- UKG (Ultimate Kronos Group) (Lowell, MA)
- …customers. With a large and distributed engineering organization, we are looking for a Lead , Vulnerability Management Analyst, who can bridge the gap between ... security and development at scale. Role Summary: As the Lead for vulnerability management , you...supporting infrastructure (cloud services, VMs, networks). * Conduct security research on cloud and AI to ensure a strong… more
- Trellix (Boston, MA)
- …highly skilled and deeply technical Sr. Staff Security Researcher to join our research team and lead innovation in the detection capabilities of our EDR ... callback routines, WFP, and driver development). + Hands-on experience with vulnerability research , including fuzzing, binary diffing, mitigation bypass, and… more
- The MITRE Corporation (Bedford, MA)
- …incident response, secure system design, integration of security controls, vulnerability management , adherence to cybersecurity frameworks and standards ... information as an integrated element of MITRE's ERM program. The Program Protection Lead should possess advanced risk management skills and experience but also… more
- Merck (Boston, MA)
- **Job Description** We are seeking a solution-oriented Platform Engineering Lead to drive automation and orchestration across the cybersecurity technology stack. ... across the tools-not owning them. **Job Description:** As the Platform Engineering Lead , you will coordinate and deliver automation solutions that operate across… more
- Ryder System (Boston, MA)
- …infrastructure blueprints. Define controls for identity, access, encryption, segmentation, and vulnerability management across on-prem and cloud platforms. + ... security principles including zero trust, segmentation, encryption, identity and access management , and vulnerability management . + **Technical Breadth**… more
- Stantec (Boston, MA)
- …with optimism. We're driving the future of Community Development. Our experts lead their fields, collaborating on projects that are as technically challenging as ... our Community Development business line, you will have the opportunity to lead mission-driven work, supporting multiple company strategic initiatives in line with… more
- Cisco (Boston, MA)
- …security, Kubernetes, and microservices architectures + Experience in security risk management , vulnerability assessment, and remediation + Experience with ... partners by building outstanding security programs that shape the market with our research , make it easy for our customer teams within Cisco to develop secure… more
- BAE Systems (Burlington, MA)
- …Through technology development programs funded by Science and Technology (S&T) / Research & Development (R&D) organizations within the US Department of Defense, ... TDMs combine aspects of science, applied engineering, and program management to execute a portion of a product line...strategic plan by both capturing and executing on sponsored research programs. As a CS TDM, you will have… more
- Draper (Boston, MA)
- …and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of ... systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability research . Job Description: Duties/Responsibilities * Assess hardware… more
- Confluent (Boston, MA)
- …security tooling to help scale product security operations and support overall vulnerability management practices + Propose, design, build, and deploy security ... Confluent + Keep up to date with emerging security vulnerability classes, research and perform triage for...different perspectives. And we make space for everyone to lead , grow, and challenge what's possible. We're proud to… more
- Manulife (Boston, MA)
- …talented experience designers? + Cross-functional collaboration with business partners, research , and analytics to deliver seamless, omni-channel experiences that ... resonate with users? This is your opportunity to lead transformative design initiatives that not only enhance user satisfaction, but also drive tangible business… more
- BAE Systems (Merrimack, NH)
- …+ Electronic Warfare, Electronic Attack, and Electronic Support Measures + Cyber vulnerability research and reverse engineering + Experience leading research ... **Job Description** FAST Labs is a world-class research organization. Our vision, We secure the future...management or related fields + Demonstrated ability to lead small multi-discipline teams on software focused programs **Preferred… more
- Global Resource Solutions (Boston, MA)
- …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management ... and Special Access Program (SAP) activities.. Essential Duties & Responsibilities: + Lead a team of System Security Engineers and Certification and Accreditation… more
- State of Massachusetts (Boston, MA)
- …and business impact improvements. . *Cybersecurity & Risk and Compliance Management *: Oversee security policies, risk assessments, and vulnerability remediation ... of Economic Development values inclusiveness and diversity within their employee and management teams. Within our community we strive to create and maintain working… more
- Meta (Boston, MA)
- …research to identify new ways of achieving your mission 2. Work with vulnerability management , offensive security group, and other security programs to align ... would be to build a team of security engineers, set strategy, and lead execution, ensuring our products are hardened against attackers. **Required Skills:** Security… more
- Merck (Boston, MA)
- …Engineer to join the Cybersecurity Automation & AI team. This role will lead the design and delivery of scalable automation solutions across enterprise platforms ... attendance is required for, field-based positions; facility-based, manufacturing-based, or research -based positions where the work to be performed is located… more
- Amazon (Boston, MA)
- …even your own, if you are an Amazon customer! In this role, you are the lead architects for the biggest and most complex security projects. You will own and push the ... including penetration testing, security operations, encryption, or identity and access management . They need a deep understanding of the inner workings of… more