• Lead Vulnerability Management

    UKG (Ultimate Kronos Group) (Lowell, MA)
    …customers. With a large and distributed engineering organization, we are looking for a Lead , Vulnerability Management Analyst, who can bridge the gap between ... security and development at scale. Role Summary: As the Lead for vulnerability management , you...supporting infrastructure (cloud services, VMs, networks). * Conduct security research on cloud and AI to ensure a strong… more
    UKG (Ultimate Kronos Group) (07/02/25)
    - Save Job - Related Jobs - Block Source
  • Sr Staff Security Researcher - EDR

    Trellix (Boston, MA)
    …highly skilled and deeply technical Sr. Staff Security Researcher to join our research team and lead innovation in the detection capabilities of our EDR ... callback routines, WFP, and driver development). + Hands-on experience with vulnerability research , including fuzzing, binary diffing, mitigation bypass, and… more
    Trellix (06/17/25)
    - Save Job - Related Jobs - Block Source
  • Program Protection Lead

    The MITRE Corporation (Bedford, MA)
    …incident response, secure system design, integration of security controls, vulnerability management , adherence to cybersecurity frameworks and standards ... information as an integrated element of MITRE's ERM program. The Program Protection Lead should possess advanced risk management skills and experience but also… more
    The MITRE Corporation (06/17/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Specialist, Platform Engineering Lead

    Merck (Boston, MA)
    **Job Description** We are seeking a solution-oriented Platform Engineering Lead to drive automation and orchestration across the cybersecurity technology stack. ... across the tools-not owning them. **Job Description:** As the Platform Engineering Lead , you will coordinate and deliver automation solutions that operate across… more
    Merck (07/09/25)
    - Save Job - Related Jobs - Block Source
  • System Engineering Architect

    Ryder System (Boston, MA)
    …infrastructure blueprints. Define controls for identity, access, encryption, segmentation, and vulnerability management across on-prem and cloud platforms. + ... security principles including zero trust, segmentation, encryption, identity and access management , and vulnerability management . + **Technical Breadth**… more
    Ryder System (07/08/25)
    - Save Job - Related Jobs - Block Source
  • Principal, Planning

    Stantec (Boston, MA)
    …with optimism. We're driving the future of Community Development. Our experts lead their fields, collaborating on projects that are as technically challenging as ... our Community Development business line, you will have the opportunity to lead mission-driven work, supporting multiple company strategic initiatives in line with… more
    Stantec (06/23/25)
    - Save Job - Related Jobs - Block Source
  • Software Architect - Technical Leader

    Cisco (Boston, MA)
    …security, Kubernetes, and microservices architectures + Experience in security risk management , vulnerability assessment, and remediation + Experience with ... partners by building outstanding security programs that shape the market with our research , make it easy for our customer teams within Cisco to develop secure… more
    Cisco (06/25/25)
    - Save Job - Related Jobs - Block Source
  • FAST Labs - Advanced Cyber/RF Technology…

    BAE Systems (Burlington, MA)
    …Through technology development programs funded by Science and Technology (S&T) / Research & Development (R&D) organizations within the US Department of Defense, ... TDMs combine aspects of science, applied engineering, and program management to execute a portion of a product line...strategic plan by both capturing and executing on sponsored research programs. As a CS TDM, you will have… more
    BAE Systems (04/25/25)
    - Save Job - Related Jobs - Block Source
  • Principal Cyber Tool and Capability Developer

    Draper (Boston, MA)
    …and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of ... systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability research . Job Description: Duties/Responsibilities * Assess hardware… more
    Draper (06/21/25)
    - Save Job - Related Jobs - Block Source
  • Senior Application Security Engineer (Remote…

    Confluent (Boston, MA)
    …security tooling to help scale product security operations and support overall vulnerability management practices + Propose, design, build, and deploy security ... Confluent + Keep up to date with emerging security vulnerability classes, research and perform triage for...different perspectives. And we make space for everyone to lead , grow, and challenge what's possible. We're proud to… more
    Confluent (07/03/25)
    - Save Job - Related Jobs - Block Source
  • Experience Design Manager

    Manulife (Boston, MA)
    …talented experience designers? + Cross-functional collaboration with business partners, research , and analytics to deliver seamless, omni-channel experiences that ... resonate with users? This is your opportunity to lead transformative design initiatives that not only enhance user satisfaction, but also drive tangible business… more
    Manulife (07/01/25)
    - Save Job - Related Jobs - Block Source
  • FAST Labs R3 Program Engineering Manager

    BAE Systems (Merrimack, NH)
    …+ Electronic Warfare, Electronic Attack, and Electronic Support Measures + Cyber vulnerability research and reverse engineering + Experience leading research ... **Job Description** FAST Labs is a world-class research organization. Our vision, We secure the future...management or related fields + Demonstrated ability to lead small multi-discipline teams on software focused programs **Preferred… more
    BAE Systems (07/19/25)
    - Save Job - Related Jobs - Block Source
  • Information System Security Eng (ISSE) III

    Global Resource Solutions (Boston, MA)
    …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management ... and Special Access Program (SAP) activities.. Essential Duties & Responsibilities: + Lead a team of System Security Engineers and Certification and Accreditation… more
    Global Resource Solutions (06/02/25)
    - Save Job - Related Jobs - Block Source
  • Chief Information Officer

    State of Massachusetts (Boston, MA)
    …and business impact improvements. . *Cybersecurity & Risk and Compliance Management *: Oversee security policies, risk assessments, and vulnerability remediation ... of Economic Development values inclusiveness and diversity within their employee and management teams. Within our community we strive to create and maintain working… more
    State of Massachusetts (07/15/25)
    - Save Job - Related Jobs - Block Source
  • Security Engineering Manager

    Meta (Boston, MA)
    research to identify new ways of achieving your mission 2. Work with vulnerability management , offensive security group, and other security programs to align ... would be to build a team of security engineers, set strategy, and lead execution, ensuring our products are hardened against attackers. **Required Skills:** Security… more
    Meta (06/23/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Systems Automation Engineer (Sr.…

    Merck (Boston, MA)
    …Engineer to join the Cybersecurity Automation & AI team. This role will lead the design and delivery of scalable automation solutions across enterprise platforms ... attendance is required for, field-based positions; facility-based, manufacturing-based, or research -based positions where the work to be performed is located… more
    Merck (07/09/25)
    - Save Job - Related Jobs - Block Source
  • Principal Security Engineer, Amazon | Multiple…

    Amazon (Boston, MA)
    …even your own, if you are an Amazon customer! In this role, you are the lead architects for the biggest and most complex security projects. You will own and push the ... including penetration testing, security operations, encryption, or identity and access management . They need a deep understanding of the inner workings of… more
    Amazon (05/16/25)
    - Save Job - Related Jobs - Block Source