- CACI International (Chantilly, VA)
- Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of ... an agile, fast paced team focused on defending our client's global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will… more
- ZOLL Medical Corporation (Chelmsford, MA)
- …as a subject matter expert in medical device cybersecurity. + Conduct vulnerability assessments, threat modeling, and risk analysis. + Lead efforts to secure ... a great time to be a part of ZOLL!Job SummaryThe Medical Device Cybersecurity Technical Project Manager combines technical expertise with project management skills… more
- CUNY (New York, NY)
- …to work effectively in designing, building, and deploying automation to scale for vulnerability discovery efforts and device security compliance + Relevant soft ... SOC Analyst ( IT Sr Associate 1) - Provisional **GENERAL DUTIES**...mitigating security incidents. SOC teams are also involved in threat intelligence gathering, incident response planning, and security policy… more
- Meijer (Grand Rapids, MI)
- …operating systems and network device platforms. + Leverage real-time authoritative threat and vulnerability data sources such as National Vulnerability ... raise awareness, mitigate and contain potential risks, as determined by potential threat vectors. + Ensures appropriate control environments are implemented in order… more
- Amazon (Herndon, VA)
- …* Vulnerability Identification and Tracking * Offensive security testing & vulnerability research * Emergent threat testing * Creating/maintaining automated ... on a team responsible for conducting offensive campaigns, emergent threat testing, creating/maintaining automated threat emulation solutions,...domains. This is a leadership role within the AWS IT Security team and will be sought out for… more
- ADP (Roseland, NJ)
- …availability at all times. From the cloud to the data center and across every emerging device , you'll join a team of experts in the GSO who are always staying one ... Hyper-collaboration with Security colleagues, Legal, Privacy, Communications, Public Relations, IT , Development, and Business teams in response to incidents related… more
- Citigroup (Irving, TX)
- …and security frameworks, fully aligned with the technology of the firm, threat -focused and data-driven, and deeply integrated across all Citi businesses globally. ... architecture practice to ensure Citi is reducing the risk to all threat surfaces with the right capabilities and controls and continuously progressing towards… more
- CACI International (Reston, VA)
- …data from malicious attack, damage, or unauthorized access. + Maintains network device and information security incident, damage and threat assessment programs. ... and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. + Performs duties in support of in-house and external… more
- CACI International (Wallops Island, VA)
- …+ Maintaining network devices and information security incident, damage and threat assessment programs to include providing intrusion support to high technology ... and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external… more
- Entergy (New Orleans, LA)
- …and networks. + Work closely with Consolidated Security Operations Center (CSOC), Threat & Vulnerability Management (TVM), other internal/external teams and ... + Accountable for execution of security engineering support of all device classes (server, desktop, mobile, etc.), hosting models (on-premises, external, cloud)… more
- Southern Glazer's Wine and Spirits (Miramar, FL)
- …ensure security is integrated into all aspects of the organization. + Conducting threat modeling, risk assessments, and vulnerability management + Developing and ... systems across on-premises and multi-cloud environments. This individual understands IT Enterprise Architecture and works with the enterprise architects to… more
- Koniag Government Services (Washington, DC)
- …mechanisms to provide increased security for user authentication across multiple device platforms. + Perform technical reviews in evaluating work products and ... + Review current system security measures, conduct system security and vulnerability analyses and risk assessments; recommend and support the implementation of… more
- Amazon (Boston, MA)
- …Security reviews for hardware including servers and devices - Penetration testing & vulnerability research - Threat modeling - Security training and outreach to ... to bring great ideas to life in ways that aren't possible in traditional IT environments. With AmSec you can flexibly harness compute, storage, security, and other… more
- Lockheed Martin (Highlands Ranch, CO)
- …Area\. In this pivotal role, you'll be responsible for engineering and IT cybersecurity, safeguarding our systems and information from ever\-evolving threats\. Key ... Responsibilities: \- Conduct threat analysis and modeling, defining security requirements, and documenting the security posture of the environment, including… more
- Medtronic (Minneapolis, MN)
- …controls for product/system wide security needs. + Develop and perform product-level threat and vulnerability detection activities. + Contribute to Medtronic's ... broader Medtronic security leadership team, external and internal cybersecurity researchers, Global IT Organization, and stay on top of current developments for the… more
- Chenega Corporation (Washington, DC)
- …by the Cyber Threat Intelligence (CTI) Team to assess and improve IT system resilience, SOC monitoring effectiveness, and tuning of security tools + Perform ad ... Small Business Administration. At a high level, the SBA Information Technology ( IT ) ecosystem consists of one preponderant 20,000 node Multi-Protocol Label Switched… more
- Cisco (Austin, TX)
- …testing and security assessments and provide security recommendations. * Conduct vulnerability assessments, security audits, and risk assessments on complex systems. ... * Evaluate devices and features for possible attack vectors to either the device itself or the user. * Track bugs/vulnerabilities through development lifecycle to… more
- Deloitte (Los Angeles, CA)
- …(SOC) to provide a secure environment that facilitates incident response and threat hunting activities. + Provide oversight over more junior cyber analysts and ... event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices +… more
- Medtronic (Minneapolis, MN)
- …be assigned: + Performs security assessments of company products that may include vulnerability and risk assessments, threat analysis, and security code reviews ... and much more! Be on the frontlines of the emerging area of medical device data protectioncybersecurity and privacy as an integral member and technical leader within… more
- The MITRE Corporation (Bedford, MA)
- …reviews of Internet facing prototypes and services. + Guide corporate IT : co-engineering secure corporate architectures and systems. + Advise sponsor projects ... to implement strong, MITRE compliant security. + Assess the security and/or vulnerability of deployed systems using tools and adversary Tactics, Techniques, and… more