• CI Poly Digital Network Exploitation Analyst

    Insight Global (Fort Meade, MD)
    …vulnerabilities. This role involves advanced reconnaissance, network mapping, vulnerability assessment, and exploitation planning to strengthen operational ... flaws, misconfigurations, and insecure protocols; assess risk and impact. Research and evaluate exploit techniques for known vulnerabilities. Provide recommendations… more
    Insight Global (12/18/25)
    - Related Jobs
  • Security Software Engineer - Top Secret Clearance

    SpaceX (Hawthorne, CA)
    …+ Secure/authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success here. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an interplanetary… more
    SpaceX (12/18/25)
    - Related Jobs
  • Director, Infrastructure Operations

    Callen-Lorde Community Health Center (New York, NY)
    …and regardless of ability to pay. In addition, we are continuously pioneering research , advocacy and education to drive positive change around the world, because we ... the organization's cybersecurity program, including policies, controls, incident response, vulnerability management, and regulatory compliance (HIPAA, HITECH, OMNIBUS). +… more
    Callen-Lorde Community Health Center (12/18/25)
    - Related Jobs
  • Technical Instructor SME - Radio Frequency…

    Nightwing (MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a cleared Full time… more
    Nightwing (12/18/25)
    - Related Jobs
  • Exploitation Analyst (EA)

    AeroVironment (Jessup, MD)
    research . + Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. + Develop innovative tradecraft, exploitation ... techniques, and concepts of operation. + Leverage knowledge of AMOD and proficiency in AMOD tools. + Work closely with operators and partners to effectively analyze and process intelligence information. + Provide subject matter expertise to not only the… more
    AeroVironment (12/17/25)
    - Related Jobs
  • Cybersecurity Engineer (Hybrid)

    American Family Insurance - Corporate (Madison, WI)
    …Participate in the development, integration, and testing of cyber product + Research , engineer, and integrate new security solution + Perform Cyber Identity incident ... triage, determine potential impact, and identify specific vulnerability + Participate in the development and maintenance of security system and solution + Build… more
    American Family Insurance - Corporate (12/17/25)
    - Related Jobs
  • Cyber Intelligence Analyst

    Amentum (Wahiawa, HI)
    …abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development. + Use information collected from a ... in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or… more
    Amentum (12/17/25)
    - Related Jobs
  • Supply Chain Risk Management Analyst

    ManTech (Fort Meade, MD)
    …intelligence organizations. Based upon this analysis, provide impact and vulnerability assessments, recommendations, and countermeasures to threats. + Collect, ... of degree. + 3+ years of experience in intelligence, counterintelligence, or research support. + Demonstrated ability to communicate with senior government customers… more
    ManTech (12/17/25)
    - Related Jobs
  • Information System Security Engineer

    CAE USA INC (Arlington, TX)
    …The ISSE participates with software and hardware approvals assisting with research , providing analysis, assessing risk and making recommendations. The ISSE also ... Management: Firewalls, Data Protection Controls, + Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG). + Continuous Monitoring . Patch/STIG .… more
    CAE USA INC (12/17/25)
    - Related Jobs
  • Analyst, Security Operations - US Based Remote

    Anywhere Real Estate (Houston, TX)
    …will assist with identifying and responding to incidents as well as conducting research and development in cyber security to proactively propose improvements for how ... Knowledge of Splunk and writing SPL. + Experience in Vulnerability Assessment, IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet analysis,… more
    Anywhere Real Estate (12/16/25)
    - Related Jobs