• Security Engineer - Continuous Diagnostics…

    Insight Global (Mclean, VA)
    …Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Ethical ... Asset Management (HWAM, SWAM) Identity and Access Management (IdAM) Vulnerability Management Event Management Network and Data Protection Experience integrating… more
    Insight Global (01/06/26)
    - Related Jobs
  • Linux Engineering Team Lead

    Truist (Richmond, VA)
    …Team Lead will oversee a team of engineers responsible for Linux vulnerability remediation and patch management across enterprise systems. This role requires a ... infrastructure. Ansible automation will be a key tool for streamlining vulnerability remediation and patch management processes, enabling efficient and consistent… more
    Truist (01/02/26)
    - Related Jobs
  • Technical Project Manager

    TEKsystems (Tulsa, OK)
    …Enhance network security, stability, and performance by completing firmware upgrades and vulnerability management on all core and edge infrastructure by November 15, ... 2025 * Priority #5 - TEM (Telcom Expense Management) - Implement a new Telecommunications Expense Management platform to optimize cost management, improve visibility, and streamline telecom billing operations. Skills Network engineering, Ccna, ccnp, Data… more
    TEKsystems (01/07/26)
    - Related Jobs
  • Sr. Manager , Information Security…

    CIBC (Chicago, IL)
    …information security domains including network security, IAM, data protection, vulnerability management, application security, etc. + Awareness of emerging ... technologies and risks + Proven track record of managing banking regulatory examinations (eg FRB) and state specific oversight (eg NYDFS) + Demonstrated experience with FFIEC IT/Cyber Exam Handbook and GLBA Safeguards rule compliance. + Strong understanding of… more
    CIBC (01/07/26)
    - Related Jobs
  • Senior Manager , Security Architecture…

    Vanguard (Malvern, PA)
    …researches information security standards; conducts system security and vulnerability analyses and risk assessments; studies architecture/platform; identifies ... integration issues. 4. Delivers the implementation of security systems by confirming intrusion detection methodologies and equipment; directs equipment and software installation and calibration; prepares preventive and reactive measures. Creates, transmits,… more
    Vanguard (01/06/26)
    - Related Jobs
  • Project Manager

    Nightwing (Sterling, VA)
    …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The Technical Lead is responsible for providing hands-on… more
    Nightwing (12/29/25)
    - Related Jobs
  • Information System Security Manager (ISSM)…

    Insight Global (Sterling Heights, MI)
    …DoD RMF controls. These policies include, but are not limited to: * Vulnerability management * POA&M management * Personnel onboarding and offboarding * Incident ... response * Provide advisory to management regarding changes that may impact the security posture of the system * Preparation and submission of system security plans to upstream accrediting organizations $45-75/hr. Exact compensation may vary based on several… more
    Insight Global (12/18/25)
    - Related Jobs
  • Information Technology Asset Manager

    Emory Healthcare/Emory University (Atlanta, GA)
    …Tenable, and CrowdStrike platforms for enhanced security operations and vulnerability management. + Strong documentation and reporting skills, including the ... ability to maintain dashboards, monthly reports, and audit-ready inventory records. + Ability to collaborate effectively with distributed IT teams, departments, faculty, and central OIT groups within a large research or academic environment. NOTE: This role… more
    Emory Healthcare/Emory University (12/16/25)
    - Related Jobs
  • Secure Software Engineering Asc. Manager

    Lockheed Martin (Grand Prairie, TX)
    …offensive, defense and full spectrum cyber operations * Conducting vulnerability research, reverse engineering, penetration testing \(red/blue teams\) * Developing ... and integrating low\-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit… more
    Lockheed Martin (12/11/25)
    - Related Jobs
  • Regional Asset Protection Manager

    Dollar Tree (Pittsburgh, PA)
    …and conduct Asset Protection audits to create awareness, detect areas of vulnerability and/or violations of policies + Provide direction, coaching and support with ... the investigation of suspected dishonesty, fraud, and known crimes at locations where needed + Conduct investigations of large cash losses, robberies, burglaries, etc. + Monitor, analyze, and follow-up on statistical data related to inventory or cash losses +… more
    Dollar Tree (11/26/25)
    - Related Jobs