- conEdison (New York, NY)
- …to understand impact Preferred + Previous experience in application scanning and vulnerability management , including configuring and using DAST and CAST scanning ... standard policies, processes, and procedures covering incident, problem, and change management Required + Understanding of OWASP Top 10 Required + Proficiency… more
- City of New York (New York, NY)
- …(s) will configure, deploy, monitor, administer, and evaluate virus software and other vulnerability management tools to protect the agency's network and data. ... Bureau of Business Information Technology (BIT) seeks to hire one (1) part-time Cyber Security Analyst . Under the direction of the Information Security… more
- City of New York (New York, NY)
- …security. This includes, but is not limited to, user access controls, vulnerability scanning, cyber threat intelligence gathering, and incident response. ... pre-tax programs such as Deferred Compensation, IRA, and a flexible spending account. CYBER SECURITY ANALYST - 13633 Qualifications 1. A baccalaureate degree,… more
- City of New York (New York, NY)
- …advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. CYBER SECURITY ANALYST - 13633 Qualifications 1. A baccalaureate degree, ... and commitment to making a difference through technology. About Cyber Command OTI's Office of Cyber Command... Command play several vital roles within the Threat Management discipline, one of which involves ensuring continuous coverage… more
- Bausch Health (Bridgewater, NJ)
- …+ Hands on- management of security tools and devices with EDR/AV, Vulnerability Management , Database Security, Cyber Intelligence, Case management ... in triage activities for Security Incident Response, Security Resilience and Vulnerability Management including performing networking and agent scanning for… more
- Amazon (New York, NY)
- …by a zeal for uncovering product vulnerabilities? If the thrill of automating vulnerability detection and scaling its reach excites you then we have the perfect ... committed team of security experts, you will engage in vulnerability research and analysis, and craft automation strategies to...teams to deliver solutions that simplify the creation and management of secure systems. As a leader, you will… more