a Research Laboratory Technician II (Job ... Code 185015) to join its team. The BRAVE Lab is housed within the Department of Psychology at the Dana and David Dornsife College of Letters, Arts and Sciences. This position will involve coordinating a study funded by the National Institute of Mental Health… more
- Insight Global (New York, NY)
- …and anomalies. o Investigate security events and escalations. o Perform vulnerability assessments and penetration testing. . Governance and Compliance o Enforce ... security policies, standards, and procedures to ensure compliance. o Identify possible compliance issues with regulations and our guidelines. o Perform system hardening according to our plans and identify any gaps. o Support incident response and disaster… more
- Tetrad Digital Integrity LLC (Suffolk, VA)
- …beginning to end until ATO. + Provide expertise in CONMON, vulnerability analyses, risk assessments, security controls analyses, remediation/mitigation techniques. + ... Analyzes data and systems architecture, creates designs, and implements information systems solutions. + This includes coordinating, review, approval, and tracking of high risk escalation documentation and for Navy circuits and non-circuits for DON Chief… more
- NANA Regional Corporation (South Burlington, VT)
- …+ Review and apply STIGs, IAVAs, and perform patch management and vulnerability remediation. + Utilize enterprise monitoring and logging tools (eg, Splunk, ... SolarWinds, Nagios) to proactively detect and resolve system or network issues. + Develop and maintain detailed documentation including SOPs, network diagrams, system baselines, and change logs. + Support contingency planning, backup and recovery strategies,… more
- Insight Global (Woonsocket, RI)
- …for known PCI control deficiencies and track remediation to completion - Perform vulnerability management using tools such as SNYK, JFrog, Qualys, and Nexus IQ - ... Identify File Integrity Monitoring (FIM) gaps and configuration management gaps using Qualys tools and reports - Utilize Archer and ServiceNow to track workflows and findings Compensation: $40-45/hour Exact compensation may vary based on several factors,… more
- Stony Brook University (Stony Brook, NY)
- …justice. We intentionally and relentlessly pursue excellence through introspection, vulnerability , empathy, compassion, learning, and courage. We value our internal ... and external partnerships as vital drivers of the ambitious goals we pursue. We celebrate and take pride in the following: + Named one of the "Most Promising Places to Work in Student Affairs" by Diverse Magazine. + Serving a highly diverse student body (click… more
- American Airlines (Dallas, TX)
- …architecture by improving performance, reliability, scalability, testing automation, and issue/ vulnerability mitigation to align with AA's modernization journey + ... Build design system artifacts that meet user needs and follow organizational IT standards, process, and infrastructure, as well as industry best practices and trends in reusability, accessibility, and design system methodology + Own the technical strategy and… more
- Rubrik (Annapolis, MD)
- …and aid investigation when needed; + Support controlled changes and vulnerability remediation activities; and + Work collaboratively with Information Security in ... designing, implementing, assessing or enhancing system-specific security and privacy controls. **Position Risk Designation** section: This position carries duties and responsibilities involving the US Federal Government's interests. The selected incumbent may… more