- Novo Nordisk Inc. (Plainsboro, NJ)
- …including monitoring of alerts, investigation of alerts, incident response, vulnerability response, threat intelligence, and digital forensics. Individuals in this ... and will also be responsible for performing technical risk and vulnerability assessments at the network, system, and application level. Some responsibilities… more
- Merck & Co. (Rahway, NJ)
- …Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning-Preferred Skills:Job Posting End Date:08/3/2025 *A job posting is ... effective until 11:59:59PM on the day BEFORE -the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID:R357429 more
- MUFG Bank, Ltd. (Jersey City, NJ)
- …and platform architect for ServiceNow platform and ServiceNow Vulnerability Response and Configuration Compliance Major Responsibilities Responsible for ... capabilities. Solution design, configuration/development, testing and support of ServiceNow Vulnerability Response and Configuration Compliance capabilities. Design, implement and… more
- Cedar Park Group (New York, NY)
- Cedar Park Group is seeking an experienced Cyber Command Vulnerability Management Specialist for a long-term hybrid opportunity in Brooklyn, NY. If you're passionate ... 24 months Start Date: ASAP Interview Type: In-person Responsibilities: Lead vulnerability management initiatives using Rapid7 , including designing and maintaining… more
- Robinhood (Bellevue, WA)
- …seeking a strategic and technical Manager to lead our Offensive Security and Vulnerability Management programs. In this role, you'll drive our ability to proactively ... such as red teaming and penetration testing, as well as vulnerability research and agile vulnerability lifecycle management, working cross-functionally… more
- Zetier (San Antonio, TX)
- Principal Vulnerability Researcher Zetier is seeking Principal Vulnerability Researchers to analyze and counter malicious software and develop operationally ... critical cyber capabilities. Candidates will demonstrate practical experience designing, developing, and deploying tools intersecting command and control, persistence, and networking. Required: Highly experienced with reverse engineering compiled programs… more
- McDonald's (Chicago, IL)
- McDonald's Cybersecurity Vulnerability Management Engineer II McDonald's growth strategy, Accelerating the Arches, encompasses all aspects of our business as the ... and every community that is home to a McDonald's restaurant. Join McDonald's Cybersecurity's Vulnerability Management (VM) team as a VM Engineer II in a role that… more
- RIT Solutions, Inc. (El Segundo, CA)
- …of software projects and improve cloud-based security programs Perform vulnerability and penetration testing. Document security findings with reasonable methods ... years of experience in software security as a practitioner with exposure to vulnerability and penetration testing, threat modeling of applications, and code reviews … more
- Claroty (Washington, DC)
- …and support periodic assessments (eg, annual assessments, penetration tests, vulnerability scans). Interface with Third Party Assessment Organizations (3PAOs), ... (SSP, POA&M, SAR, SAP, etc.) and governance tools. Familiarity with vulnerability scanning tools (eg, Nessus, Qualys) and interpreting security findings. Eligibility… more
- Insight Global (Providence, RI)
- …of the controls (eg, reviewing configurations, analyzing logs, conducting vulnerability scans). 5. Reporting: Document the audit findings, including any ... weaknesses or vulnerabilities discovered, and provide recommendations for improvement. 6. Follow-Up: Track the implementation of the recommendations and conduct periodic re-assessments to ensure ongoing compliance. We are a company committed to creating… more
- Jefferies (New York, NY)
- …operating systems, database, middleware, infrastructure technology, threat & vulnerability management, problem & incident management, change management, application ... development, networking, resilience, logical and physical access security, etc. Familiarity with IT governance frameworks and guidelines (eg, ITIL, COBIT, NIST, CIS, FFIEC, etc.), as well as technology architecture, data governance, and cloud. Candidates must… more
- Quantum Dynamics, Inc. (Coronado, CA)
- …(CND), training systems (eg Virtual Hosting Environment (VHE), Network Security Vulnerability Technician (NSVT), support equipment, Joint systems (eg Joint High ... Speed Vessel (JHSV)) and Foreign Military systems. Overseeing strategic planning, human resource management, budgeting, and training personnel when necessary, and acting as a liaison between managers and subordinates. Analyzing program-related issues and… more
- Renewance, Inc (Elmhurst, IL)
- …office IT equipment and accessories. Perform annual IT risk assessment and vulnerability analysis to ensure integrity and security to evidence the commitment to ... IT governance. Evaluate and manage relationships with IT service providers and vendors to ensure high-quality services. Collaborate with leadership and internal stakeholders to understand operational requirements and ensure client-facing security and uptime… more
- City of New York (Brooklyn, NY)
- …a meaningful way to all hazards recovery planning process. Identify risk and vulnerability metrics that could address areas with highest needs or gaps for recovery. ... Managing staff such as a Solomon Fellow and/or Specialist and supporting their professional development opportunities. Maintain awareness of policies and legislation that can inform recovery capabilities at the City, State, and Federal levels. Perform other… more
- Tekfortune (Dallas, TX)
- …support activities in varied security domains such as SOC ,SIEM, IAM, Vulnerability Management, Infra Security, GRC, etc - Responsible for working with Delivery ... domains of Cyber-security like SIEM, Identity and Access Management, Vulnerability management, Endpoint Security-In-depth knowledge of security concepts such as… more
- Optiv Security, Inc. (Overland Park, KS)
- …industry groups, delivering talks, writing technical and industry-specific blogs, vulnerability research, industry PR interviews, and/or contributing to security ... publications. Lead client workshops, assessments, and executive briefings, often in front of both technical and non-technical stakeholders. Drive continuous improvement of consulting methodologies, tools, processes, and deliverables to improve efficiency and… more
- American Airlines (Dallas, TX)
- …audits, legal matters, and board reporting Lead security operations, vulnerability management, threat detection, and response efforts to proactively mitigate ... risks IT Operations & Service Management Oversee Application Support, IT Helpdesk, and Service Desk operations to ensure high availability, performance, and end-user satisfaction Implement and optimize ITIL best practices for incident, problem, change, and… more
- International Rescue Committee (Charlottesville, VA)
- …to assist with addressing clients' needs in their areas of vulnerability and helping them achieve their goals. RESPONSIBILITIES: *Attend intern orientation ... *Assist with client check-ins (over the phone or in person, as appropriate) *Assist with ICM client intakes and assessments *Provide transportation to appointments and attend appointments with clients, as appropriate *Communicate with community partners for… more
- Marathon Petroleum Corporation (MPC) (La Palma, CA)
- …(PHMSA) regulations, and state/local requirements. Participates in Security Risk/ Vulnerability Assessments and implements security measures to mitigate ... vulnerabilities. Implements company Anti-Violence Workplace prevention policies. Interacts with federal, state, and local law enforcement and other government agency officials. 25% Travel. Minimum Education and Experience High school diploma or GED 4 or more… more
- Stantec (Denver, CO)
- …US that address water availability and quality, changing water demands, vulnerability and risk to climate hazards, environment protection and enhancement, social ... priorities for water allocation, and financial considerations. Our projects assess the inter-disciplinary aspects of water supply reliability and quality, operations of complex watershed-scale systems, conjunctive management of surface and groundwater… more