- Anywhere Real Estate (Houston, TX)
- …+ Knowledge of Splunk and writing SPL. + Experience in Vulnerability Assessment , IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet ... analysis, Log analysis, understanding of IT standards, including but not limited to the OSI model, and the methods of exploiting those standards. + Knowledge of Information Security products and systems (Forensics toolkits, EDR, IDPS, HIPS, SIEM, etc.) +… more
- Cognizant (Louisville, KY)
- …possible Identifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk management Incidence management and ... root cause analysis Coordination and communication within the team and with customers Selecting and deploying appropriate CI/CD tools Strive for continuous improvement and build continuous integration, continuous development, and constant deployment pipeline… more
- KeyBank (Brooklyn, OH)
- …systems + Knowledge of security services such as firewalls, IDS, vulnerability assessment , and authentication + Professional certification (GWAPT, OSWE, ... BSCP, CISSP, or Google Professional Cloud Security Engineer) is desirable Essential Job Function: + Conducts comprehensive application security testing + Participates in application threat modeling and tabletop exercises + Coordinates the development,… more
- Deloitte (Memphis, TN)
- …5+ years of experience with the following: + Client Coordination & Prioritization + Vulnerability Assessment + Web Application Testing-App Scan + Must be legally ... authorized to work in the United States without the need for employer sponsorship, now or at any time in the future Information for applicants with a need for accommodation:… more
- ManTech (Nellis Air Force Base, NV)
- …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment , Group Policy management ... and configuration. **Security Clearance:** + Active Top Secret Clearance + Must be able to obtain and maintain a DoD TS/SCI-eligible clearance (ie DCID 6/4 eligibility) + Eligibility for access to Special Access Program Information + Willingness to submit to a… more
- JPMorgan Chase (Houston, TX)
- …on storage and block products. + Strong expertise in threat modeling, vulnerability assessment , and security configuration management. + Experience with drift ... detection tools and methodologies. + Deep understanding of file storage technologies (NAS, SAN, cloud file storage, etc.). + Familiarity with regulatory requirements and compliance frameworks (eg, SOX, PCI-DSS, GDPR). + Excellent analytical, problem-solving,… more
- TD Bank (Fort Lauderdale, FL)
- …+ **Evaluate and Assign:** penetration tests to appropriate resources. + ** Vulnerability Assessment :** Assess and analyze security weaknesses, and provide ... actionable recommendations to mitigate risks and improve overall security posture. + **Report Findings:** Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with… more
- CACI International (Fort Gordon, GA)
- …You'll Get to Do: + Conduct all-source and specialized intelligence analysis and vulnerability assessment support on adversary UAS operations within the CENTCOM ... AOR in support of Fusion analytical efforts. + Provide multi-faceted analysis that integrates existing national-level products and databases to define patterns of threat and UAS network activities. + The C-UAS Intelligence Analysts must have an expert… more
- Deloitte (Los Angeles, CA)
- …Advise clients on cost optimizations + Lead technology upgrades, security/ vulnerability assessment and fixes, performance optimizations + Evaluate ... and bring in more Deloitte assets/transfer solutions based on new scope items Qualifications Required: + 15+ years of consulting and/or industry experience + Current state public assistance system experience that supports eligibility and benefits determination… more
- The Walt Disney Company (Glendale, CA)
- …configuration + Experience with firewalls, VPNs, network security monitoring, and vulnerability assessment tools + Knowledge of software configuration ... management/version control tools + Cisco, GIAC, CompTIA or other relevant network and cyber security certifications strongly preferred **Education** + As a minimum a Bachelor of Science Degree in engineering, computer science, or related field from an… more