- Insight Global (Mclean, VA)
- …Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Ethical ... Asset Management (HWAM, SWAM) Identity and Access Management (IdAM) Vulnerability Management Event Management Network and Data Protection Experience integrating… more
- Truist (Richmond, VA)
- …Team Lead will oversee a team of engineers responsible for Linux vulnerability remediation and patch management across enterprise systems. This role requires a ... infrastructure. Ansible automation will be a key tool for streamlining vulnerability remediation and patch management processes, enabling efficient and consistent… more
- TEKsystems (Tulsa, OK)
- …Enhance network security, stability, and performance by completing firmware upgrades and vulnerability management on all core and edge infrastructure by November 15, ... 2025 * Priority #5 - TEM (Telcom Expense Management) - Implement a new Telecommunications Expense Management platform to optimize cost management, improve visibility, and streamline telecom billing operations. Skills Network engineering, Ccna, ccnp, Data… more
- CIBC (Chicago, IL)
- …information security domains including network security, IAM, data protection, vulnerability management, application security, etc. + Awareness of emerging ... technologies and risks + Proven track record of managing banking regulatory examinations (eg FRB) and state specific oversight (eg NYDFS) + Demonstrated experience with FFIEC IT/Cyber Exam Handbook and GLBA Safeguards rule compliance. + Strong understanding of… more
- Vanguard (Malvern, PA)
- …researches information security standards; conducts system security and vulnerability analyses and risk assessments; studies architecture/platform; identifies ... integration issues. 4. Delivers the implementation of security systems by confirming intrusion detection methodologies and equipment; directs equipment and software installation and calibration; prepares preventive and reactive measures. Creates, transmits,… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The Technical Lead is responsible for providing hands-on… more
- Insight Global (Sterling Heights, MI)
- …DoD RMF controls. These policies include, but are not limited to: * Vulnerability management * POA&M management * Personnel onboarding and offboarding * Incident ... response * Provide advisory to management regarding changes that may impact the security posture of the system * Preparation and submission of system security plans to upstream accrediting organizations $45-75/hr. Exact compensation may vary based on several… more
- Emory Healthcare/Emory University (Atlanta, GA)
- …Tenable, and CrowdStrike platforms for enhanced security operations and vulnerability management. + Strong documentation and reporting skills, including the ... ability to maintain dashboards, monthly reports, and audit-ready inventory records. + Ability to collaborate effectively with distributed IT teams, departments, faculty, and central OIT groups within a large research or academic environment. NOTE: This role… more
- Lockheed Martin (Grand Prairie, TX)
- …offensive, defense and full spectrum cyber operations * Conducting vulnerability research, reverse engineering, penetration testing \(red/blue teams\) * Developing ... and integrating low\-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit… more
- Dollar Tree (Pittsburgh, PA)
- …and conduct Asset Protection audits to create awareness, detect areas of vulnerability and/or violations of policies + Provide direction, coaching and support with ... the investigation of suspected dishonesty, fraud, and known crimes at locations where needed + Conduct investigations of large cash losses, robberies, burglaries, etc. + Monitor, analyze, and follow-up on statistical data related to inventory or cash losses +… more