- TD Bank (Fort Lauderdale, FL)
- …+ **Evaluate and Assign:** penetration tests to appropriate resources. + ** Vulnerability Assessment :** Assess and analyze security weaknesses, and provide ... actionable recommendations to mitigate risks and improve overall security posture. + **Report Findings:** Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with… more
- CACI International (Fort Gordon, GA)
- …You'll Get to Do: + Conduct all-source and specialized intelligence analysis and vulnerability assessment support on adversary UAS operations within the CENTCOM ... AOR in support of Fusion analytical efforts. + Provide multi-faceted analysis that integrates existing national-level products and databases to define patterns of threat and UAS network activities. + The C-UAS Intelligence Analysts must have an expert… more
- Deloitte (Los Angeles, CA)
- …Advise clients on cost optimizations + Lead technology upgrades, security/ vulnerability assessment and fixes, performance optimizations + Evaluate ... and bring in more Deloitte assets/transfer solutions based on new scope items Qualifications Required: + 15+ years of consulting and/or industry experience + Current state public assistance system experience that supports eligibility and benefits determination… more
- The Walt Disney Company (Glendale, CA)
- …configuration + Experience with firewalls, VPNs, network security monitoring, and vulnerability assessment tools + Knowledge of software configuration ... management/version control tools + Cisco, GIAC, CompTIA or other relevant network and cyber security certifications strongly preferred **Education** + As a minimum a Bachelor of Science Degree in engineering, computer science, or related field from an… more
- Lumen (Augusta, ME)
- …Services including (but not limited to) SIEM, EDR/XDR, SD-WAN, Vulnerability Assessment , Security Awareness, Cloud Security, Cloud (Private/Public/Hybrid). ... *Excellent interpersonal and communication skills (oral, written and presentation). *Knowledge of various vendor equipment including (but not limited to) Juniper, Cisco, Aruba, Palo-Alto. *Knowledge of telecommunications equipment, operation, procedures and… more
- General Dynamics Information Technology (Hanover, MD)
- …VxWorks real time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment , Security Research, Rapid Prototyping of proof of concept ... capabilities. it's your chance to step up to the challenge and prove you're ready to lead the world. What you'll experience: - Technologies that aren't just top-notch, they're often top-secret - A team of bold thinkers committed to exploring what's next -… more
- Lumen (Herndon, VA)
- …hardware, System Imaging, Create and implement group policies, Security script writing, Vulnerability assessment and mitigation. + Maintain systems in accordance ... w/ system security plans, implement new requirements as needed. + Troubleshoot user issues. + Maintain network printers. + Data Transfer Officer for information systems. + Support multiple networks with differing classification levels. + Crypto Custodian for… more
- KBR (Chantilly, VA)
- …& guidance to include the Risk Management Framework (RMF) process, and vulnerability assessment and remediation. + Extensive knowledge, experience and expertise ... using a variety of Agile methodologies and acquisition techniques is required. + Knowledge and experience with GEOINT and SIGINT collection platforms is essential. Security Clearance: + Active TS/SCI Polygraph. Belong, Connect and Grow at KBRAt KBR, we are… more
- Tetrad Digital Integrity LLC (MD)
- …Professional (OSCP) + Strong understanding of ethical hacking methodologies, experience with vulnerability assessment tools, and knowledge of legal and ethical ... considerations in cybersecurity. + Demonstrable, in-depth understanding and practical experience with: industry standards (eg, NIST Cybersecurity Framework, OWASP Top 10, PTES). + Relevant laws and regulations pertaining to cybercrime, data privacy, and… more
- SciTec (Fairborn, OH)
- …management using JFrog Artifactory, Nexus or similar + Experience with software vulnerability assessment and remediation using SAST/DAST and tools like Sonarqube ... + Experience with Python3 or C+ + + Experience with container security tools such as Grype, Syft, Snyk, etc. + Systems and service administration in a Linux environment, including the installation and maintenance of applications supporting CI/CD like Gitlab,… more