- Sanford Health (Sioux Falls, SD)
- …filtering, firewall, IPS/IDS systems, identity and access management, SSO/MFA, vulnerability management, and data protection. Skillfully maintains the existing ... security systems, including implementing new features, performing upgrades, and managing technical configurations/policies across a variety of business-critical systems. Proficiently monitors and responds to security system health alerts. Respond to day-to-day… more
- Scientific Research Corporation (Charleston, SC)
- …+ 741A: Information System Security Manager (ISSM) + 742A: Network Security Vulnerability Technician + T47A: Submarine Local Area Network (SUBLAN) Technician + 744A: ... Low Band Universal Communication System (LBUCS) Transmit Terminal Equipment Operator/Maintainer + 745A: Information Systems Technician + 746A: Information Systems Administrator Clearance Information SRC IS A CONTRACTOR FOR THE US GOVERNMENT, THIS POSITION WILL… more
- Systems Technology Forum (Dahlgren, VA)
- …up services/pods, etc. Performs CI/CD pipeline patching, upgrades, and vulnerability scans. Implements Defense Information Systems Agency (DISA) Security Technical ... Implementation Guides (STIGs). Qualifications and Skills Required knowledge and years of experience Must have at least six (6) years of experience. Must have experience with containerization technologies, development methodologies, DEVSECOPS and supporting… more
- ABBTECH Professional Resources, Inc. (Washington, DC)
- …all environments.** + **Implement and monitor database security, including vulnerability remediation, encryption, and audit logging.** + **Participate in failover, ... disaster recovery (DR), and backup validation testing.** + **Provide on-call production support outside business hours (primarily for SFI-related incidents).** + **Conduct AWS R&D tasks for new initiatives and automation improvements.** + **Maintain… more
- Atlantis Casino Resort Spa (Reno, NV)
- …training, and/or experience in IT security monitoring and analysis, vulnerability analysis, risk analysis, or similar cybersecurity-related fields preferred. + ... Proven track record of successfully implementing IT projects in a medium to large network environment. + Knowledge and understanding of enterprise networking protocols and concepts, server operating systems (including Windows, Linux, and VMWare), and core… more
- Lockheed Martin (Moorestown, NJ)
- …of large combat systems software development * Familiarity with cybersecurity vulnerability assessments * Comfort and ability working on physical lab equipment ... * Ability to work independently, troubleshoot, problem\-solve with support as needed * Ability to work well in a team environment **Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for… more
- Huntington Ingalls Industries (Dayton, OH)
- …design documents for anti-tamper solutions (eg Anti-Tamper Plans) and conduct vulnerability analysis of system level anti-tamper architectures + Author technical ... reports to document vulnerabilities of proposed anti-tamper solutions and provide technical recommendations for key DoD acquisition decision makers + Support technical interchange meetings and program reviews with US Air Force and DoD program offices and… more
- CVS Health (Woonsocket, RI)
- …including identity and access management (IAM), encryption, network security, and vulnerability scanning to ensure the security and compliance of cloud-based ... systems. + Automates the provisioning, configuration, and management of cloud resources by implementing orchestration tools to automate workflows and streamline cloud operations. + Evaluates new cloud services and features, conducts proof-of-concepts, and… more
- Cisco (San Jose, CA)
- …configuration management. * Security mindset: access controls, workload isolation, and vulnerability reduction. * Hands on Experience with API management tools, API ... gateways, Identity and Access Management Protocols * Experience across both cloud and on-prem environments. * Clear communication and demonstrated end-to-end technical leadership. Preferred Qualifications * Strong skills in performance tuning and optimization.… more
- SciTec (Fairborn, OH)
- …management using JFrog Artifactory, Nexus or similar + Experience with software vulnerability assessment and remediation using SAST/DAST and tools like Sonarqube + ... Experience with Python3 or C+ + + Experience with container security tools such as Grype, Syft, Snyk, etc. + Systems and service administration in a Linux environment, including the installation and maintenance of applications supporting CI/CD like Gitlab, etc… more
Recent Jobs
-
Senior Director, Advancement Communications
- Wayne State University (Detroit, MI)
-
Pharmacy Analyst
- Highmark Health (Montgomery, AL)
-
Military Apprentice Appraiser - Comprehensive Training Program (Charlotte)
- Usaa (Charlotte, NC)
-
Executive Customer Specialist
- The Hertz Corporation (Nashville, TN)