- Sony Pictures Entertainment (Culver City, CA)
- …strong relationships with internal security teams (SOC, incident response, vulnerability management ), legal, content protection, security awareness, ... a related field (or equivalent experience). Qualifications: 10+ years of progressive experience in cyber security , with at least 5 years in a dedicated cyber… more
- CACI International, Inc. (Miami, FL)
- …Provide services for monitoring, management , analysis, auditing (eg, vulnerability reports, scorecards, Security Technical Implementation Guides (STIGs), and ... Cyber Operations Job Category: Engineering Time Type: Full...Experience with endpoint security such as anti-virus, vulnerability scanning and patch management . This position… more
- Virginia Department of Human Resource Management (Richmond, VA)
- …each business partner to ensure positive outcomes. *Works collaboratively with technology management peers to ensure security is appropriately included in all ... Deputy Chief Information Security Officer (Hybrid Work Schedule) Job no: 5043311...other technology managers in project selection and scoping, project management , change management , technology evaluations and planning,… more
- Presidio (New York, NY)
- …Experience in providing guidance in strategic, program and project initiatives in cyber security . Bachelor's degree in technology or sales related field ... of security trends, threat landscape and frameworks like the cyber kill-chain. Ability to listen and communicate effectively with vendors, prospects, clients,… more
- Sony Pictures (Culver City, CA)
- …identity and access management (IAM), AI Security , Product Security , Threat modeling, GPDR and privacy, vulnerability assessment techniques, DevSecOps, ... Proficient in cloud security models (IaaS, PaaS, SaaS), cloud-native security tools, encryption and key management , privileged access management… more
- City of New York (New York, NY)
- …(CCM), Investigation, Revenue and Enforcement Administration (IREA), Office of Data Security Management (ODSM) and the Accountability Initiative and Change ... Monitoring (AICM). The Office of Data Security Management (ODSM) is responsible for implementing...solutions to the CISO to minimize the risk of cyber -attacks and insider vulnerabilities. Support/assist the CISO in the… more
- Nightwing (Sterling, VA)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- PSEG (Bethpage, NY)
- …various tasks related to Configuration Management with in IT Infrastructure and Cyber Security . These tasks include but not limited to creating and updating ... software and hardware assets for IT Infrastructure Areas. *Collaborate with the IT and cyber security teams to implement and support FIM tool(s) *Ensure Quality… more
- Claroty (Washington, DC)
- …a related field (or equivalent experience). 2-3 years of experience in information security compliance or risk management , preferably in a FedRAMP or ... with vulnerability scanning tools (eg, Nessus, Qualys) and interpreting security findings. Eligibility to obtain a security clearance is required.… more
- Tenable, Inc. (Columbia, MD)
- …in vulnerability assessment. Nessus is the most widely deployed vulnerability assessment solution, trusted by millions of security professionals worldwide. ... Who is Tenable? Tenable(R) is the Exposure Management company. 44,000 organizations around the globe rely...the globe rely on Tenable to understand and reduce cyber risk. Our global employees support 65 percent of… more
- Nightwing (Annapolis, MD)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission...Active and transferable US government issued TS/SCI with polygraph security clearance is required prior to start date. US… more
- Newberry Group (Chambersburg, PA)
- …Certified Network Defense (CND) v3. Red Hat Certified System Administrator (RHCSA) CCNA Security . Global Industrial Cyber Security Professional (GICSP) GIAC ... Newberry Group is a professional services firm, providing information security compliance, governance, program/project management , and mission-critical… more
- ValidaTek, Inc. (Pensacola, FL)
- …management platforms. Knowledge of DoD cybersecurity policies, RMF, and vulnerability management processes. Experience managing STIG compliance, IAVM ... security monitoring and endpoint ...sustainment. Understanding of DoD enclave architecture, boundary defense, and cyber defense tool integration. Experience with ITIL-based operational processes… more
- Axonius (New York, NY)
- …to engage in conversations with various different stakeholders ranging from IT and Security Operations, Threat & Vulnerability Management , Security ... will be responsible for building a business pipeline and selling the Axonius Security Asset Management platform software to State, Local and Education accounts… more
- Bank of America (Washington, DC)
- Cyber Security Vulnerability Identification and Management Sr Lead Chicago, Illinois;Washington, District of Columbia **To proceed with your application, ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Chicago/ Cyber - Security - Vulnerability -Identification-and- Management -Sr-Lead\_25011568-1) **Job Description:**… more
- EPS Corporation (Panama City Beach, FL)
- …Encryptor (HAIPE) for cryptographic interfaces. Experience shall include cyber security implementation and vulnerability management in Red Hat/Linux ... and expeditionary systems. Additional certifications in penetration testing, vulnerability management , and cyber security analytics (eg CompTIA… more
- Lockheed Martin (King Of Prussia, PA)
- … engineering requirements, including Hardware Assurance, Software Assurance, Cyber Security , Asymmetric Threat Vulnerability Management , Supply Chain ... principles and practices, including Hardware Assurance, Software Assurance, Cyber Security , Nuclear Surety, and Supply Chain Risk management * Strong… more
- Justworks (New York, NY)
- …leader who has passion for security , cyber defense, threat management , vulnerability management , and continuous testing. You have extensive ... 7 years of cyber security experience, especially in security operations, vulnerability and threat management . Experience in security engineering… more
- Bombardier (Wichita, KS)
- …NIST SP 800-171 + You have 3+ years hands-on experience in cyber security roles such as vulnerability management , penetration testing, and DevSecOps + ... to the team?** + Support the Vulnerability Management function, working with the Security Operations...testing, and system architectures recommendations + Perform analysis of cyber security vulnerability , threats and… more
- JPMorgan Chase (Columbus, OH)
- …SCCM, Puppet or similar + Expertise in cyber security endpoint security and vulnerability management domains + In-depth understanding of and ... understand platform requirements and streamline engineering and deployment processes + Supports Cyber Security Operations Center (SOC) and Attack Analysis teams… more