- Red Hat (Olympia, WA)
- …+ Experience with software supply chain security, network security, red-teaming, vulnerability management , and incident response + Experience with Linux-based ... developer tools, including continuous integration, containers , and cloud-native technologies in general + Excellent verbal, presentation, and written communication… more
- NetApp (NC)
- …virtual infrastructure (cloud resources on AWS/Azure, Kubernetes technology, and containers ), logical access control, DevOps development process, secure coding ... compliance capabilities within cloud providers and technologies/processes around SIEM, vulnerability scanning, cloud security configuration, endpoint detection & response… more
- Truist (Richmond, VA)
- …Orchestration and Recovery; Compliance Automation and Audit Trails; Configuration Management ; Containers ; Application Release Automation; Deployment Strategies ... serves as the primary technical person for enterprise container security and management initiatives. This role is essential to addressing critical findings from the… more
- NetSEA Technologies (Aberdeen Proving Ground, MD)
- …input. * Act as a liaison between the project team and ISSOs for vulnerability management reporting, Army Cyber (ARCYBER) Cyber Tasking Order (CTO) compliance ... deliver Engineering reports and other cybersecurity materials required by Configuration Management and Product Manager Cybersecurity personnel. * Translate… more
- WM (Houston, TX)
- Waste Management (WM), a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed ... expand our lead in a market increasingly enhanced by technology, Waste Management is undertaking a substantial technology transformation. We are seeking talented… more
- GovCIO (Washington, DC)
- …with licensing. + Deploy and manage Java EE applications (WAR/EAR) via: + Management CLI + Admin Console + Automation scripts (Ansible, shell) + Enable rolling ... keystores. + Enforce RBAC (Role-Based Access Control) using the management realm. + Configure security domains, JAAS, and Elytron...+ Monitor and manage vulnerabilities in: + Code + Containers + Dependencies + Infrastructure + Integrate tools like… more
- Wawa, Inc. (IA)
- …security threats and vulnerabilities. + Operate and support application security vulnerability management , partnering with Technology Security Risk and ... field. + Proven track record for securing software. + Advanced knowledge of containers and container security. + Solid knowledge of AWS and AWS security. +… more