- Vanguard (Malvern, PA)
- …tool output. What you'll bring + 3 - 5 years in vulnerability analysis, application/infrastructure security, red teaming, or penetration testing (internal or ... to - have exposure + EPSS/ KEV driven prioritization, attack path/graph concepts, and risk quant inputs. + Cloud...posture and SaaS posture signals (SSPM) that intersect with external exposure. + Building tuning logic for scanners and… more
- Discover (Riverwoods, IL)
- …from supported services.** **Provide guidance to remediation teams.** **Support our External Continuous Attack Surface Testing program.** **Analyzes and assesses ... most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape.** **How You'll Do It** **Learns...Requirements - Travel up to 10% of the time.** ** External applicants will be required to perform a technical… more
- SMBC (Charlotte, NC)
- …SMBC offers a competitive portfolio of benefits to its employees. **Role Description** As a Vulnerability Management Analyst , you will be a key part of a high ... to protect the Bank's network and data from a cyber- attack and in turn, protect its reputation and the...leading edge tools and technologies. **Role Objectives** + Triage vulnerability alerts from security tools, external intelligence… more
- Conagra Brands (Omaha, NE)
- …providing business assurance. You will be assigned to the Threat and Vulnerability Management (TVM) team supporting attack surface management, vulnerability ... As an Associate Information Security Analyst reporting to the Manager, Cybersecurity Operations, you...Cleary communicate priorities and escalation points/procedures to internal and external stakeholders + Utilize Attack Surface Management… more
- Nightwing (Arlington, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Cintas (Mason, OH)
- … Analyst -Level 2 is responsible for: performing analysis of logs, vulnerability information, Indicators of attack (IOAs) and/or Indicators of Compromise(IOCs); ... 208002 **Job Description** Cintas is currently looking for an Information Security Analyst -Level 2 for the Operations Team within IT Security. This position will… more
- Amentum (Wahiawa, HI)
- **Job Summary:** The Cyber Intelligence Analyst will be a key member of our team, responsible for analyzing complex cyber threat data, producing actionable ... analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors. + Collect, evaluate, and fuse intelligence from diverse… more
- MUFG (Tampa, FL)
- …business processes. Additionally, you will proactively monitor internal and external -facing environments, seek opportunities to strengthen and automate detection and ... procedures + Understanding of offensive security to include common attack methods + Understanding of how to pivot across...teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes… more
- General Dynamics Information Technology (Springfield, VA)
- …Cybersecurity,Information System Security,Risk Assessments **Certifications:** CompTIA Cybersecurity Analyst + CE (CySA+) | CompTIA - CompTIA **Experience:** ... traffic, and network access- Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security… more
- LA Care Health Plan (Los Angeles, CA)
- …with differing viewpoints on security risks. Conducts research to identify attack vectors against the organization. Identifies and assesses vulnerabilities and risks ... Management (SIEM) platform. Operational experience using and configuring a vulnerability management platform. Operational experience using a static application… more