- Federal Reserve Bank (Washington, DC)
- …enable threat hunt activities. The Sr. Cybersecurity Analyst (Sr. Security Analyst) provides technical and analytical assessments to support information ... principles, digital forensics, incident handling, incident management, incident response, vulnerability management, security engineering, automation and programming,… more
- CGI Technologies and Solutions, Inc. (Knoxville, TN)
- … threat intelligence securely. Experience relaying technical concepts and security information effectively to non-technical parties. Experience collaborating on ... clients have worked with us for an average of 26 years! * We have over 92,000+ CGI Members...Experience: Experience with x86/x64 assembly. Bug bounty or other vulnerability -hunting experience Experience performing MacOS security assessments… more
- CGI Technologies and Solutions, Inc. (Washington, DC)
- …Perform cyber reconnaissance to illuminate a potential attack surface area. * Provide threat and vulnerability management to federal clients and teams. * Analyze ... **AWS Cloud Security Engineer** **Category:** Software Development/ Engineering **Main location:**...deploying cloud solutions. * Designing and integrating marketplace leading vulnerability management, threat management, monitoring and data… more
- TEKsystems (Montgomery, AL)
- …current assigned shift. o Serve as a Boundary Protection Team Operator for the 26 Network Operations Squadron ( 26 NOS) at Maxwell Air force Base-Gunter Annex, ... Alabama. o Oversees intrusion detection, intrusion prevention, boundary protection and vulnerability assessment operations to defend the Air Force Network (AFNet). o… more
- …NYPD. This includes, but not limited to, user access and controls, vulnerability , scanning, cyber threat intelligence gathering, and incident response. Job ... its police, and by pioneering strategic innovation. The Information Security team within ITB is a highly specialized group...spouse or domestic partner and un-emancipated children under age 26 , union benefits such as dental and vision coverage,… more
- Blue Cross Blue Shield of Massachusetts (Boston, MA)
- …security applications or software issues. + Strong interface with the threat and vulnerability management, network, system administrators and desktop ... colors to blue. What We Need Provide expertise for design and support of Security Administration on security systems and applications running in the BCBSMA… more
- Nightwing (Sterling, VA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... A good driving record and ability to drive a 26 ft box truck Demonstrated ability to work as...Office The ability to obtain and maintain a US security clearance prior to the start date. US citizenship… more
- Ventura County (Ventura, CA)
- …management, business process improvement, applications support, voice/data infrastructure, data security , threat and vulnerability /risk management, and ... increase at 5, 11, 12, 13, 14, 15 and 20 years of service topping out at 26 days a year and 400 hours of vacation hours banked. + Vacation Leave Redemption - After… more
- Ventura County (Ventura, CA)
- …management, business process improvement, applications support, voice/data infrastructure, data security , threat and vulnerability /risk management, and ... increase at 5, 11, 12, 13, 14, 15 and 20 years of service topping out at 26 days a year and 400 hours of vacation hours banked. + Vacation Leave Redemption - After… more