- HTC Global Services Inc (Brooklyn, NY)
- …+ Experience with CrowdStrike (endpoint protection) + Experience with Rapid7 ( vulnerability management and security analytics) + Experience with N-Able (remote ... monitoring and management) + A+ Certification + Microsoft Certified: Modern Desktop Administrator Associate . Familiarity with HIPAA, PHI data handling, and ITIL best practices. What Makes HTC A Great Place To Build Your Future HTC Global Services wants you to… more
- Oracle (Providence, RI)
- …key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, DB Security, Penetration Testing, Compliance and Security ... Assessment etc. Primarily interacting directly with customers, the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience in… more
- Nightwing (Palm Bay, FL)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **CODEX Culture** Our organization prioritizes impactful,… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is delivering technical support to customer… more
- Google (Mountain View, CA)
- …would be an advantage: + Experience with adversarial research, red-teaming, or vulnerability research, particularly in complex software or AI/ML systems. + Strong ... software engineering skills and experience with ML frameworks like JAX, PyTorch, or TensorFlow. + Familiarity with concepts from game theory or mechanism design problems as they apply to AI. + A track record of landing research impact within multi-team… more
- Robert Half Technology (San Antonio, TX)
- …to safeguard sensitive information. * Conduct regular system audits and vulnerability assessments. * Maintain compliance with federal and state regulations (FERPA, ... HIPAA, and data privacy standards). * Oversee help desk operations to ensure timely and effective technical support to staff. * Develop and coordinate staff technology training to enhance digital literacy and system efficiency. * Serve as a liaison between IT… more
- Robert Half Technology (Houston, TX)
- …firewall policies to support business needs. + Perform regular security audits, vulnerability assessments, and patch management. + Collaborate with IT teams to ... troubleshoot connectivity and security-related incidents. + Maintain documentation of network configurations, policies, and procedures. + Ensure compliance with industry standards and organizational security policies. Requirements Bachelor's degree in Computer… more
- Cardinal Health (Washington, DC)
- …back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as ... completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with… more
- Truist (Atlanta, GA)
- …a resource for teammates with less experience 9. Support Distributed application vulnerability remediation, defined by working with internal groups, and vendor (as ... needed) Development includes but is not limited to customization, software integration, analysis, configuring solutions, or use tools pertinent to the area, project, or system to configure or generate a solution. 10. May oversee the work of a small team. 11.… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Location:** Northern Virginia (onsite work required at… more
Recent Jobs
-
Senior Water / Wastewater Engineering Manager
- AECOM (Columbia, SC)
-
Associate Director, Medical Review Committee Operations
- Insmed Incorporated (NJ)
-
Medical Oncology - Veterinary Technician
- VCA Animal Hospitals (Fountain Valley, CA)