- Lockheed Martin (Littleton, CO)
- …Applications - Author efficient Dockerfiles, produce minimal images, and run automated vulnerability scans; enforce security best practices\. * Deploy with Helm - ... Create and maintain Helm charts or Kustomize overlays for deployments, services, ConfigMaps, Secrets, and ingress resources across development, test, and production clusters\. * Optimize Performance & Scalability - Conduct load testing on high throughput data… more
- The Boeing Company (Hazelwood, MO)
- …establishes threat surfaces and mitigations to maximize resiliency while minimizing vulnerability . + Supports the establishment of testing and evaluation plans, ... including cyber test activities & cyber tabletop evaluations. + Perform assessment of software assurance activities and products, to ensure the security pedigree of software solutions. + Identifies assets and assesses risks, threats, and vulnerabilities of the… more
- TEKsystems (Dallas, TX)
- …o Monitoring and management o Automated Deployments o Patching and vulnerability remediation o Administration and support o Process refinement and automation ... The primary focus of this architect role will include the following technologies / subject matter areas: * Primary technology expertise required: o Red Hat Ansible Automation Platform o Red Hat Enterprise Linux o Red Hat OpenShift o Ansible Playbook… more
- The Boeing Company (Seattle, WA)
- …etc.). + Experience in threat intelligence, penetration testing, and vulnerability assessment. **Preferred Qualifications (Desired Skills/Experience):** + A Master's ... degree in Computer Science, Cybersecurity, Information Technology, or a related field + Ability to drive thought leadership and stay updated on the latest cybersecurity trends, emerging threats, and innovations in analytics technologies. + Broad experience… more
- CACI International (High Point, NC)
- …+ Implement cybersecurity requirements aligned to overall architecture. + Conduct vulnerability scanning and analysis of systems and tools. Formulates and implements ... security certification methods for COMPMOD TOs. + Provides daily supervision and direction to staff Qualifications: _Required:_ + US citizen with Top Secret clearance, must be SCI eligible + Technical bachelor's degree and 5 years of applicable experience… more
- BOOZ, ALLEN & HAMILTON, INC. (San Antonio, TX)
- …+ Experience working with security applications to c ond uct enterprise vulnerability scanning + Experience c ond ucting penetration testing and working with ... containers or virtual machines + Experience with SIEMS such as Splunk or ArcSight + Experience with HBSS or Trellix + Knowledge of Xacta + Ability to develop scripts, including in Python, to test systems or automate security processes + Ability to reverse… more
- Lockheed Martin (Denver, CO)
- …software development lifecycle \(threat modeling, hardening, code reviews, vulnerability assessments\)\. + Collaborating with customers throughout the development ... life\-cycle to ensure innovative solutions meet their needs\. + Contributing to a team environment that values innovation, creativity, and teamwork\. + Participating in the development of outstanding team culture, quickly adapting to evolving customer… more
- Consumers Energy (Jackson, MI)
- …+ Initiate and perform audits at facilities and prepare operational security, vulnerability , risk, and criticality assessments to identify deficiencies that may lead ... to security vulnerabilities. Assessments are used to determine the appropriate level of measures needed to protect the assets and employees + Lead Investigations of theft, fraud, workplace violence, employee misconduct, damage to property, trespassing, and… more
- Huntington Ingalls Industries (Newport News, VA)
- …traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security ... research. May prepare security reports to regulatory agencies. This position is intended for the Control System Security (CSS) team which is a subset of the I&C team in department E11. The incumbent will be responsible leading the CSS team, providing review… more
- Athene (West Des Moines, IA)
- …Program Support + Track vulnerabilities identified through Athene's threat and vulnerability management program and support remediation efforts. + Coordinate and ... facilitate cyber incident response exercises, disaster recovery, and tabletop drills. + Assist with the security awareness program, including annual training updates and phishing simulations. + Develop governance, risk, and compliance (GRC) educational and… more