• Business Process Red Team Operator

    JPMorgan Chase (Wilmington, DE)
    …have the ability to perform targeted, covert security tests with vulnerability identification , exploitation, and post-exploitation activities + Strong ... advise cross-functional teams on security strategy and risk management. JPMC's Assurance Operations organization is looking to expand its **Cybersecurity Red Team**… more
    JPMorgan Chase (09/29/25)
    - Related Jobs
  • Information Technology Specialist 4 (Information…

    New York State Civil Service (Rochester, NY)
    …shift will be discussed at time of interview.Under the direction of senior leadership within the Office of Information Technology Services Chief Information Security ... and response to all forms of threat intelligence and vulnerability announcements received from many third parties such as...support Tier 0 and Tier 1 analysts in the identification , triage, and escalation of security events. * Monitor… more
    New York State Civil Service (08/23/25)
    - Related Jobs
  • Insider Threat Program Manager

    Guidehouse (Mclean, VA)
    … assessments; operational threat assessments; + Knowledge of information assurance management; cybersecurity and other automated vulnerability scanning ... aggregate, conceptualize, analyze, and prioritize requirements associated with Insider Threat identification and mitigation. **What You Will Need** **:** + An ACTIVE… more
    Guidehouse (10/09/25)
    - Related Jobs
  • Information Technology Specialist 2 (Information…

    New York State Civil Service (Rochester, NY)
    …shift will be discussed at time of interview.Under the direction of senior leadership within the Office of Information Technology Services Chief Information Security ... and response to all forms of threat intelligence and vulnerability announcements received from many third parties such as...include, but are not limited to:* Participate in the identification , triage, and escalation of security events. * Respond… more
    New York State Civil Service (08/23/25)
    - Related Jobs
  • Network Defense and Security Analyst

    CACI International (San Antonio, TX)
    …Sensing & Warning (AS&W) alerts and processing; knowledge and experience processing Information Assurance Vulnerability Alert (IAVA) notices. - ** ** **What You ... documentation, and coordination; detection of events; preliminary analysis and identification ; preliminary response actions; incident analysis; response and recovery;… more
    CACI International (07/22/25)
    - Related Jobs
  • Cybersecurity Audit Leader

    Intuit (San Diego, CA)
    …depth, audit rigor, and business alignment to shape how Intuit approaches assurance in high-risk and rapidly evolving domains such as cloud platforms, AI/ML, ... large volumes of security logs, blockchain transaction data, wallet addresses, vulnerability scan outputs, penetration test results, and threat intelligence feeds… more
    Intuit (09/19/25)
    - Related Jobs
  • Information Security Analyst Advisor

    General Dynamics Information Technology (Annapolis Junction, MD)
    …support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing ... they meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and accreditation. Provides… more
    General Dynamics Information Technology (10/09/25)
    - Related Jobs
  • Information Systems Security Officer III…

    COMSO, Inc (Fort Meade, MD)
    …may be substituted for a bachelor's degree. + DoD 8570 compliance with Information Assurance Management (IAM) Level I is required. + If assigned to DES Mobility ... Provide support for a program, organization, system, or enclave's information assurance program. + Provide support for proposing, coordinating, implementing, and… more
    COMSO, Inc (09/02/25)
    - Related Jobs
  • Cyber Intelligence Analyst

    Amentum (Wahiawa, HI)
    …information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information ... analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs). + Prepare and… more
    Amentum (09/18/25)
    - Related Jobs
  • Information Systems Security Officer 2

    ARSIEM (Annapolis Junction, MD)
    …+ Support a program, organization, system, or enclave's information assurance program. + Support proposing, coordinating, implementing, and enforcing information ... meet security requirements for processing classified information. + Perform vulnerability /risk assessment analysis to support security authorization. + Provide… more
    ARSIEM (10/14/25)
    - Related Jobs