- TekSynap (Virginia Beach, VA)
- …EvaluateSTIG to ensure compliance with DoD security requirements. + Perform vulnerability assessments utilizing the Assured Compliance Assessment Solution (ACAS) and ... documentation, Cybersecurity Workforce (CSWF) training, and certification tracking. + Research , interpret, and communicate Cyber Task Orders (CTOs), ensuring proper… more
- JPMorgan Chase (Wilmington, DE)
- …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best ... the ability to perform targeted, covert security tests with vulnerability identification, exploitation, and post-exploitation activities + Strong understanding of… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Provide expert-level guidance on security policy development, system hardening, vulnerability management, and incident response. + Operate independently on… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... + Security Knowledge: Understanding security protocols, threat modeling, and vulnerability assessment. + Experience with Cloud Technologies: Familiarity with cloud… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... CI/CD pipeline and the continuous automated/enhanced assessments or O&M of vulnerability scan tools + Facilitates meetings, analyze authorization documents and… more
- CompuCom (Trenton, NJ)
- …+ **Security Automation** : Implement security-first practices including automated vulnerability scanning, compliance monitoring, and incident response + **Access ... Azure, Kubernetes, Terraform, and modern DevOps practices + **Innovation Drive** : Research and evaluate emerging technologies, tools, and practices that can benefit… more
- Scotiabank (Dallas, TX)
- …& acquisitions, corporate banking, institutional equity sales, trading and research , fixed income products, derivatives, energy, foreign exchange and precious ... disciplines, including Cloud Security, AI/ML, Network Security, Threat Modeling, Vulnerability Management, and Technology Resiliency. * Advanced analytical reasoning… more
- Arkansas Electric Cooperative Corporation (Little Rock, AR)
- …cyber threats. This role provides hands-on experience in security monitoring, vulnerability assessment, and incident response while learning industry best practices. ... threats. + Support the Cyber Security team in conducting vulnerability assessments and penetration testing. + Participate in the...cyber security policies and procedures. + Help in the research and analysis of emerging cyber threats and security… more
- Intercontinental Exchange (ICE) (Atlanta, GA)
- …services + Demonstrated interest in intelligence analysis, threat hunting, and/or vulnerability research Specific Technologies: + Security automation tools, ... day-to-day maintenance and management of threat intelligence workflows, including vulnerability management, threat hunting, coordinating with incident response to… more
- Golden Route Operations (Las Vegas, NV)
- …current on vulnerabilities, infiltration tactics, forensics, and threats through ongoing research . + Conduct vulnerability assessments to pinpoint weaknesses, ... testing tools such as Kali, Metasploit, Burp, Wireshark, Nmap, Netcat, and vulnerability scanners. + Preferred: Adept at scripting with PowerShell, automation, and… more