- Rubrik (Concord, NH)
- …order to securely protect Rubrik information. **What you'll do:** Rubrik is seeking a Senior Application Security Engineer . In this role, you will be responsible ... experience in application security, with experience across SDLC activities such as threat modeling, secure code review, vulnerability management, and penetration… more
- RTX Corporation (Tewksbury, MA)
- …- Building 3, Tewksbury, MA, 01876 USA Position Role Type: Onsite Senior Principal Network Engineer Raytheon Digital Technology Classified Infrastructure ... needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create...Performance Computing, and Storage & Data Protection. As a Senior Principal Network Engineer for this high-impact… more
- RTX Corporation (Woburn, MA)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... tools + Knowledge of information security toolsets including anti-virus, Vulnerability Assessment, HIDS/ NIDS, host-based or endpoint security solutions, Multi… more
- The MITRE Corporation (Bedford, MA)
- …crucial to our sponsor's mission success. Your role will encompass: + Cyber Threat Analysis and Mitigation + Cyber Exercise and Wargame Planning + Development and ... and Event Management (SIEM) + Incident Response and Recovery + Vulnerability Assessment and Penetration Testing + Secure Cloud Computing and Containerization… more
- SitusAMC (Concord, NH)
- …think global but act local - come join our team! As a Cloud Security Engineer , you will play a pivotal role in safeguarding our organization's sensitive data and ... infrastructure, applications and data. + Conduct regular security assessments and vulnerability scans to identify and mitigate potential risks. Automate cloud… more
- The MITRE Corporation (Bedford, MA)
- …corporate defenses against Advanced Persistent Threats (APT). Working with other senior InfoSec leaders, provide strategic guidance on the MITRE's adoption of ... to implement strong, MITRE compliant security. + Assess the security and/or vulnerability of deployed systems using tools and adversary Tactics, Techniques, and… more