- Harvard University (Cambridge, MA)
- …collaboration, design, development, and implementation of enterprise-wide vulnerability and threat exposure management strategies. Oversee the creation ... Department Office Location:USA - MA - Cambridge Business Title: Vulnerability , Threat and Exposure Management EngineerSub-Unit: Appointment End… more
- Amentum (Boston, MA)
- …7 continents. Amentum is seeking a **Cybersecurity Engineer IV with a focus on Vulnerability Management ** . This is a fully remote and hands-on role, responsible ... **Responsibilities:** + Review, design, implement and support all aspects of Vulnerability Management , including tooling, processes, reporting and policies for… more
- State of Massachusetts (Chelsea, MA)
- …Analyst Interns*. There are two groups in the EOTSS Security Operations Center: Vulnerability Management Program (VMP) and Cyber Detection & Response (CDR). The ... Vulnerability Management team actively searches the network...Duties:* o Vulnerability Scanning and follow-up o Vulnerability Assessment / Risk Exposure o … more
- MIT Lincoln Laboratory (Lexington, MA)
- …including identifying root causes and implementing corrective actions. + Support vulnerability management efforts, conducting assessments, and working with teams ... risk management methodologies. + Hands-on experience with security tools, vulnerability management , and incident response processes. + Experience with… more
- Amentum (Boston, MA)
- …+ Experience with CISCO ACI + Experience with Intrusion Detection Systems + Vulnerability Management + Experience with NIST based controls or similar standard ... and process documentation. **Knowledges, Skills, and Abilities:** + Effective time management and communication skills. + Self-starter with desire for professional… more
- Eversource Energy (Westwood, MA)
- …creativity and/or resourcefulness\. + Applies extensive organizational and/or project management expertise and has full knowledge of other related disciplines\. ... Software Development Life Cycle \(SSDLC\) \(e\.g\. code review, risk assessments, threat modeling, static code analysis, and dynamic application scanning\) - Modern… more