- JPMorgan Chase (Wilmington, DE)
- …have the ability to perform targeted, covert security tests with vulnerability identification , exploitation, and post-exploitation activities + Strong ... advise cross-functional teams on security strategy and risk management. JPMC's Assurance Operations organization is looking to expand its **Cybersecurity Red Team**… more
- New York State Civil Service (Rochester, NY)
- …shift will be discussed at time of interview.Under the direction of senior leadership within the Office of Information Technology Services Chief Information Security ... and response to all forms of threat intelligence and vulnerability announcements received from many third parties such as...support Tier 0 and Tier 1 analysts in the identification , triage, and escalation of security events. * Monitor… more
- Guidehouse (Mclean, VA)
- … assessments; operational threat assessments; + Knowledge of information assurance management; cybersecurity and other automated vulnerability scanning ... aggregate, conceptualize, analyze, and prioritize requirements associated with Insider Threat identification and mitigation. **What You Will Need** **:** + An ACTIVE… more
- New York State Civil Service (Rochester, NY)
- …shift will be discussed at time of interview.Under the direction of senior leadership within the Office of Information Technology Services Chief Information Security ... and response to all forms of threat intelligence and vulnerability announcements received from many third parties such as...include, but are not limited to:* Participate in the identification , triage, and escalation of security events. * Respond… more
- CACI International (San Antonio, TX)
- …Sensing & Warning (AS&W) alerts and processing; knowledge and experience processing Information Assurance Vulnerability Alert (IAVA) notices. - ** ** **What You ... documentation, and coordination; detection of events; preliminary analysis and identification ; preliminary response actions; incident analysis; response and recovery;… more
- Intuit (San Diego, CA)
- …depth, audit rigor, and business alignment to shape how Intuit approaches assurance in high-risk and rapidly evolving domains such as cloud platforms, AI/ML, ... large volumes of security logs, blockchain transaction data, wallet addresses, vulnerability scan outputs, penetration test results, and threat intelligence feeds… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing ... they meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and accreditation. Provides… more
- COMSO, Inc (Fort Meade, MD)
- …may be substituted for a bachelor's degree. + DoD 8570 compliance with Information Assurance Management (IAM) Level I is required. + If assigned to DES Mobility ... Provide support for a program, organization, system, or enclave's information assurance program. + Provide support for proposing, coordinating, implementing, and… more
- Amentum (Wahiawa, HI)
- …information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information ... analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs). + Prepare and… more
- ARSIEM (Annapolis Junction, MD)
- …+ Support a program, organization, system, or enclave's information assurance program. + Support proposing, coordinating, implementing, and enforcing information ... meet security requirements for processing classified information. + Perform vulnerability /risk assessment analysis to support security authorization. + Provide… more