- Capgemini Government Solutions (Los Angeles, CA)
- …in information security technologies, concepts, and methodologies to combat potential cyber threats and ensure regulatory compliance with CGS. Successful applicants ... existing and proposed architectures and recommend changes or enhancements Conduct or facilitate threat modeling of services and applications that tie to the risk and… more
- Deloitte (Los Angeles, CA)
- …cyber defense technology options for best fit based on mission, architecture and threat + Design, implement, configure and/or tune Cyber Defense technology + ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...to meet best fit for the mission architecture and threat . Technologies include SIEM, vulnerability assessment, discovery,… more
- Deloitte (Los Angeles, CA)
- …Center (SOC) to provide a secure environment that facilitates incident response and threat hunting activities. + Provide oversight over more junior cyber ... for efforts related to the SOC + Manage the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability … more
- The Walt Disney Company (Burbank, CA)
- …ensure the automation of detection processes to improve efficiency and accuracy. + ** Cyber Threat Intelligence Collaboration:** Partner with the CTI team to ... are seeking a skilled and experienced Senior Security Engineer with a specialization in threat hunting to join our our GIS Anomaly Detection Team. In this role, you… more
- KPMG (Los Angeles, CA)
- …improvements + Execute response activities which may include incident response, incident management , driving remediation or threat mitigation, threat hunting ... are, join our team. KPMG is currently seeking a Cyber Operations Content Development & Engineering to join our... threat detection engineering, threat analysis, threat hunting, incident response, vulnerability , and configuration… more
- TEKsystems (Burbank, CA)
- …Required Qualifications *5-8 years of experience in Information Technology and/or information technology/ cyber security and/or cyber risk management *5 years ... practical experience. Skills: Application security, Security architecture, risk assessment, vulnerability , cyber security, aws Top Skills Details: Application… more
- Teledyne (El Segundo, CA)
- …development of security architectures, requirements, and test/analysis procedures.** **Create threat models to analyze potential security weaknesses in embedded ... products.** **Build the infrastructure for internal/external penetration tests and vulnerability assessments.** **Develop and implement tailored security architectures and… more
- Old Dominion Freight Line (Carson, CA)
- …Maintain current knowledge of information security threats + Implement, monitor, and maintain threat intelligence data + Evaluate vulnerability scans for risk as ... secure, and robust systems; helping the organization understand advanced cyber threats and helping to create strategies to protect...well as develop and manage vulnerability mitigation plans + Lead security assessments such as… more
- Southern California Edison (Rosemead, CA)
- …programs. + Five (5) or more of experience in Cybersecurity, Risk Management , Incident Response, Threat Analysis, Engineering, and/or development, maintenance, ... know that a multi-layered strategy is key to combating cyber threats. In this job, you'll develop and implement...team of SMEs to drive a robust cybersecurity risk management , engineering, testing, and architecture framework throughout SCE. Guide… more
- Sony Pictures Entertainment (Culver City, CA)
- …strategies, zero-trust models, identity and access management (IAM), threat modeling, GPDR and privacy, vulnerability assessment techniques, and ... security framework across network, applications, and cloud environments, proactively addressing cyber risks and ensuring alignment with the Sony Pictures goals. Key… more
- Deloitte (Los Angeles, CA)
- …Center (SOC) to provide a secure environment that facilitates incident response and threat hunting activities. * Manage data from the security information and event ... management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices *… more