- Lockheed Martin (Grand Prairie, TX)
- …114,000 people worldwide and is principally engaged in the research , design, development, manufacture, integration, and sustainment of advanced technology ... troubleshooting, basic interpretation, and test results analysis * Experience with vulnerability characterization * Knowledge of E3 effects on military vehicles,… more
- Global Resource Solutions (Valparaiso, FL)
- …proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system + Ensure that data ownership and ... issues outside of area of expertise or responsibility with SSE + Provide expert research and analysis in support of expanding programs and area of responsibility +… more
- UnityPoint Health (West Des Moines, IA)
- …A background or interest in privacy issues relating to the conduct of medical research is a plus! Location: Applicants must reside in the Midwest as there will ... and team members in establishing methods to improve efficiency and reduce vulnerability to privacy issues. + Ensure Markets have appropriate Business Associate… more
- Oracle (Lincoln, NE)
- …+ Enforce strong security and compliance standards through access control, vulnerability management, and encryption best practices. + Partner closely with applied ... + Knowledge of DevOps and CI/CD pipelines. **Additional Skills** + Strong research and evaluation capabilities for new technologies and approaches. + Advanced… more
- DataRobot (Boston, MA)
- …and educate developer teams on secure coding practices. **Customer Trust & Vulnerability Management:** + Customer Engagement: Act as the external face of DataRobot ... + Be Better Together + Debate, Decide, Commit + Deliver Results + Overcommunicate Research shows that many women only apply to jobs when they meet 100% of… more
- CACI International (Sterling, VA)
- …to work 100% on-site. You will help perform important reverse engineering and vulnerability research to help our exploitation mission. You will work, both ... independently and as part of a team, to drive development and hone new skills. This role offers a unique opportunity to gain hands-on experience in a fast-paced environment, working alongside experienced professionals to enhance the nation's cybersecurity… more
- AireSpring (Chicago, IL)
- …Lead annual compliance audits. + Manage endpoint protection, MDM, MFA, and vulnerability management. + Work closely with 3rd party consultants and internal ... troubleshooting and system architecture. + Possess proven abilities to research , evaluate, and recommend new technologies. Technical Qualifications + Bachelor's… more
- US Courts (Memphis, TN)
- …systems. Develop upgrade procedures and plan for future growth. Conduct vulnerability assessments and implement mitigation strategies; apply patches and security ... manner they can understand; Provide excellent customer service; Ability to research and resolve difficulties while complying with regulations, rules, and procedures;… more
- BOOZ, ALLEN & HAMILTON, INC. (Warner Robins, GA)
- …Cybersecurity, or IT Service Management + Experience in conducting enterprise vulnerability scanning using security applications such as ACAS, performing risk ... engineering methods to solution development life cycle activities + Ability to research emerging technology and apply it to cutting-edge problems + Possession of… more
- ARSIEM (Annapolis Junction, MD)
- …Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP Required Capabilities + Perform vulnerability and penetration testing using a wide variety of tools + ... Research and evaluate emerging technologies relevant to information systems security; interpret agency-specific and federal security regulations + Perform both… more