- UKG (Ultimate Kronos Group) (Santa Ana, CA)
- …customers. With a large and distributed engineering organization, we are looking for a Lead , Vulnerability Management Analyst, who can bridge the gap between ... security and development at scale. Role Summary: As the Lead for vulnerability management , you...supporting infrastructure (cloud services, VMs, networks). * Conduct security research on cloud and AI to ensure a strong… more
- Southern California Edison (Rosemead, CA)
- …Team, you will be primarily responsible for not only conducting continuous research on emerging threats and threat actor activity but also actioning that ... SCE IT and OT environment. + Use understanding of Vulnerability Exploitation to Hunt for Evidence of exploitation of...of these remediations. + Work with Threat Hunt Team lead to identify capability and process improvements for threat… more
- Children's Hospital Los Angeles (Los Angeles, CA)
- …Nessus, CoreImpact, CyberArk, Qualys (Q1), WebInspect, Snort, or similar vulnerability assessment, identity management , and intrusion detection/prevention ... care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each… more
- LA Care Health Plan (Los Angeles, CA)
- …Management (SIEM) platform. Operational experience using and configuring a vulnerability management platform. Operational experience using a static ... resolution when confronted with differing viewpoints on security risks. Conducts research to identify attack vectors against the organization. Identifies and… more
- KBR (Oxnard, CA)
- …will be part of the KBR Cybersecurity team supporting the Test Resource Management Center (TRMC) in the development of new test and evaluation capabilities and ... have a deep understanding of cybersecurity technologies, security protocols, risk management framework, and software development principles. They will be responsible… more
- SpaceX (Hawthorne, CA)
- …+ Secure/Authenticated boot + Incident response and adversary detection + Vulnerability research Being flexible, communicating clearly, and establishing and ... limited to: + Authentication and encryption protocols + Identity management and automation + Software integrity solutions such as...and booster to meet mission objectives + Define and lead impactful projects that enable the mission of Starship… more