- Sumitomo Pharma (Montpelier, VT)
- …of early- to late-stage investigational assets, we aim to accelerate discovery, research , and development to bring novel therapies to patients sooner. For more ... configure, test, and optimize DLP solutions. + Conduct risk assessments and vulnerability analyses related to data protection. + Provide training and awareness… more
- Noblis (Arlington, VA)
- …and implementation of strategy doctrine, policy, guidance, programs, projects, operational research , analysis, and testing relating to the AF CWMD Range of ... general categories of analytic quantitative assessment, including: + Threat and Vulnerability Assessments, + Basic Challenge Sources, + Attack Characterization, +… more
- Red Hat (Raleigh, NC)
- …are seeking an experienced ML Ops engineer to work closely with our product and research teams to scale SOTA deep learning products and software. As an ML Ops ... engineer, you will work closely with our technical and research teams to manage training and deployment pipelines, create DevOps and CI/CD infrastructure, and scale… more
- Rincon Consultants (Ventura, CA)
- …Community Wildfire Protection Plans, and related planning documents through research , technical analysis, policy development, and writing for public audiences. ... + Contribute to Climate Change Vulnerability Assessments, including evaluating risks such as extreme heat, wildfire, flooding, and sea level rise. + Contribute to… more
- Three Saints Bay (Austin, TX)
- …vulnerability assessments, risk analyses, and countermeasures determinations. + Research , analyze, interpret, evaluate, and integrate extremely complex all-source ... Provide technical threat expertise and apply in-depth intelligence analytic skills to research , identify, assess, design, and report on highly complex technical and… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... The position requires an individual to review and thoroughly research requests for the release of information in accordance...the scanning team to scan any documents needed for research * Submits requests to the search team to… more
- Meta (Washington, DC)
- …offensive security engagements, including Red Team operations, threat-based evaluations, and vulnerability research and exploitation against both internal and ... security work to inform and drive our engagements 4. Incorporate Threat Intelligence research to track APT trends and help partners test their environments against… more
- University of Miami (Miami, FL)
- …all inquiries relating to any perceived or alleged security breach. + Performs research on new and improved ways to properly protect the organization's information ... collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, network scanners, log aggregation tools preferred + Ability to… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... with tasks related to model development, data analysis, and research , while learning about practical applications of AI in...clean, and process large datasets for model training.** **Conduct research on current AI trends, analyze data to extract… more
- IBM (Alexandria, VA)
- …qualifications: . History of presenting at security conferences . Track record in vulnerability research and CVE assignments . Knowledge of Windows APIs . ... that improves detection and response capabilities . Perform/present technical security research **Required technical and professional expertise** . 3+ years of red… more