- NPK International Inc. (Cheyenne, WY)
- …Any moment is a chance to shine **S** - Sincere - Authenticity starts with vulnerability **E** - Enterprising - Agility is the key to opportunity How To Apply ... require a reasonable accommodation for any part of the application or hiring process may contact the Manager , HR Governance& Compliance at_ _[email protected]_ _._ more
- JPMorgan Chase (Plano, TX)
- …IBM software maintenance by running SYSMOD reports, managing HIPER and system vulnerability fixes and responding to HOLDDATA actions required + Perform on-call ... + Experience with Db2 ISV products like Broadcom/CA Platinum Utilities, BMC Recovery Manager and Db2 IBM tools including Db2 Sort and High Performance Unload +… more
- NPK International Inc. (Warrington, PA)
- …- Any moment is a chance to shine **S** - Sincere - Authenticity starts with vulnerability **E** - Enterprising - Agility is the key to opportunity How To Apply _We ... require a reasonable accommodation for any part of the application or hiring process may contact the Manager , HR Governance & Compliance at_ _[email protected]_ _._ more
- Steampunk (Mclean, VA)
- …FISMA, FIPS, and NIST guidelines + Knowledge and experience with the vulnerability scanning execution, assessment, and analysis + Knowledge and experience with ... (CASP + Certified Information Systems Auditor (CISA) + Certified Information Security Manager (CISM) + Certified Ethical Hacker (CEH) + Current experience providing… more
- Nightwing (Lumber Bridge, NC)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... students as needed, addressing questions and challenges.** **Collaborate with program manager to ensure course content is accurate and mission-aligned.** **Maintain… more
- Nightwing (Lumber Bridge, NC)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... students as needed, addressing questions and challenges. + Collaborate with program manager to ensure course content is accurate and mission-aligned. + Maintain… more
- TekSynap (Washington, DC)
- …unauthorized access, misuse, or destruction. + Provide technical expertise in vulnerability assessments, risk analysis, network defense, and the application of ... DoD 8570 IAM Level III Baseline Certification: + Certified Information Security Manager (CISM) + Certified Information Systems Security Professional (CISSP) + GIAC… more
- Nightwing (Fort Lewis, WA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... students as needed, addressing questions and challenges.** **Collaborate with program manager to ensure course content is accurate and mission aligned.** **Maintain… more
- General Dynamics Information Technology (Mclean, VA)
- …Risk, and Compliance (GRC) program, supporting the Information System Security Manager (ISSM) in ensuring the unyielding security and integrity of mission-critical ... STIGs applied to operating systems, network devices, and applications. + Vulnerability Management: Work with security engineering to proactively identify and assess… more
- Improveit Home Remodeling (Columbus, OH)
- …best practices (Zero Trust, endpoint protection, PCI-DSS for call recordings, vulnerability management) + Lead disaster recovery planning and testing, including ... certifications highly desirable: VCIX, CCNP, AWS/Azure Architect, Microsoft Endpoint Manager , Five9 Engineer + Demonstrated experience in 24/7 on-call rotations… more