- Arkansas Electric Cooperative Corporation (Little Rock, AR)
- …cyber threats. This role provides hands-on experience in security monitoring, vulnerability assessment, and incident response while learning industry best practices. ... threats. + Support the Cyber Security team in conducting vulnerability assessments and penetration testing. + Participate in the...cyber security policies and procedures. + Help in the research and analysis of emerging cyber threats and security… more
- Intercontinental Exchange (ICE) (Atlanta, GA)
- …services + Demonstrated interest in intelligence analysis, threat hunting, and/or vulnerability research Specific Technologies: + Security automation tools, ... day-to-day maintenance and management of threat intelligence workflows, including vulnerability management, threat hunting, coordinating with incident response to… more
- Chenega Corporation (Oakton, VA)
- …requirements. + Enhance IR workflows with automated threat intelligence, vulnerability data, and detection signals. + Troubleshoot automation failures, workflow ... firewalls, TIPs, IAM, cloud security). + Strong understanding of vulnerability requirements, system STIGing, RMF, and ATO life cycle...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more
- Bank of America (Boston, MA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- BOOZ, ALLEN & HAMILTON, INC. (Riverdale, MD)
- …features, including App-ID, User-ID, Threat Prevention, and GlobalProtect. You'll manage the research of new technologies and market trends to further develop and ... Manage infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. +… more
- Golden Route Operations (Las Vegas, NV)
- …current on vulnerabilities, infiltration tactics, forensics, and threats through ongoing research . + Conduct vulnerability assessments to pinpoint weaknesses, ... testing tools such as Kali, Metasploit, Burp, Wireshark, Nmap, Netcat, and vulnerability scanners. + Preferred: Adept at scripting with PowerShell, automation, and… more
- Micron Technology, Inc. (Boise, ID)
- …Bedrock). + Practical experience with DevSecOps for AI systems, including model vulnerability scanning and secure data management; familiarity with code scanning and ... vulnerability management tools. + Demonstrated ability to design and...Contributions to open-source AI frameworks or publications in AI research . + Ability to communicate complex technical concepts effectively… more
- General Dynamics Information Technology (Bossier City, LA)
- …that arise in the field for current releases of IMIS. + Run vulnerability assessments STIGS/SCAP + add additional security controls to reduce the attack surface ... check, etc. the packages provided to the customer. + Research latest CVEs for software and hardware we use...latest information about OS patches and CVEs. + Run vulnerability assessments of lab systems and hardware. + Update… more
- Leidos (Odenton, MD)
- …software through application security architecture software evaluations web application vulnerability assessment penetration testing and fuzzing, malware research ... and vulnerability mitigation. + Support Joint Operational Planning Groups and Teams (OPG/OPT), and develop and integrate Cyberspace capabilities into plans. + Develop concepts of support, courses of action, integrate command and external capabilities,… more
- Insight Global (Dallas, TX)
- …integrate, and perform initial configurations of security tools. * Vulnerability Management: Coordinate and conduct regular security assessments, penetration ... testing, and vulnerability scans to proactively identify and address security weaknesses. * Incident Response: Lead incident response efforts to promptly detect,… more