- Metasys Technologies, Inc. (Dallas, TX)
- …Incident Response, cyber product testing, cyber risk & strategic analysis, cyber research , cyber awareness & training, cyber vulnerability detection & ... policies and procedures to minimize network intrusion, malware events, and vulnerability issues for internal and external customers. Interact with internal and… more
- U of C NORC (Chicago, IL)
- …to further our collective goal of advancing social science research .RESPONSIBILITIES:Policy Development: Develop and maintain comprehensive IT security policies, ... the advanced use of information security assessment techniques (eg, vulnerability scanning, penetration testing, verification of application security, etc.)Previous… more
- DCS Corp (Ridgecrest, CA)
- …including Interface Control Documents (ICDs), Specifications, and System Architectures Research known vulnerability database sources (CVEs and CWEs) ... assist in achieving an authority to operate (ATO). Develop mitigation options. Research known mitigations to system components and software under review. Apply… more
- Northeast Georgia Health System, Inc (Braselton, GA)
- …Membership is professional organization. NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible and ... of deteriorating patient and accesses appropriate resources. Reads nursing research /EBP articles. Participates in discharge planning with increasing responsibility… more
- Snap-on (Kenosha, WI)
- …applications and services.Works closely with vendors and IT teams to conduct research , technical evaluations, and proofs of concept on new technologies and ... with file/print, infrastructure, and application servers.Performs system maintenance and vulnerability remediation in accordance with established SOPs.Is responsible for… more
- Base-2 Solutions, LLC (Fort Meade, MD)
- …Design Interaction Design Branding Motion Graphics Methods/Tools: User Research , Personas, Storyboarding, Wireframing, Lo-fi/Hi-fi Mockups, Prototyping, Usability ... analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Produceability, etc.) Establish and follow a formal… more
- Bering Straits Native Corporation (Beavercreek, OH)
- …Assessment and Authorization documentation (eg, IA SOP, SSP, MSSP, RAR, SCTM). Research , configure, analyze and/or use software applications for security ... vulnerability monitoring, security automation and alerting.Identify policy conflicts and recommend possible mitigations or solutions.Maintain awareness of upcoming… more
- Computer World Services (CWS)Corporation (Adelphi, MD)
- …Seeking a highly motivated Classified Cybersecurity Senior to support the Army Research Lab (ARL) classified environment and systems. Key Tasks and Responsibilities ... processing, tagging, updating for all sites Review any reported ARL Vulnerability Disclosure Program (VDP)s, monitor until completion, and update VDP data… more
- KaiHonua (Rock Island, IL)
- …installation and configuration procedures.Contribute to and maintain system standards. Research and recommend innovative, and where possible automated approaches ... Technical Implementation Guides (STIG) and system security processes.Familiarity with vulnerability scanning including remediation of Operating System and application… more
- RIVET OPERATIONS COMPANY LLC (Dededo, GU)
- …("Rivet") is a leader in physical and cyber security, scientific research , development, and facilities management. Essential Duties and Responsibilities: (Not listed ... risks on systems and networksContractor must have experience with utilizing vulnerability tools to conduct automated scans such as Assured Compliance Assessment… more
- Fidelity TalentSource LLC (Covington, KY)
- …disaster recovery procedures.Creates contingency plans covering key areas of vulnerability within the system.Coordinates systems installation and configuration of ... issues and data anomalies across portfolio management, trading, and research functions maintaining data quality; supporting financial and trading application… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …years nursing leadership experience.Other: NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible ... clinical standards that is collaborative, collegial and utilizes best practice research .Oversee various personnel actions including, but not limited to, hiring,… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …encryption, Incident Detection and Response, Mobile Device Management Vulnerability Management tools. Minimum Job QualificationsLicensure or other certifications: ... Business requirements, process, and practice. Working knowledge of forensic tools. Research , recommend, and architect NGHS Security infrastructure tools.Understanding of… more
- Creative Financial Staffing (Orlando, FL)
- …Escalate high-risk incidents to IT Management and SOC for further support. Research security threats: Stay informed about emerging threats through reputable sources. ... the risk of emerging threats and develop mitigation strategies. Conduct vulnerability scans and proactively remediate vulnerabilities. Manage risky user behavior:… more
- Credit Acceptance Corporation (Atlanta, GA)
- …and customizing security tools to address threats and lower risk: vulnerability scanners, static analyzers, web application firewalls, IDS/IPS, malware analysis, ... Contributions to the security community, such as open source tools, research papers, conference talks, etc. Knowledge and Skills:Bring a strong understanding… more
- Southwest Research Institute (San Antonio, TX)
- …operations.Maintain existing infrastructure and systems through patch management and vulnerability detection and remediation.Deploy new end user systems and Virtual ... Machines following NIST 800-171 security guidance and using a secured baselined template.Maintain complete and accurate documentation and robust change management in all areas of the environment for which you are responsible. Requirements: Requires an… more
- ARSIEM (Fort Meade, MD)
- … Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications, ... Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications,… more
- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who is ready for a new challenge that will launch your career to the next level? + Tired of being treated like a ... talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one of our subcontracts....You will be working on a new team performing vulnerability research against mobile technologies. + You… more
- Cromulence LLC (Melbourne, FL)
- Cromulence is looking for a Senior Vulnerability Researcher to support advanced research and development contracts and advance our nation's cybersecurity ... structure to develop and deliver successful program capabilities. At Cromulence, a Senior Vulnerability Researcher is expected to: + Lead teams of engineers,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …candidate will work with a multidisciplinary team as a Reverse Engineer and Vulnerability Researcher . You will engage with government sponsors to identify ... the pursuit of solving unconventional problems. As a Reverse Engineer and Vulnerability Researcher , you will develop novel capabilities against cyber-physical… more
Related Job Searches:
Linux Vulnerability Researcher,
Researcher,
Reverse Engineer Vulnerability Researcher,
Senior Vulnerability Researcher,
Software Vulnerability Researcher,
Sr Cyber Vulnerability Researcher,
Sr Software Vulnerability Researcher,
Vulnerability,
Vulnerability Researcher Level Senior,
Vulnerability Researcher Penetration Testing