- CREO (Durham, NC)
- …of work (SOWs), and reusable delivery accelerators. POSITION RESPONSIBILITIES + Vulnerability & Framework Assessment Responsibilities + Schedule, run, and interpret ... vulnerability scans using tools like Tenable or Qualys +...Work with clients to understand their technical requirements, conducting research , and synthesizing information to inform technology-related recommendations +… more
- FirstBank PR (San Juan, PR)
- …monitoring compliance of agreed-upon contracts/terms + Coordinate Penetration Tests and Vulnerability Scans and evaluate results to proactively identify and fix ... and serve as the custodian of all risk response efforts regarding the Vulnerability Management process + Actively participate in the Vulnerability Management… more
- Cambridge International Systems Inc (Norfolk, VA)
- …assessment tools (eg, Metasploit, Cobalt Strike). + Hands on experience performing vulnerability research or developing proof-of-concept exploits. + Knowledge of ... + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial assessments. + Support the Cyber Survivability Test Planning… more
- MUFG (Tempe, AZ)
- …This role focuses on comprehensive application security testing and vulnerability management across the software development lifecycle. It involves conducting ... leverage deep expertise in application security testing, secure coding, and vulnerability management to enhance the security posture of enterprise applications. The… more
- Leidos (Ashburn, VA)
- …Digital media forensic + Monitoring and detection + Incident Response + Vulnerability assessment and penetration testing + Cyber intelligence analysis + Extensive ... GSNA - System andNetwork Auditor + GISF - SecurityFundamentals + GXPN - Exploit Researcher and Advanced PenetrationTester + GWEB - Web Application Defender + GNFA -… more
- Medtronic (Mounds View, MN)
- …requirement tracking. + Oversee security monitoring, incident response, vulnerability assessments, mitigation implementation, and product-level intrusion detection ... and information assurance. + Experience as an analyst, engineer, developer, researcher or architect with responsibility and/or demonstratable knowledge in two or… more
- Google (Seattle, WA)
- …security incidents, policy questions and technical security issues. The Abuse and AI Vulnerability Rewards Program (VRP) is a bug bounty program which covers abusive ... bugs to determine impact, and what, if any, reward should be issued to the researcher under VRP rules. + Participate in the VRP community and engage in cross-team… more
- Rubrik (Palo Alto, CA)
- …and Information Security. + Support the analysis and response to Security Researcher findings. + Define the strategy and implementation of AI capabilities to ... experience across SDLC activities such as threat modeling, secure code review, vulnerability management, and penetration testing + 7+ years direct people management… more
- Chemung Canal Trust Company (Elmira, NY)
- …and continually improve its security posture and cyber-maturity rating. + Review, research , document and take appropriate action on security notifications. + Assist ... with vulnerability assessments and penetration testing with appropriate remediation. +...of all technology and systems related controls. + Perform research on potential end user and system breaches or… more
- Amentum (Fort Belvoir, VA)
- …cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing ... Red Cell Cyber Analyst will deploy in direct support of specific vulnerability assessments to provide local SME advisory. **Responsibilities/Tasks** The Red Cell… more