- Insight Global (Fort Meade, MD)
- …vulnerabilities. This role involves advanced reconnaissance, network mapping, vulnerability assessment, and exploitation planning to strengthen operational ... flaws, misconfigurations, and insecure protocols; assess risk and impact. Research and evaluate exploit techniques for known vulnerabilities. Provide recommendations… more
- SpaceX (Hawthorne, CA)
- …+ Secure/authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... maintaining productive working relationships with other engineering teams are paramount to success here. If you are passionate about building quality products, love the challenges of outsmarting adversaries, and want to make an impact on an interplanetary… more
- Callen-Lorde Community Health Center (New York, NY)
- …and regardless of ability to pay. In addition, we are continuously pioneering research , advocacy and education to drive positive change around the world, because we ... the organization's cybersecurity program, including policies, controls, incident response, vulnerability management, and regulatory compliance (HIPAA, HITECH, OMNIBUS). +… more
- Nightwing (MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a cleared Full time… more
- AeroVironment (Jessup, MD)
- … research . + Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. + Develop innovative tradecraft, exploitation ... techniques, and concepts of operation. + Leverage knowledge of AMOD and proficiency in AMOD tools. + Work closely with operators and partners to effectively analyze and process intelligence information. + Provide subject matter expertise to not only the… more
- American Family Insurance - Corporate (Madison, WI)
- …Participate in the development, integration, and testing of cyber product + Research , engineer, and integrate new security solution + Perform Cyber Identity incident ... triage, determine potential impact, and identify specific vulnerability + Participate in the development and maintenance of security system and solution + Build… more
- Amentum (Wahiawa, HI)
- …abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development. + Use information collected from a ... in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or… more
- ManTech (Fort Meade, MD)
- …intelligence organizations. Based upon this analysis, provide impact and vulnerability assessments, recommendations, and countermeasures to threats. + Collect, ... of degree. + 3+ years of experience in intelligence, counterintelligence, or research support. + Demonstrated ability to communicate with senior government customers… more
- CAE USA INC (Arlington, TX)
- …The ISSE participates with software and hardware approvals assisting with research , providing analysis, assessing risk and making recommendations. The ISSE also ... Management: Firewalls, Data Protection Controls, + Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG). + Continuous Monitoring . Patch/STIG .… more
- Anywhere Real Estate (Houston, TX)
- …will assist with identifying and responding to incidents as well as conducting research and development in cyber security to proactively propose improvements for how ... Knowledge of Splunk and writing SPL. + Experience in Vulnerability Assessment, IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet analysis,… more