- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Location:** Northern Virginia (onsite work required at… more
- RELX INC (Chicago, IL)
- …GitHub + Data Management: Experience with ETL process, data warehousing + Vulnerability management: Tools like Qualys, ServiceNow. + SIEM: Tools like Microsoft ... Sentinel, Splunk + Possess FedRAMP continuous monitoring experience. + Understanding of the NIST Special Publication 800-53 guidelines and FedRAMP requirements + Excellent written and verbal communication skills, with experience in client engagement and survey… more
- Procter & Gamble (Cincinnati, OH)
- …roadmap, methodology standardization, control validation cadence, and integration with vulnerability management. Job Qualifications Required: + BA or BS degree ... in Information Security, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree). + 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on… more
- Truist (Atlanta, GA)
- …security practices and ability to resolve any code or open-source library vulnerability issues quickly as per SLA **OTHER JOB REQUIREMENTS / WORKING CONDITIONS** ... **Sitting** Constantly (More than 50% of the time) **Standing** Frequently (25% - 50% of the time) **Walking** Frequently (25% - 50% of the time) **Visual / Audio / Speaking** Able to access and interpret client information received from the computer and able… more
- Raymond James Financial, Inc. (St. Petersburg, FL)
- …of ServiceNow Modules (ie, ITSM, ITOM, ITBM/ SPM, GRC/ IRM, SecOps, Vulnerability Response, Service Portal, SAM Pro, Integration Hub, and/or Performance Analytics.) ... + Development skills in JavaScript on the ServiceNow Platform + Experience with integrations (eg, REST APIs, LDAP, Active Directory, JDBC, Orchestration, etc.) + Experience with Scoped Applications + Experience with Flow Designer, preferred + Experience with… more
- Karen Clark & Company (Boston, MA)
- …Conduct literature surveys of geohazards related to earthquakes and building vulnerability to earthquakes, implementing new studies for loss modeling applications + ... Collect and analyze loss data regarding earthquakes, liquefaction, etc. + Perform validation tests on model loss estimates + Contribute to preparing technical documents, presentations related to scientific models. + Conduct post-event damage surveys for… more
- Truist (Raleigh, NC)
- …ensure timely remediation actions are taken. + Prepare and present vulnerability management reports to senior management, highlighting key findings and ... recommendations. + Demonstrates good judgement and problem-solving skills. Reacts and adapts to changing circumstances rapidly. + Mentor other DAST teammates **Required Qualifications:** The requirements listed below are representative of the knowledge, skill… more
- TekSynap (Washington, DC)
- …during the lifecycle of the system includingupdating network diagrams, vulnerability scans, STIG checklists,hardware/software lists, and SCRM certificates. + ... Maintainsresponsibility for the day-to-day security operations of thesystem ensuring the network, system, application, or service isoperated, maintained, and disposed ofin accordance withDIAsecurity policies and procedures outlined in the securityauthorization… more
- Lockheed Martin (Orlando, FL)
- …with security and regulatory requirements, including implementing security scanning and vulnerability management tools * Develop and maintain documentation for CI/CD ... pipelines, including pipeline architecture, configuration, and troubleshooting guides\. This position will require the selected candidate to have or obtain an Interim Secret level U\.S\. government security clearance before starting with Lockheed Martin\.… more
- eVisit (Mesa, AZ)
- …across infrastructure, including network segmentation, encryption, access controls, and vulnerability management. + Collaborate with the security and compliance team ... to ensure adherence to regulations like HIPAA, GDPR, and other relevant standards in healthcare. + Create comprehensive documentation for infrastructure architecture, operational procedures, and incident response plans. Share best practices and lessons learned… more
Recent Jobs
-
IT/IS Risk Management & Governance Executive (Charlotte)
- Usaa (Charlotte, NC)
-
Chief Engineer I, Cherry Creek - Full Time
- Macy's (Denver, CO)