- Novo Nordisk Inc. (Plainsboro, NJ)
- …including monitoring of alerts, investigation of alerts, incident response, vulnerability response, threat intelligence, and digital forensics. Individuals in this ... and will also be responsible for performing technical risk and vulnerability assessments at the network, system, and application level. Some responsibilities… more
- Merck & Co. (Rahway, NJ)
- …Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning-Preferred Skills:Job Posting End Date:08/3/2025 *A job posting is ... effective until 11:59:59PM on the day BEFORE -the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID:R357429 more
- Compu-Vision Consulting, Inc. (Brooklyn, NY)
- Title: Cyber Command Vulnerability Management Specialist 3 Location: Brooklyn, NY Duration: 2 years Hybrid: 3 days on-site/2 days remote Job Description: The client ... requires a Vulnerability Management Specialist to serve as a subject matter...Specialist to serve as a subject matter expert for vulnerability management: Tasks Research, analyze and brief management and… more
- Santander Holdings USA Inc (Quincy, MA)
- …target systems, networks and applications by conducing systems, network, web vulnerability assessment and security testing. The incumbent is responsible for ... Conducts Software Composition Analysis, SAST, DAST and Penetration testing Post vulnerability assessment, work with various stakeholders to provide remediation to… more
- Insight Global (Tampa, FL)
- …the following: SAP, Service Now, AuditBoard, Splunk, Tenable, CyberArk, risk assessments, vulnerability assessments Benefit packages for this role will start on the ... 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid… more
- The Judge Group Inc. (Richardson, TX)
- …division multiplexing technologies to meet network services capacity, vulnerability , diversity and growth requirements. Responsibilities include: Perform detailed ... equipment engineering for network augments. This includes developing all the specifications required for installation forces to properly install, turn-up, inventory, and configure the equipment, obtaining appropriate management approvals, issuing purchase… more
- Urbanex Pest Control (Richmond, VA)
- …right thing, regardless of the consequences. We always show up wholeheartedly, embracing vulnerability and inspiring others by being a good person. * Commit to ... Better: We wake up every day with the relentless desire to become better. We face adversity head-on and inspire others to relate to challenges as opportunities for growth. * Wholehearted Connection : We root for one another in success and failure. We build a… more
- FanDuel (Atlanta, GA)
- …The successful candidate has a foundation in cybersecurity, automation, and vulnerability management. You will be responsible for developing and maintaining ... detection capabilities, automating security workflows, and contributing to a robust vulnerability management program. You will work with a team of security… more
- United Nations (New York, NY)
- …exploitation" means any actual or attempted abuse of a position of vulnerability , differential power, or trust, for sexual purposes, including, but not limited ... to, profiting monetarily, socially or politically from the sexual exploitation of another. The term "sexual abuse" means the actual or threatened physical intrusion of a sexual nature, whether by force or under unequal or coercive conditions. The term "sexual… more
- BankNewport (Middletown, RI)
- …IT systems within the organization. Manage IT infrastructure security programs, ( vulnerability management, patch management, asset inventory and end of life systems ... Experience with CIS controls, IT Risk Management, patch management and vulnerability management programs as well as compliance (experience with regulatory agencies… more
- SOS International LLC (Reston, VA)
- …/ limitation analysis, reverse engineering analysis / characterizations, facility and vulnerability assessments. This includes, but not limited to: Civil / ... industrial engineering and sub-disciplines of environmental. Power system, pipeline, petroleum, structural, and manufacturing engineering. Geotechnical, transportation, highway, and material science engineering. Seismic / earthquake, construction, hydrology,… more
- Metropolitan Transportation Authority (New York, NY)
- …and related planning and policy documents (such as the systemwide Climate Vulnerability Assessment) that communicate the importance of the MTA assets. Communicate ... strategies clearly and succinctly to both technical and non-technical audiences. Interface with other local, regional, and national stakeholders on transit, climate and land use matters, including in public forums. Engage with other public and private entities… more
- Lady Bird Talent (New York, NY)
- …lead threat modeling and tabletop security exercises Manage Alloys vulnerability management program Ensure vigilance and monitor ongoing security threats ... Analyze and respond to security incidents triggered by automated alerts, bug bounties, or external assessments Perform ongoing log analysis and monitoring, and set up alerts to be proactively alerted or concerning activity Proactively implement security… more
- Deloitte (Austin, TX)
- …(EDR), Anti-Virus, Sandboxing, network and host-based firewalls, Threat Intelligence, Vulnerability Assessment, etc.) 6+ years of hands-on technical experience ... implementing Microsoft Sentinel, EDR, XDR focused security solutions for Microsoft technologies Limited immigration sponsorship may be available Must be willing to travel 50% Preferred: BA/BS Degree preferred. Ideally in Computer Science, Cyber Security,… more
- eTeam, Inc. (Los Angeles, CA)
- …encryption, firewalls, and intrusion detection/prevention systems. Conduct regular vulnerability assessments and penetration testing. Manage access control, ensuring ... only authorized personnel have access to data. Train staff on data protection best practices and incident response procedures. Maintain up-to-date knowledge of the latest cybersecurity threats and mitigation strategies. Ensure compliance with standards like… more
- Bluehawk, LLC (Washington, DC)
- …characteristics, capacities, and vulnerabilities of logistics systems. Publish vulnerability assessments of global transportation and logistics control systems. ... Analyze foreign military logistics systems (conventional and non-conventional) in support of strategic and operational requirements. Produce high-quality intelligence products and present findings to senior policymakers or defense leadership. Qualifications… more
- Manulife and John Hancock (Boston, MA)
- …experiences. Ability to effectively manage input from cross-functional stakeholders Demonstrate vulnerability and humility as a leader. When you join our team ... We'll empower you to learn and grow the career you want. We'll recognize and support you in a flexible environment where well-being and inclusion are more than just words. We'll support you in shaping the future you want to see. Manulife/John Hancock offers… more
- Chili's Grill & Bar (Baldwin, NY)
- …issues while being self-reflective and holding yourself accountable first, showing vulnerability and transparency Foster open communication between Team Members and ... Management Influence Team Member behaviors by championing change and restaurant initiatives Lead with heart and mind Drive business results by utilizing Chili's systems to effectively control costs Follow operational systems, such as our Manager Timeline and… more
- American Express (New York, NY)
- …disaster recovery, dependency risk management, resiliency monitoring, operational vulnerability management and resiliency compliance management. Support compliance ... with Resilience-related regulations and standards (eg, OCC Bulletin 2020-94, FFIEC Handbooks, DORA, GLBA, etc.) to meet legal and regulatory obligations. Influence and help embed a strong risk-aware culture, encouraging proactive risk management behaviors at… more
- Software International (Herndon, VA)
- …and respond promptly to incidents. o Conduct regular security assessments, vulnerability scans, and penetration testing. *Compliance and Risk Management: o Ensure ... compliance with industry standards, legal requirements, and organizational policies (eg, GDPR, HIPAA, PCI-DSS). o Identify and assess security risks, developing strategies to mitigate them. o Prepare and maintain documentation related to security practices and… more