- Amazon (Herndon, VA)
- …complex infrastructures in the world. Within AWS, the Infrastructure Security - Threat , Vulnerability , and Operations (InfraSec-TVO) organization is comprised of ... multiple teams responsible for Threat and Vulnerability Management and Security Operations...of threats to AWS. You will leverage relationships with device owners, infrastructure engineers, and leaders throughout AWS to… more
- MUFG (Tampa, FL)
- …including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics ... including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics… more
- CACI International (Chantilly, VA)
- Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of ... an agile, fast paced team focused on defending our client's global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will… more
- American Medical Association (Chicago, IL)
- Sr. IT Security Engineer Architect Chicago, IL (Hybrid) The American Medical Association (AMA) is the nation's largest professional Association of physicians and a ... We have an opportunity at our corporate offices in Chicago for a Sr. IT Security Engineer Architect on our Information Technology team. This is a hybrid position… more
- Export-Import Bank of the United States (Washington, DC)
- …areas of continuous monitoring and diagnostics, situation awareness and threat assessment, vulnerability assessment and management, incident response ... fill vacancies through OPM-authorized Direct Hire Authority (DHA) for IT Specialist (Information Security, GS-2210-09 through GS-2210-15 and Cybersecurity,… more
- Export-Import Bank of the United States (Washington, DC)
- …areas of continuous monitoring and diagnostics, situation awareness and threat assessment, vulnerability management, incident response operations and ... fill vacancies through OPM-authorized Direct Hire Authority (DHA) for IT Specialist (Information Security, GS-2210-09 through GS-2210-15 and Cybersecurity,… more
- Global Industrial (Port Washington, NY)
- …career in security or risk including vulnerability assessment, intrusion/ threat detection, digital investigations, mobile device management, log analysis, ... Intern, Cyber Security IT Date: Apr 30, 2024 Location: Port Washington, NY, US, 11050 Global Industrial For over 70 years Global Industrial has been an industry… more
- Trane Technologies (St. Paul, MN)
- …done by conducting security assessments where the activities will include threat modeling, attack modeling, security DFMEA, vulnerability assessment, triaging, ... testers to implement secure designs by employing secure communications, network/ device access control, authentication, authorization, cryptography, audit, forensics, and… more
- Capgemini (GA)
- …prospective clients to understand their business objectives, security challenges, and IT infrastructure landscape. + Create and support solutions in cyber security ... network traffic and enforcing granular access controls based on user identity, device posture, and application behavior. + **Encryption** : Knowledge of encryption… more
- Amazon (Austin, TX)
- …by Amazon Lab126 and develop proof of concept exploits. * Perform vulnerability research using variety of custom tooling and technologies (eg symbolic execution, ... Perform code review of a driver for a new device being launched to our customers * Write proof-of-concept...tools to automate assessments of targets * Conduct independent vulnerability research on launched products or dependencies About the… more
- BCMC (Arlington, VA)
- …monitoring system vulnerabilities on servers and infrastructure devices using a Threat and Vulnerability security solution; coordinating artifact collection ... responsible for securing highly dynamic environment supporting Incident Response and Threat Hunting experts - Configuring and monitoring Security Information and… more
- DLA Piper (Houston, TX)
- …cybersecurity, computer science, or a related field + 4 years' experience in IT or security + Detailed experience of TCP/IP + Strong understanding of Windows ... attack chain + Understanding of the common technologies found in enterprise IT environments, including datacenter and Internet edge technologies + Ability to work… more
- ADP (Roseland, NJ)
- …availability at all times. From the cloud to the data center and across every emerging device , you'll join a team of experts in the GSO who are always staying one ... Hyper-collaboration with Security colleagues, Legal, Privacy, Communications, Public Relations, IT , Development, and Business teams in response to incidents related… more
- BRMi (Vienna, VA)
- …security documents + Perform security research, analysis, and testing via threat modeling, vulnerability assessment, penetration testing, and/or social ... a large financial enterprise client. The successful candidate will be working with IT , industrial internet of things (IoT) and operational technology teams to lead… more
- Fairview Health Services (Minneapolis, MN)
- …and mediating activity. + Network packet inspection tools (ie Wireshark, Tshark), and vulnerability and threat monitoring tools (DarkTrace, Gigamon Threat ... high level of technical and engineering experience with integrating several applications and IT systems into Cybersecurity tools. This position is 80 hours every two… more
- Koniag Government Services (Washington, DC)
- …mechanisms to provide increased security for user authentication across multiple device platforms. + Perform technical reviews in evaluating work products and ... + Review current system security measures, conduct system security and vulnerability analyses and risk assessments; recommend and support the implementation of… more
- Vanguard (Dallas, TX)
- …premises traffic and all relevant cloud infrastructures. + Conducts penetration testing, vulnerability assessments and threat modeling. Evaluates risks and makes ... security threats, tools and tactics used by modern and emerging threat actors. Facilitates security operations and incident response technologies and methodologies.… more
- Amazon (New York, NY)
- …by Amazon Lab126 and develop proof of concept exploits. * Perform vulnerability research using variety of custom tooling and technologies (eg symbolic execution, ... Perform code review of a driver for a new device being launched to our customers * Write proof-of-concept...tools to automate assessments of targets * Conduct independent vulnerability research on launched products or dependencies About the… more
- CACI International (Robins Air Force Base, GA)
- …trends in computer and network vulnerabilities, data hiding and network and device security and encryption. + Designs, develops, or recommends integrated system ... and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments. + Develops and implements Plans of Action… more
- Weill Cornell Medical College (New York, NY)
- …and endpoint and mobile device security. + Assists in vulnerability management process and compliance, including threat analysis, vulnerability ... (Service Operations Analyst I) - Security Location: 1300 York Avenue Org Unit: IT Operations Work Days: Mon-Fri (rotational on call) Exemption Status: Exempt Salary… more